This work is licensed under a Creative Commons License The updated versions of the slides may be

Size: px
Start display at page:

Download "This work is licensed under a Creative Commons License http://creativecommons.org/licenses/by-sa/2.0/. The updated versions of the slides may be"

Transcription

1 This work is licensed under a Creative Commons License The updated versions of the slides may be found on totem.info.ucl.ac.be/ BG

2 Outline Organization of the global Internet BG basics BG in large networks Interdomain traffic engineering with BG BG-based Virtual rivate Networks The VN problem rovider-provisionned BG/ MLS VNs BG/ The BG-based VNs were initially proposed in : E. osen, Y. ekhter, BG/ MLS VNs, FC2547, March 1999 They are now being developped without two IETF working groups : focusses on the provision of layer-2 VNs focusses on the provision of layer-3 VNs. We mainly discuss the layer-3 VNs in this tutorial

3 The VN problem Site2, alpha.com Site4, beta.be Site3, alpha.com Site1, beta.be Network provider Site3, beta.be Site1, alpha.com Site2, beta.be BG/ How to efficiently create one network containing the sites from alpha.com one network containing the sites from beta.be

4 What should be the goal of a good VN? A good VN service should Support multiple corporate customers in this case, the traffic from these customers should be isolated some security features should be supported to ensure that packets from public Internet can be introduced inside VN provide QoS guarantees for corporate customers typical solution is to reuse the classical mechanisms be easy to utilize and manage from the customer viewpoint from the service provider viewpoint BG/

5 The classical solution Site2, alpha.com Site4, beta.be Site1, beta.be Network providing leased lines Site3, alpha.com Site1, alpha.com Site3, beta.be BG/ Site2, beta.be rinciple Create leased lines between sites full mesh (beta.be), hub and spoke (alpha.com) topologies

6 Evaluation of the classical solution Advantage the quality of the service provided by the servic e provider is usually very good Drawbacks the number of leased lines can be high n*(n-1)/2 leased lines in total for full mesh For a VN with n sites, each router needs n-1 interfaces to obtain a full mesh Flexibility addition of a VN may require several new lines installation of leased line may require O(months) Cost can be high no statistical multiplexing on provider's backbone link costs even if no traffic is exchanged BG/

7 The I-VN problem Site2, alpha.com Site4, beta.be / 24 Site1, beta.be I-based Network provider Site3, alpha.com Site3, beta.be BG/ Site1, alpha.com / 24 Site2, beta.be / 24 How to efficiently create one network containing the sites from alpha.com one network containing the sites from beta.be When only I packets are exchanged

8 A customer-provisionned I VN Site2, alpha.com Site4, beta.be / 24 rinc iple create I tunnels from customer routers through IS drawback : configuration burden on customer routers BG/ Site1, beta.be Site1, alpha.com / 24 Site2, beta.be / 24 Site3, alpha.com Site3, beta.be

9 A customer-provisionned I-VN (2) Site2, alpha.com WAN interface : LAN interface : I Tunnels towards towards Site1, alpha.com / 24 For routing protocols used by routers of alpha.com, tunnel is considereed as a normal link between the connected routers Site3, alpha.com WAN interface : LAN interface : I Tunnels towards towards IS : / 16 Backbone routers only use this address block WAN interface : LAN interface : I Tunnels towards towards BG/

10 I Tunnels Many I tunneling protocols exist I in I tunneling can be used to carry I packets inside I packets Generic outing Encapsulation can be used to carry network layer packets inside I packets oint-to-point tunneling protocol can be used to carry frames through TC/I network Layer 2 Tunneling protocol can be used to carry frames through TC/I network ISec security (authentication/confidentiality) extensions to I also include tunneling capabilities BG/ A discussion of the various tunnels that could be used to build VNs may be found in :. Callon, M. Suzuki (Eds), A Framework for Layer 3 rovider rovisioned Virtual rivate Networks, Internet draft, <draft-ietf-l3vpnframework-00.txt>, work in progress, March 2003

