TECHNICAL PAPER. Traffic Engineering OCTOBER 2000

Size: px
Start display at page:

Download "TECHNICAL PAPER. Traffic Engineering OCTOBER 2000"

Transcription

1 TECHNICAL PAPER Traffic Engineering OCTOBER 2000

2

3 Traffic Engineering Introduction 1 Traffic Engineering Overview 1 Traffic Engineering with ATM 1 Current Framework for IP Traffic Engineering 1 Constraint-Based Routing Issues 4 The GRATE Algorithm as a Solution 4 From CBR to GRATE: Off-line Traffic Engineering 4 Algorithms Used for Off-line Optimization 6 Objectives and Constraints Taken into Account by GRATE 6 GRATE Takes QoS Requirements into Account 6 Results of the Off-line Traffic Engineering Approach Taken by GRATE 7 Traffic Engineering in a Complete OSS 7 Future Applications for Off-line Traffic Engineering 8 Link with Layer 2 and Layer 1 Traffic Engineering 8 Capacity Analyses and Disaster Risk Assessment with What-If Scenarios 8 Bandwidth Brokerage for IP Services 8 Further Reading 9

4

5 Introduction As the Internet evolves into a critical communications network at the heart of the new economy, the challenge for IP networks is to provide the dependability of the telephone networks we are used to. IP networks are also expected to integrate both voice and data communications. For real time applications such as voice, predictable service is a requirement. Currently, the answer to these challenges is overprovisioning costly resources. At the same time, providing Internet communication services is a highly competitive business in which large investments are constantly needed in order to keep pace with the increase in traffic. Consequently, performance optimization has become an important issue. Overdimensioning of network resources is not always a good solution for predictable service. Thus, there is a need to increase the efficiency of resource utilization while minimizing the possibility of congestion. The primary goal of traffic engineering is exactly that: to control traffic flow through a network offering services according to your customers specific requirements, while still utilizing network resources in an economical way. Efficient traffic engineering should take into account current and future traffic demand, as well as individual customer needs, such as bandwidth demand, quality of service (QoS), reliability, etc. Traffic engineering should also provide what-if scenarios that can be used for capacity and disaster risk analysis. When integrated into a complete operations support system (OSS), a traffic engineering tool is the key to providing bandwidth brokerage. It offers the ability to control whether a new customer can be served his required new connection (i.e., as part of a virtual private network [VPN], taking into account all QoS measures) and how this connection can be established. The following sections elaborate on how traffic engineering is implemented for IP networks. Alcatel s new approach to traffic engineering and current practices, the generic rate adaptation traffic engineering (GRATE) algorithm, is introduced, and its advantages over existing techniques are outlined. In conclusion, the future direction of the traffic engineering applications is addressed, as well as the integration of traffic engineering into a complete set of solutions for end-to-end IP operational support. Traffic Engineering Overview Traffic Engineering with ATM As the Internet became more popular in the early 1990s, routers began facing performance limits and became serious network bottlenecks. The routers in the core of the network were replaced by ATM switches, which demonstrated superior forwarding performance, but lacked the connectionless paradigm that was the success of the Internet. Thus, the architecture of the Internet backbones evolved into a set of low capacity edge routers interconnected by a set of permanent virtual circuits (PVCs) across an ATM network, which overcame the forwarding capacity limitations of routers. Moreover, this architecture provided Internet service providers (ISPs) with the ability to control traffic flow across their networks. The path of ATM PVCs across ATM networks can be controlled such that the traffic is equally distributed across the network and the transport resources are used in the most efficient way. Thus, traffic engineering for IP networks was born. Current Framework for IP Traffic Engineering The evolution of chip technology overcame the forwarding capacity limitations of IP routers. Today, application specific integrated circuits (ASICs) for IP address look-up can handle millions of packets per second, enabling terabit routers with interface capacities of up to OC-192. In this respect, routers began outperforming ATM switches and, gradually, the ATM core of IP backbones was replaced by a meshed network of IP terabit routers. However, traffic flow is still bound to shortest path routing decisions of IP routing protocols, leading to bottlenecks and underutilized network resources. ALCATEL 1

