MPLS TE Overview 1357■ Link protection, where the PLR and the MP are connected through a direct linkand the primary LSP traverses this link. When the link fails, traffic is switched tothe bypass LSP. As shown in Figure 388, the primary LSP is Router A →Router B→ Router C → Router D, and the bypass LSP is Router B → Router F → RouterC.Figure 388 FRR link protection■ Node protection, where the PLR and the MP are connected through a deviceand the primary LSP traverses this device. When the device fails, traffic isswitched to the bypass LSP. As shown in Figure 389, the primary LSP is RouterA → Router B → Router C → Router D → Router E, and the bypass LSP isRouter B → Router F → Router D. Router C is the protected device.Figure 389 FRR node protectionDeploying FRRWhen configuring the bypass LSP, make sure the protected link or node is not onthe bypass LSP.As bypass LSPs are pre-established, FRR requires extra bandwidth. When networkbandwidth is insufficient, you are recommended to use FRR for crucial interfacesor links only.DiffServ-Aware TE Diff-Serv is a model that provides differentiated QoS guarantees based on class ofservice.MPLS TE is a traffic engineering solution that focuses on optimizing networkresources allocation.DiffServ-aware TE (DS-TE) combines them to optimize network resourcesallocation at a per-service class level. For traffic trunks which are distinguished byclass of service, this means varied bandwidth constraints.Router A Router B Router C Router DRouter FPLR MPPrimary LSPBypass LSPRouter A Router B Router C Router DRouter FPLR MPPrimary LSPBypass LSPRouter E