11 GE Tunnel rinciple Tunnel is used to carry network layer packets Delivery I Header GE Header 32 bits Ver IHL DS Total length Identification Flags Fragment Offset TTL rotocol Checksum Source I address Destination I address C eserved Ver rotocol Type Checksum (option) eserved Tunneled acket I rotocol Value 47 is reserved to indicate that I packet carries GE-encapsulated packet rotocol Type Indicates the type of network layer packet carried by tunnel same values as Ethernet type field (0x800 for I packet) Tunneled packet may be optionally protected by Checksum in GE header Can contain any network layer packet understood by destination system that can be placed inside Ethernet frame BG/

12 Evaluation of the simple I solution Advantage Flexibility BG/ a single physical interface on each router Cost VN site can multiplex traffic to different sites on this link Drawbacks the number of tunnels can be high n*(n-1)/2 tunnels in total for full mesh For a VN with n sites, each router needs n-1 tunnels to obtain a full mesh Flexibility addition of a VN require adding new tunnels Sec urity depends on tunneling mechanism used weak with GE, better with Ipsec

13 A simple MLS-based solution Site2, alpha.com Site4, beta.be / 24 Site1, beta.be Site1, alpha.com / 24 Site2, beta.be / 24 Site3, alpha.com Site3, beta.be rinc iple Manually create LSs between customer routers from VN sites through MLS backbone BG/ This simple MLS-based solution is similar in principle to the solution used to support VN with technologies based on the label switching paradigm like ATM : Asynchronous Transfer Mode Frame elay

14 A simple MLS-based solution (2) Site2, alpha.com For routing protocols used by routers of alpha.com, LS is considered as a normal direct link between the connected routers Site3, alpha.com LAN interface : FEC /24, use label L / 24, use label L2 LAN interface : MLS backbone FEC / 24, use label L6, use label L3 BG/ Site1, alpha.com / 24 LAN interface : FEC /24, use label L /24, use label L5 Label switching table of backbone router L1 : -> North-East, O L2 : -> South-West, O L3 : -> North-West, O L4 : -> North-East, O L5 : -> North-West, O L6 : -> South-West, O

15 Evaluation of the simple MLS solution Advantages a single physical line per VN site QoS can be provided on a per-ls basis Flexibility bandwidth of each LS can be easily updated Cost statistical multiplexing is possible on MLS backbone Drawbacks MLS support routers of the VN sites must support MLS backbone routers must support MLS c onfiguration burden backbone routers must be configured for each new LS customer routers must be configured for each new site BG/

16 Outline Organization of the global Internet BG basics BG in large networks Interdomain traffic engineering with BG BG-based Virtual rivate Networks The VN problem rovider-provisionned BG/ MLS VNs BG/

17 rovider-provisionned MLS VN Objective Find a solution that is as automatic as possible for the service provider for the customers of the VN service Addition of a new site to an existing VN only the new customer router should need to be configured on the VN only a single router from the service provider should need to be configured on the provider's backbone BG/ The provider-provisionned MLS VNs are defined in FC2547 BG/MLS VNs. E. osen, Y. ekhter. March 1999.

18 rovider-provisionned MLS VN (2) rinc iple of the solution Site2, alpha.com Site2, beta.be Site1, beta.be A F Site1, alpha.com / 24 D IS backbone B E Site3, alpha.com transmission of one packet in beta.be, site1to site2 transmission of one packet in alpha.com, site1to site3 BG/

19 rovider-based MLS solution (3) BG/ Site2, alpha.com : Customer Edge router Sends normal I packets through the IS backbone to reach the other sites of its VN A router can only be attached to one or more E routers Does not know details of backbone Site1, alpha.com / 24 IS backbone E E E E : rovider Edge router Site3, alpha.com : rovider router The routers are managed by the IS and do not carry any VN specific configuration outer maintained by the IS Contains some per-vn configuration and ensures that the I packets sent by a particular VN site are delivered to the E router attached to the destination VN site

20 roblems to solve Site2, alpha.com Site2, beta.be BG/ Site1, beta.be Site1, alpha.com / 24 E1 IS backbone E2 E3 Site3, alpha.com How to forward the packets from one router to the appropriate router of the same VN? Need routing tables on, E and routers How to efficiently distribute these routing tables?