6 In order to overcome the limitations of shortest path routing, it was proposed to use multiprotocol label switching (MPLS). MPLS allows for the bypassing of shortest routes by means of label switched paths (LSPs) along non-shortest routes. MPLS is the convergence of connection-oriented forwarding techniques and the Internet s routing protocols. With MPLS, a virtual connection is established between two points on a pure datagram network. The efficiency and operation of a datagram network remain intact, while the advantage of a connection-oriented network can be achieved. This hybrid architecture can emulate connection-oriented services, while normal datagram mechanisms are used to deliver conventional datagram services. Since the overhead required for connection emulation is only needed for services that require it, the cost of running the network is minimized. Using MPLS incorporates four key steps: Path computation Path establishment Path selection Packet forwarding This paper focuses on the path computation process (which can be implemented by traffic engineering algorithms). However, path establishment, path selection and packet forwarding are discussed first. Path establishment: label distribution A path is first established using one of two standardized signaling protocols: resource reservation protocol (RSVP) with extensions, or constraint-based label distribution protocol (CR-LDP). During path setup, labels are exchanged between label switched routers (i.e., routers that support MPLS, LSRs), and these labels are used during packet forwarding (see section Path selection and packet forwarding). Two kinds of paths can be established: explicit paths and shortest paths. The latter form the normal IGP (internal gateway protocol) routes. An explicit path is one whose route is determined in advance and which can be different from the shortest path route. (In Figure 1, this is the thick line between the LSR in Los Angeles and the LSR in New York via the two other routers.) The ability to set up explicit paths is an important element in traffic engineering. Path selection and packet forwarding At an ingress LSR (i.e., the router where an LSP starts; in Figure 1, it is the LSR in Los Angeles), incoming packets are sent on the LSP, according to the forwarding equivalence class (FEC) they belong to. A FEC is a group of IP packets that is forwarded in the same manner, with the same destination and forwarding treatment. The assignment of a packet to a FEC can be based on parameters such as packet ingress point, fields in the IP header (destination address, forwarding treatment such as differentiated services code point [DSCP], etc.). The FEC is encoded in a label, a short, fixed-length identifier, which is attached to the packet. A transit LSR forwards packets based on the information contained in the label and the interface in which the packet came. The IP header is not consulted. The look-up in the label information base (LIB) determines the packet s outgoing interface and new outgoing label. This process is called label swapping. Finally, the egress LSR strips off the label, and the packet is forwarded as a regular IP packet (i.e., the outgoing interface is determined by a look-up of the destination address in the forwarding information base (FIB). Path protection: an extra value added by MPLS One of the advantages of the connection-oriented model of MPLS is that traffic can be quickly redirected from a broken connection to an alternative connection, and on to the same destination. This is in contrast to restoration times in datagram networks, where the routing protocols must converge before service is restored. MPLS allows users to choose between different protection strategies. One method is fast rerouting, which is a local repair action. If a repair can be made locally to the device that detects the failure, restoration can be made without serious service disruption and can happen in the same time frame as SONET restoration. However, fast restoration often creates nonoptimal paths. For that reason, there is a second protection technique: the head end of the LSP (the ingress LSR) is notified, which can nondisruptively redirect traffic to a more optimal path, using a make-before-break strategy (in which a new connection is established before the old one is torn down) or active standby. 2 ALCATEL

