The News GodThe News GodThe News God
  • Politics
    • Trump
  • News
    • Wars & Conflicts
  • Business & Finance
  • Lifestyle & Health
  • Law
  • Sports
  • Tech & Autos
  • Home & Garden
  • Videos
  • More
    • Travel & Tour
    • Education
    • Entertainment
      • Biography
      • Net Worth
      • Famous Birthdays
    • General
    • Pets
    • Blog
    • About Us
    • Disclaimer
    • Media Partners
    • Why You Need to Read Business News Everyday
    • Authors
    • Terms of Service & Privacy Policy
Reading: CCIE Enterprise Infrastructure (EI) Technology: SDA Control Plane Based on LISP
Share
Font ResizerAa
The News GodThe News God
Font ResizerAa
  • Politics
  • News
  • Business & Finance
  • Lifestyle & Health
  • Law
  • Sports
  • Tech & Autos
  • Home & Garden
  • Videos
  • More
Search
  • Politics
    • Trump
  • News
    • Wars & Conflicts
  • Business & Finance
  • Lifestyle & Health
  • Law
  • Sports
  • Tech & Autos
  • Home & Garden
  • Videos
  • More
    • Travel & Tour
    • Education
    • Entertainment
    • General
    • Pets
    • Blog
    • About Us
    • Disclaimer
    • Media Partners
    • Why You Need to Read Business News Everyday
    • Authors
    • Terms of Service & Privacy Policy
Follow US
  • About Us
  • Authors
  • Advertise
  • Contact Us
  • Disclaimer
  • My Bookmarks
  • Terms of Use & Privacy Policy
  • Media Partners
The News God > Blog > Tech & Autos > CCIE Enterprise Infrastructure (EI) Technology: SDA Control Plane Based on LISP
Tech & Autos

CCIE Enterprise Infrastructure (EI) Technology: SDA Control Plane Based on LISP

PAUL CARROLL
Last updated: July 12, 2023 10:33 am
PAUL CARROLL
July 12, 2023
Share
4 Min Read
Close up of businesswoman hands holding airplane model
SHARE

To learn network technology, choose SPOTO, the most famous training base for high-end network engineers in China.

Cisco Software-Defined Access (SD Access) uses an endpoint identifier (EID) to control access (RLOC) in the fabric. In traditional network architecture, the IP address of an endpoint represents its location and identity. For security, the management of traditional enterprise networks will severely limit the use of the same value for endpoint location and identity.

The Locator ID Separation Protocol (LISP) is a protocol that can be used to separate the endpoint identifier (EID) and its location (RLOC).

SPOTO’s EI course will lead you to understand the working principle of LISP in detail, so as to understand its role in Cisco SD-Access solution.

Related Posts

how to gamble using cash app
Perks Of Using A Digital Wallet In 2022
Speeding Doesn’t Always Mean a Faster Arrival Time
How are Cell Phones Made: Know the Surprising Facts
Why Enclosed Auto Transport is Ideal for Classic Cars

In the current Internet routing and addressing architecture, a single device is identified by an IP address, which simultaneously represents its identity and how to connect it to the network.

When the device moves, it must obtain a new IP address for its identity and location. Due to non-aggregable address allocation, as well as business conditions such as mergers and acquisitions, the rapid development of the Internet has proved that this single namespace (one IP for each device) can produce very obvious and harmful results.

When using LISP, the IP address represents only the identity of the device. When the device moves, its IP address remains unchanged in both locations, and only the location ID will change.

The LISP architecture was originally designed to solve the problem of Internet expansion, but it also allows enterprises to enable new functions and features, such as VM mobility between data centers. If LISP is used for VM mobility in the data center, the main advantage is that there is no need for route convergence, no need for DNS updates, and it is transparent to the host.

LISP is a routing architecture that provides new semantics for IP addressing. The current IP routing and addressing architecture uses a single number space (IP address) to express two pieces of information:

● Device identity;

● Connection method (location) of the device to the network.

The LISP routing architecture design groups the device ID or endpoint identifier (EID) into two different number spaces according to its location or routing locator (RLOC).

There are several advantages to splitting EID and RLOC. One advantage is host mobility.

LISP namespace defines two separate address spaces:

● Endpoint identifier (EID) address: It is composed of IP address and prefix to identify the endpoint. The EID accessibility between LISP sites can be achieved by resolving the EID to RLOC mapping.

● Routing locator (RLOC) address: It consists of IP address and prefix, and is used to identify different routers in the IP network. Reachability in RLOC space is achieved through traditional routing methods.

LISP uses a mapping and encapsulation routing model, in which traffic destined for EID is encapsulated and sent to RLOC instead of being sent to the target EID directly. It is based on the lookup results in the mapping database.

There are many new technical contents in EI CCIE certification. You can obtain more learning materials through SPOTO’s online customer service.

https://www.spotoclub.com/

How to Choose the Right Lock Ring Gearbox Accessory?
Situations That Call for Towing Services
Strategies for SEO; Boosting Your Traditional Business towards Success
SettlePay — a novelty in the payments industry
The Most Useful Information Every Car Lover Should Know
Share This Article
Facebook Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What Is The Optimal Time To Consume Vitamins For Maximum Benefit?
Next Article Mistakes Casino Gamblers Make Fly High with Hawkplay: Your Destination for Thrilling Online Casino Action
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Publications

May Thai’s Wiki, Bio, Net Worth, Age, Husband, Hot Photos Education, Body Measurement, and More. 
Entertainment
May 24, 2025
Elexis Monroe Biography, Age, Net Worth, Career, Biyfriend, and More
Elexis Monroe Biography, Age, Net Worth, Career, Biyfriend, and More
Biography
May 24, 2025
Georgie Lyall's bio
Georgie Lyall’s bio, wiki, age, early life, career, net worth, husband, and more
Biography
May 24, 2025
Xev Bellringer Wiki, Bio, Net Worth, Boyfriend, Height, Weight, Age, Measurements
Xev Bellringer Wiki, Bio, Net Worth, Boyfriend, Height, Weight, Age, Measurements
Entertainment
May 24, 2025
Hamburg Knife Attack
At least 12 Injured in Knife Attack in Hamburg, police says
News
May 23, 2025

Stay Connected

235.3kFollowersLike
69.1kFollowersFollow
11.6kFollowersPin
56.4kFollowersFollow
136kSubscribersSubscribe

You Might also Like

Use of AI for Customer Feedback and Competitor Analysis
Tech & Autos

Use of AI for Customer Feedback and Competitor Analysis

May 19, 2023
How to Make Animated Videos to Improve Marketing Efforts
Tech & Autos

How to Make Animated Videos to Improve Marketing Efforts

December 22, 2021
How to Choose the Best Snow Tires for Your Vehicle
Tech & Autos

How to Choose the Best Snow Tires for Your Vehicle

January 4, 2025
Improving Google Workspace Security with Access Controls
Tech & Autos

Improving Google Workspace Security with Access Controls

May 5, 2025
Show More
© 2025 Thenewsgod. All Rights Reserved.
  • About
  • Contact Us
  • Terms of Use & Privacy Policy
  • Disclaimer
  • Authors
  • Media Partners
  • Videos
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?