21 outing tables on the routers rinciple Each router contains one routing table with the routes belonging to its VN does not know anything about IS besides its attached E BG/ Site2, alpha.com Site1, beta.be Site1, alpha.com / 24 E1 IS backbone E2 Site2, beta.be E3 (site1),beta.be via E1 Site3, alpha.com (site3),alpha.com via E3 via E3 See Eric C. osen, Yakov ekhter, BG/MLS I VNs, Internet draft, draft-ietf-l3vpn-rfc2547bis-03.txt, October 2004, work in progress

22 outing tables on the routers rinciple routers only know how to reach the routers in their bac kbone routers do not know anything about VNs Site2, alpha.com Site2, beta.be Site1, beta.be Site1, alpha.com / 24 IS backbone E1 E3 a E2 b Site3, alpha.com b's routing table a North- West E2 West E3 North E1 North-West (via a) BG/

23 outing tables on the E routers roblem Corporate networks often use FC1918 addresses Two different VNs may use same I subnets Site1, alpha.com / 24 BG/ Site2, alpha.com Site1, beta.be E1 IS backbone E2 Site2, beta.be a b E3 Site3, alpha.com E3's possible routing table a West b South E1 West (via a) E2 South (via b) West (via E2) Where are???

24 outing tables on E routers (2) rinciple Eac h E router maintains several routing tables standard routing table one VN outing and Forwarding table (VF) per BG/ attached VN Site2, alpha.com Site1, beta.be Site1, alpha.com / 24 E1 IS backbone E2 Site2, beta.be a b E3 E3's beta.be routing table North () via E1 Site3, alpha.com E3's backbone routing table a West b South E1 West (via a) E2 South (via b) E3's alpha.com routing table North-East () / 24 via E2 via E1 The VF contains all the routes belonging to a given VN. This VF is used to forward the packets that are received inside the corresponding VN. For example, when considering E3, it will use the beta.be VF to forward a packet received on its North interface while it will use the alpha.com VF to forward a packet received on its Nort-East interfac e.

25 Distribution of the routing tables outing problem How can we correctly distribute the routing information to the, E and routers? A router must advertise its local routes to its attached E and must receive the remote routes (or a default route) from this router A E router must receive two types of routing information per VN routing information for the routes reachable through attached routers and through remote E routers For scalability reasons, a E router should only know the routing information about the VNs that it directly supports IS routing information to be able to reach other E routers A router must maintain routing information for the IS For scalability reasons, a router should not know any VN specific information BG/

26 Distribution of routing information(2) oute distribution between and E static routes both E and are configured with static routes suitable for small VN sites with a single link I I is used by the to announce the routes reachable on its local network I is used by the E to announce the routes of the same VN learned from the other E routers useful for medium VN sites with multiple links Other routing protocols OSF This is a special OSF instance between E and, not the OSF that is used inside the IS backbone ebg router uses ebg session to advertise routes to E BG/

27 Distribution of routing information(3) Site2, alpha.com E2 can reach / 24 Site1, alpha.com / 24 (site2) can reach E1 E2 E3 can reach / 24 Site3, alpha.com E3 E2 can reach (site3) c an reach In the backbone, all and E routers know IS backbone topology by using the normal IG BG/ In this example, the routes between the and the E routers can be exchanged by using any of the protoc ols discussed in the previous slide.

28 Distribution of routing information (4) BG/ Distribution of per VN routes between Es Site2, alpha.com /24 Site3, alpha.com IS backbone IBG Site1, beta.be E E IBG IBG Site2, beta.be E Site1, alpha.com / 24 rinc iple ibg full mesh between E routers routers do not need to run ibg since they do not maintain per-vn routes ibg sessions are used to redistribute the routes learned from routers to distant E routers If the IS network is large, the ibg full-mesh can be replaced by the classical ibg scaling techniques that are oute eflectors and Confederations. In the case of oute eflectors, a E would typically be client of two oute eflectors and the oute eflectors would be fully meshed. The ibg sessions used for normal Internet routing and for VNs can be the same or different. In some ISs, a different ibg distribution is used for the VNs.