7 Path computation The route taken by an LSP through the network is determined by path computation. This can either be done online in real time in the network nodes themselves, or off-line on a workstation using a centralized application that determines routing plans on behalf of each router. Online computation typically uses a shortest path algorithm, or an adaptation generally denoted by constraint-based routing (CBR). CBR is a class of routing algorithms that computes shortest routes through a network subject to a set of constraints and requirements. Trunk constraints may include bandwidth, delay (expressed as a maximum number of hops), and policy instruments such as resource class attributes. Since CBR considers not only the topology, but also additional link properties (i.e., maximum link bandwidth, currently reserved bandwidth, link colors, etc.), additional network resource attributes are flooded using extensions to the link-state IGPs, such as open shortest path first (OSPF) and intermediate system-to-intermediate system (IS-IS). An example of using the CBR policy instruments is to first assign transatlantic links to the user-defined resource class Transatlantic, overprovisioned links to resource class Predictable, satellite links to resource class Satellite, etc. When a customer asks for a low delay connection between offices in Brussels and Rome, an LSP can be set up with the constraints exclude Transatlantic and Satellite and include Predictable. Figure 1: MPLS Path Setup and Label Switching Switch Labels Ingress LSR Los Angeles L1 IP Packet Egress LSR New York IP Packet L2 IP Packet IP Packet L3 IP Packet L1 Look-Up LSP via FEC ALCATEL 3

8 Constraint-Based Routing Issues The advantages of CBR stem mainly from the fact that it is simple and that it works in a dynamic fashion. Unfortunately, the advent of more complex services (such as DiffServ) and increasing performance and survivability demands reveal some of its drawbacks. The disadvantages of CBR are related to the optimization that takes into account all traffic trunks in sequence as they are proposed to the network. There is no way of ensuring that the order in which the trunks are set up leads to an optimal solution. In fact, in many cases, much traffic is blocked because of this system. Suppose, for instance, that a large trunk on a long path is routed first. Many resources will be attributed to this trunk. It is conceivable that subsequent trunks will have difficulty finding enough resources. In order to react appropriately to changing traffic patterns, it is necessary to be able to reroute previously established trunks if they obstruct a better routing configuration. The problem becomes even more serious when traffic needs to be protected with backup paths (see Figure 2). CBR algorithms can handle the combined constraints of both a primary and a protection path. However, this is limited to a 1:1 protection mode. It is clear that far more efficient solutions can be achieved if protection bandwidth can be shared among trunks that have working paths that are assumed to be exempt from simultaneous failure. Indeed, most protection schemes consider only single link and/or node failures, in which case fully node and link disjoint working paths cannot fail simultaneously. Sharing protection capacity (in a so-called shared protection scheme) leads to more efficiency in the network. This requires a view of all trunks and their paths through the network. In Figure 2, the upper picture shows a situation in which two 20 Mb/s trunks between the same pair of nodes are 1:1 protected. The working traffic of the trunks is normally carried on the upper and middle path. They both have the same backup path (i.e., the lower path). In the event of a link failure (such as the one shown in the figure), backup capacity is reserved for all trunks for which the primary path is affected by the failure. Since both trunks have the same backup path, they have to share the capacity of the backup path (assuming full protection and equal link capacities); thus, their working traffic can only receive a share of 50 percent or 10 Mb/s. For backup protection, backup capacity is provided only for those trunks for which the working path actually fails. This means that, in this example, only one trunk can be affected for any given failure. The backup capacity is reserved only once, which means that both trunks can have a share of 100 percent, or 20 Mb/s. Hence, the gain in fairness and throughput in this case is 100 percent, which indicates the possible benefits of a backup protection scheme. Finally, the use of CBR in QoS-aware networks is questionable. In such networks, some traffic flows need to be offered with low loss or low latency guarantees. Although CBR algorithms can, eventually, be extended so that these QoS requirements can be taken into account for each given trunk, a CBR algorithm will not be able to estimate the impact of this new trunk on the QoS characteristics of the existing trunks. This requires a view of all trunks, their paths, and the load changes along these paths when a new trunk is introduced. Indeed, delay and delay jitter are typically related to buffer occupancy, which in turn is related to the load at each given node. Therefore, CBR algorithms cannot be used for the QoS provisioning required in a DiffServ network, which must be able to offer low loss or low latency guarantees to the flows that require them. The GRATE Algorithm as a Solution From CBR to GRATE: Off-line Traffic Engineering The problems related to a distributed traffic engineering approach are solved if the network view of the edge nodes is expanded. Each node should know all trunks, their paths, and their QoS requirements. When configuring a new trunk, all other network nodes should be informed, requiring some additional extensions to the routing protocols. However, there is a more serious problem. Even if all routers have the same, complete view of the topology and the trunks, they must also use the same CBR algorithm. Otherwise, inconsistencies will arise. It is very unlikely that in a network with routers from multiple vendors, all edge nodes use the same CBR algorithm. Therefore, a distributed approach seems inappropriate to meet the needs addressed in the previous section. 4 ALCATEL