29 The distribution of the VN routes by the E routers Two problems must be solved How to distribute the A and B routes for 10/ 8? How to ensure that E4 only receives B routes? 10/8 VN-A A E2 AS20 ibg 11/8 VN-A A2 10/8 VN-B B2 ibg ibg E E B3 VN-B 12/8 BG/

30 M-BG and the VN-Iv4 addresses M-BG an extension to BG that allows a BG router to advertise non-iv4 routes Iv6 I multicast VN-Iv4 The VN-Iv4 address family a method used by E routers to encode I v4 VN addresses before advertising them with M-BG a VN-Iv4 address contains an 8 bytes route distinguisher an Iv4 prefix BG considers VN-Iv4 addresses as opaque bitstring two types of route distinguishers AS:value Iaddress:value BG/ M-BG is defined in Tony Bates, avi Chandra, Dave Katz,Yakov ekhter Multiprotocol Extensions for BG-4, Internet draft, draft-ietf-idr-rfc2858bis-06.txt, 2004, work in progress

31 Controlling the distribution of VN routes How to ensure that VN-Iv4 routes only reach the E routers attached to those VNs? associate one or more route targets to each VF a route associated with T x must be distributed to all E routers that have a VF with T= x T is encoded as an BG extended community ASnumber:value Iv4address:value Control of the distribution E router knows the T supported by each of its peers and only advertises the appropriate VN-Iv4 routes or E router advertises all its VN-Iv4 routes and peers filter the received routes based on the attached T BG/ The BG Extended Community attribute is defined in : Sangli, Tappan and ekhter, BG Extended Communities Attribute, Internet draft, draft-ietf-idr-bgp-ext-communities-06.txt, work in progress, Aug Compared to the classical communities, the main advantage of the extended communities is their size. The classical communities are 32-bits wide, and a block of 2 16 values is allocated to each AS (ASX:1 to ASX:65535). If the communities were used to support VNs, an AS could only define 2 16 route target values. With extended communities, each AS can define 2 32 different route target values. The cooperative route filtering mechanism that can be used by E router to advertise to their peers the routes that they wish to receive is defined in : Chen, ekhter, Cooperative oute Filtering Capability for BG-4, Internet draft, draft-ietf-idr-route-filter-09.txt, work in progress, August 2003

32 M-BG and the VN-Iv4 addresses Example per-vn route distinguisher 10/8 VN-A BG/ A1 UDATE sent by E2 NextHop: VN-Iv4 address D:20:22 refix: / 8 oute Target (Ext.Com) Blue VN-B 10/8 B E2 ibg E ibg AS20 ibg E /8 UDATE sent by E5 NextHop: VN-Iv4 address D: 20:22 refix: / 8 oute Target (Ext.Com) Blue B3 VN-B 12/8 VN-A A2 An additional element of the FC2457 architecture that does not appear in the slides is that each E router defines, for each VN attached to the router: an import policy to specifiy, which routes received via BG or the E- protocol can be installed in the VF an export policy to specify which routes installed in the VF need to be advertised by using the E- protocol or BG Of course, those policies will depend on the route distinguishers and the route targets being used. In this example, the following import filters and import policies will be used E5 imports the ibg advertisements with extended communities blue and magenta since it has a route of VNA and VNB attached The routes with D 20:222 that are received by E5 are placed in its VN-A VF E4 does not import the BG advertisements that carry the Blue extended community since no router of VNA is attached to E4

33 M-BG and the VN-Iv4 addresses (2) 10/8 Example per-site route distinguisher VN-A A AS20 E2 ibg 11/8 VN-A A2 VN-B 10/8 B2 BG/ ibg E UDATE sent by E4 NextHop: VN-Iv4 address D: :10 refix: / 8 oute Target (Ext.Com) Magenta ibg E UDATE sent by E5 NextHop: VN-Iv4 address D: :123 refix: / 8 oute Target (Ext.Com) Magenta B3 VN-B 12/8 In this example, the following import filters and import policies will be used E5 imports the ibg advertisements with extended communities blue and magenta since it has a route of VNA and VNB attached The routes with D :10 that are received by E5 are placed in its VN-B VF E2 does not import the BG advertisements that carry the Magenta extended community since no router of VNB is attached to E2

34 Types of VN connectivity Utilization of the BG extended community attribute depends on the type of inter-sites connectivity within each supported VN Full mesh connectivity all sites are equal same route target for all sites of the VN beta.be / 24 beta.be IBG E2 E1 IBG E3 IBG beta.be BG/ In the figure above, the dotted lines show the packet flows between the routers of the beta.be VN

35 Types of VN connectivity (2) Hub & spoke connectivity two types of sites large (hub) site sends to all small (spoke) sites use hub as relay site to reach others one route targetfor Hub one route target for all spoke sites Spoke2, beta.be / 24 Hub, beta.be E2 IBG E1 IBG E3 IBG E Spoke1, beta.be BG/ Spoke3, beta.be / 24 In this example, Hub, beta.be is used as a transit router for all packets exchanged between any sites of the VN. For a discussion of the characteristics of deployed VNs, see : Satish aghunath, K.K. amakrishnan, Shivkumar Kalyanaraman, Chris Chase, "Measurement Based Characterization and rovisioning of I VNs,", Internet Measurements Conference, 2004

36 Types of VN connectivity (3) Site1, alpha.com / 24 BG/ E2 edistributes : VN beta Comm: beta_spoke,next-hop= E2 Imports routes with target : beta_hub Spoke2, beta.be / 24 Hub, beta.be E2 IBG E1 E3 edistributes VN betacomm: beta_spoke,next-hop= E3 VN alpha,comm: alpha,next-hop= E3 Imports the routes with target : beta_hub, alpha IBG E3 IBG Site3, alpha.com Spoke1, beta.be E1 edistributes to E3 and E2 the following routes VN alpha Comm: alpha,next-hop= E1 VN beta Comm: beta_hub,next-hop= E1 Imports the routes with target alpha, beta_spoke

37 Solving the forwarding problem How to forward the packets from each VN through the provider's backbone? sending pure I packets is not possible routers cannot know VN-specific routes different VNs use the same FC1918 addresses rinciple of the solution routers send normal I packets routers remain as simple as possible E routers maintain several routing tables one routing table per VN attached to E router one routing table for the IS backbone E encapsulate VN packets Common solution is to encapsulate with MLS Some ISs are using GE, L2T or ISec BG/

38 Solving the forwarding problem with MLS Spoke2, beta.be / 24 Hub, beta.be Site1, alpha.com / 24 BG/ Spoke3, beta.be / 24 E2 E1 E3 Site3, alpha.com rinciple of the solution : two levels of label one level of label is used to reach the next-hop E one level of label is used to indicate the VF to be used (and thus the outgoing ) in the egress E Spoke1, beta.be Example transmission from to in beta.be transmission from to in alpha.com

39 Distribution of labels Spoke2, beta.be / 24 Hub, beta.be Site1, alpha.com / 24 BG/ E2 LD Spoke3, beta.be / 24 E1 E3 LD Site3, alpha.com Inside IS backbone, use LD to distribute labels between and E routers each E knows the label to use to reach any E router number of labels in router depends on the number of E, and not on the number of VN sites E1 -> E2 :use label L8, port North -> E3 : use label L7, port South Spoke1, beta.be L7:West-> North-East:O... LD is the common way to distribute the labels to reach the E routers in the backbone. However, the E-E MLS LSs could also be traffic engineered tunnels established with SV-TE. Usually, the E-E MLS LS will be configured with penultimate label popping, i.e. the penultimate router will O the top label of the packet when sending the encapsulated packet to the final E router.

40 Distribution of labels (2) Spoke2, beta.be / 24 Hub, beta.be Site1, alpha.com / 24 E3 edistributes through ibg VN beta rt: beta_spoke,next-hop= E3, label:l4 VN alpha rt: alpha,next-hop= E3, label : L9 E2 IBG E1 IBG E3 IBG Site3, alpha.com Spoke1, beta.be E1 edistributes through ibg the following routes and labels VN alpha rt: alpha,next-hop= E1, label= L11 VN beta rt: beta_hub,next-hop= E1, label= L17 rinc iple use ibg to distribute VN labels between E routers BG/

41 acket flow in FC2457 VNs 10/8 With per-vn D, how does E2 reach 11/ 8? VN-A AS20 A1 E2 ibg ibg ibg E VN-A A2 A3 11/8 E4 BG/ E2 receives two routes for 20:10:11/8 20:10:11/ 8 from E4 with nexthop = (E4) 20:10:11/ 8 from E5 with nexthop = (E5) E2 selects the best route with its BG decision process and installs it inside its VN-A VF E2 may use two LSs to reach 11/ 8 via E4 and E5 In this example, we assume that the route target used by E5 is 20:10 (20 because the AS number of the IS and 10 is the number allocated by the IS for VN-A, assuming per-vn route targets)

42 acket flow in FC2457 VNs (2) 10/8 With per-site D, how does E2 reach 11/ 8? VN-A AS20 A1 E2 ibg ibg ibg E VN-A A2 A3 11/8 E4 BG/ E2 receives two routes for 11/ :123:11/ 8 from E4 with nexthop = (E4) :456:11/ 8 from E5 with nexthop = (E5) BG does not help E2 to select which route is the best, the selection is done when installing in VN-A VF E2 may use two LSs to reach 11/ 8 via E4 and E5 In this example, 123 and 456 are locally unique numbers managed by E4 and E5.

43 Backup links with FC2457 VNs 10/8 How to configure a backup link? VN-A A AS20 E2 ibg ibg E5 A2 VN-A ibg A3 11/8 E4 Backup link BG/ E4 adds localpref= 50 to route learned from A3 E4 and all routers will prefer the route via E5/A2 Failure of link A2-E5 will force E5 to withdraw its VN route towards 11/8 and the route via E4 will be used In this scenario, the convergence time in case of failure will depend on several factors : - the time to detect the failure of the E5-A2 link the best solution is clearly to detect the failure at layer1 or layer2. If the E- protocol is used to detect the failure, then it may elapse several tens of seconds before the failure is actually detect and E5 withdraws its VN- Iv4 route The type of route distinguishers used by E4 and E5 may influence the convergence time in large networks. If E4 and E5 use the same route distinguishers for the routes learned from respectively A3 and A2, then when E4 learns the D:11/8 via ibg, it will withdraw its own D:11/8 route. When link E5-A2 fails, E4 will need to advertise its own route to all E routers in the blue VN. The propagation of this advertisement may take some time. If E4 and E5 use different route distinguishers, e.g :20 and :21, then both VN-Iv4 routes will be received by all E routers attached to routers in VN-A. When installing the routes in their VF, all E routers will prefer the route with the :21 D since it has the highest localpref value. However, all E routers will always know both routes. Thus, if the route with D= :21 is withdrawn, then each E router can quickly switch to the route with D= :20 provided, of course, that there is already a LS between this E router and E4.

44 Solving the forwarding problem with tunnels Spoke2, beta.be / 24 Spoke3, beta.be / 24 Hub, beta.be Site1, alpha.com / 24 E2 E1 E3 Site3, alpha.com Spoke1, beta.be BG/ rinciple of the solution : Tunnel+ MLS one tunnel is used to reach the next-hop E one MLS label is used to indicate the VF to be used (and thus the outgoing ) in the egress E

45 Solving the forwarding problem with tunnels (2) How to the encapsulate the packets? Normal I packet E1 E3 Encapsulated packet Ver IHL ToS Total length Identification TTL rot.mls Flags Fragment Offset Checksum Normal I packet BG/ E1 I address E3 I address MLS Label TTL Ver IHL ToS Total length Identification Flags Fragment Offset TTL rotocol Checksum Source I address Destination I address ayload It is also possible to use GE tunnels to reach the egress E instead of using MLS-over-I tunnel. The MLS-over-I tunnel is described in : Tom Worster, Yakov ekhter, Eric C. osen, editor, Encapsulating MLS in I or Generic outing Encapsulation (GE), Internet draft, draft-ietf-mplsin-ip-or-gre-08.txt, 2004, Work in progress

46 Solving the forwarding problem with tunnels (3) E3 edistributes via ibg VN beta rt: beta_spoke,next-hop= E3, / 24:label:L4 VN beta rt: beta_spoke,next-hop= E3, :label:l5 VN alpha rt: alpha,next-hop= E3, label : L9 Site1, alpha.com / 24 BG/ Spoke2, beta.be / 24 Hub, beta.be Spoke3, beta.be / 24 E2 E1 E3 Site3, alpha.com Spoke1, beta.be Example transmission from to in beta.be transmission from to in alpha.com

47 Comparison of VN solutions rovider-provisionned BG/ MLS VNs Easy to configure for customer and provider rovider can provide special QoS to VN But customer routes are distributed inside the provider's network by ibg provider may need to carry a large number of routes if clients use /32, /30 or /28 subnets some ISs report BG/ MLS VN tables larger than the BG tables of backbone Internet routers stability and convergence time of routing in the customer network depends on provider's ibg BG has a rather slow convergence Customer does not entirely controls routing in its VN BG/

48 Comparison of VN solutions (2) Customer-provisionned VNs roviders are not involved in the provisionning of the VN no per-vn routing tables to maintain and distribute no revenue for value-added service Customer builds VN by establising tunnels it may be difficult to automate the tunnel establishment a large number of tunnels may be required Customer has full control over routing in the VN outing protocol can be tuned for fast convergence, load balancing or whatever no direct interactions between IS's routing and VN routing Customer must be able to configure routers correctly BG/

49 Thank you Questions and comments can be sent to Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) lace Sainte- Barbe, 2, B-1348, Louvain- la-neuve (Belgium) Bonaventure@ info.ucl.ac.be UL : BG/

APNIC elearning: Introduction to MPLS

APNIC elearning: Introduction to MPLS 2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security DNS/DNSSEC

More information

How To Build A Virtual Rivate Network

How To Build A Virtual Rivate Network rovider based Virtual rivate Networks An introduction and an MLS case Lecture slides for S-38.192 27.2.2003 Mika Ilvesmäki The idea is to create a private network via tunneling and/or encryption over the

More information

Keep it Simple with BGP/MPLS Virtual Private Networks

Keep it Simple with BGP/MPLS Virtual Private Networks White aper Keep it Simple with BG/MLS Virtual rivate Networks Joël Repiquet May 2002 www.lambdanet.net info@lambdanet.fr Contents 1. Introduction... 3 2. VN Models... 4 2.1. Overlay vs. eer VNs... 4 2.2.

More information

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives WHITE AR Introduction to Carrier Ethernet VNs: Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. WHITE AR - Introduction to Carrier Ethernet VNs: Understanding the Alternatives Table

More information

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

BGP Configuration Guide

BGP Configuration Guide Configuration Guide 5991-3730 August 2005 BG Configuration Guide Configuring BG for Access to rivate I Services (BG/MLS VN Networks) This Configuration Guide provides an overview of rivate I Services (BG/MLS

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks An ADTRAN White aper rivate I Service BG/MLS VN Networks rivate I Service BG/MLS VN Networks U ntil the advent of business communications over the Internet, a clear distinction between private and public

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet. HughesNet and MLS This white paper addresses how it is possible to seamlessly integrate MLS and HughesNet. The first sections contain a basic introduction to MLS and the required scenarios in which the

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com I over MLS Course Number resentation_id 2001, Cisco Systems, Inc. All rights reserved. atrick Grossetete Cisco Systems Cisco IOS I roduct Manager pgrosset@cisco.com 1 Agenda I Migration Approaches enabled

More information

Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman

Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman Managing MLS Networks Oleg Kupershmidt and Joel Kaufman Terms of This resentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

MPLS Path Management. Ikuo Nakagawa, Intec NetCore, Inc. Feb., 2005

MPLS Path Management. Ikuo Nakagawa, Intec NetCore, Inc. Feb., 2005 MLS ath Management Ikuo Nakagawa, Intec NetCore, Inc. Feb., 2005 resentation Outline Background MLS is / will be de facto standard of carrier class backbone To build a reliable & stable multi-service network

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

CS 457 Lecture 19 Global Internet - BGP. Fall 2011 CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Scaling the Internet with LISP

Scaling the Internet with LISP Scaling the Internet with LISP Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve (Belgium) http://inl.info.ucl.ac.be

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 527

6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 527 6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL ROCESSING, Cairo, Egypt, Dec 29-31, 2007 527 Using policy-based MLS management architecture to Improve QoS on I Network

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

MPLS Based Networks in Railway Deployments

MPLS Based Networks in Railway Deployments Adam Oliver Bachelor of Electronic Engineering SUMMARY Safe and reliable communications are a critical component in operating modern railway networks. Voice radio, signalling, asset protection, CCTV, station

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming

More information

Lesson 13: MPLS Networks

Lesson 13: MPLS Networks Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP

More information

MPLS Cloud. White Paper. MPLS Cloud. ZettaNet Pty Ltd Call 1300 139 550 sales@zetta.net.au support@zetta.net.au

MPLS Cloud. White Paper. MPLS Cloud. ZettaNet Pty Ltd Call 1300 139 550 sales@zetta.net.au support@zetta.net.au White aper MLS Cloud ZettaNet ty Ltd Call 1300 139 550 sales@zetta.net.au support@zetta.net.au Contents 1 OVERVIEW... 3 1.1 HOW MLS WORKS...3 1.2 AVAILABLE ENDOINT TECHNOLOGIES...3 2 NTRALNET MLS... 4

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

Testing Edge Services: VPLS over MPLS

Testing Edge Services: VPLS over MPLS Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Introduction to MPLS. About the Speaker

Introduction to MPLS. About the Speaker Introduction to MLS aul Borghese, Chesapeake Netcraftsmen pborghese@netcraftsmen.net 1 About the Speaker aul Borghese Cisco CCIE #3760, CCSI #97115 Specialties: Large-Scale Routing & Switching, High Aailability,

More information

Savera Tanwir. Internet Protocol

Savera Tanwir. Internet Protocol Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff. Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

l.cittadini, m.cola, g.di battista

l.cittadini, m.cola, g.di battista MPLS VPN l.cittadini, m.cola, g.di battista motivations customer s problem a customer (e.g., private company, public administration, etc.) has several geographically distributed sites and would like to

More information

Service Peering and BGP for Interdomain QoS Routing

Service Peering and BGP for Interdomain QoS Routing Service Peering and BGP for Interdomain QoS Routing David Ward, John Scudder mailto:dward@cisco.com mailto:jgs@cisco.com 2006 Cisco Systems, Inc. All rights reserved. Cisco Unified Call Manager Platform

More information

Part The VPN Overview

Part The VPN Overview VPN1 6/9/03 6:00 PM Page 1 Part 1 The VPN Overview VPN1 6/9/03 6:00 PM Page 2 VPN1 6/9/03 6:00 PM Page 3 Chapter 1 VPN-in-Brief 1.1 VPN Overview This is the information age. We no longer have to commute

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

Connecting Remote Offices by Setting Up VPN Tunnels

Connecting Remote Offices by Setting Up VPN Tunnels Connecting Remote Offices by Setting Up VPN Tunnels Cisco RV0xx Series Routers Overview As your business expands to additional sites, you need to ensure that all employees have access to the network resources

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

MPLS Virtual Private Networks

MPLS Virtual Private Networks MPLS Virtual Private Networks Luca Cittadini Giuseppe Di Battista Maurizio Patrignani Summary This chapter is devoted to Virtual Private Networks (VPNs) designed with Multi Protocol Label Switching (MPLS)

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

IP Routing Configuring RIP, OSPF, BGP, and PBR

IP Routing Configuring RIP, OSPF, BGP, and PBR 13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014

HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014 HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD BSides Asheville 2014 aul Coggin Internetwork Consulting Solutions Architect @aulcoggin www.dynetics.com V## Goes Here 1 BG Hijacking in the News 2008 akistan

More information

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information