9 Consistent routing decisions require centralized control of the routing configuration. A centralized approach obviates the need for any routing protocol extensions, since the paths of the trunks and the load that they induce, are known to the centralized server. Yet, this centralized server needs to solve the complex problem of routing every trunk and respecting QoS parameters and protection levels, while at the same time minimizing the amount of spare capacity for restoration purposes. Figure 2: Shared Protection vs. 1:1 Protection Scheme 10 Mb/s A B 10 Mb/s C D 20 Mb/s E F 1:1 Protection Scheme Working capacity Backup capacity 20 Mb/s A B 20 Mb/s C D 20 Mb/s E F Shared Protection Scheme ALCATEL 5

10 Algorithms Used for Off-line Optimization Global optimization can be achieved through the use of linear programming-based algorithms or with heuristics. Heuristic algorithms have the advantage of being fast, because they tend to make intelligent assumptions about the problem that reduce the number of variables to be optimized. They provide excellent results for specific problems. However, they are less flexible to changes and may be incapable of dealing with complex problems when it is difficult to identify the assumptions for reducing the number of variables. Linear programming-based algorithms, on the other hand, provide a mathematical framework for solving a generic class of problems, which makes them far more flexible and reusable than heuristics. They can deal with the complicated optimization problems that arise from multiple path routing or shared protection schemes. Alcatel s linear programmingbased approach describes the traffic engineering problem by means of an objective function and a set of constraints. Objectives and Constraints Taken into Account by GRATE The objective function contains multiple objectives that can be maximized or minimized. The objectives are either resource-oriented or traffic-oriented. Resource-oriented objectives address network-related quantities, such as load balance and link utilization. Resource-oriented traffic engineering can be used to route the demands in the network while preserving (as much as possible) free resources for future increases or new demands, or for routing lower priority traffic. This is done by minimizing the utilization of the maximally used link, while honoring the demand for each traffic trunk. As a second objective, the total resource utilization in the network is minimized, which will generally reduce the total routing cost. Traffic-oriented objectives do not focus on the network, but rather on the traffic trunks. They are used to make sure that the amount of traffic served by the network is maximized, taking into account all individual customer service level agreements (SLAs), which maximizes revenues. The share of a traffic trunk is defined as the fraction of its demand that can be routed through the network. Note that this fraction must be one or higher to avoid partial blocking of a trunk. The extent to which it is larger than one indicates the margin of expansion for each trunk s bandwidth demand. Throughput is defined as the sum of all shares multiplied by their respective demands. Note that there is no guarantee that all traffic will fit into the network, even if that is a requirement. The algorithm provides the fraction of the demand that can be accepted (see Figure 2). Arbitrary starvation of trunks is avoided by maximizing the minimum share in the network. As a second objective, throughput is maximized. This will generally increase the total revenue that can be obtained from the network. The constraints typically express physical limitations of the network, such as limited link capacity and conservation constraints. They may also be used to force a single path for each trunk, or to implement various protection schemes. GRATE Takes QoS Requirements into Account As far as QoS requirements are concerned, the algorithms allow different traffic types to be treated differently. Traffic with stringent bandwidth constraints requiring low loss and latency, such as the expedited forwarding per hop behavior (EF-PHB) in DiffServ, can be routed through load balancing. This enables a lower overall load of EF, which is beneficial to latency, while preserving resources for other PHBs. The best effort (BE) PHB is typically treated using traffic-oriented objectives. The bandwidth requirements for this traffic are far looser, which means that fairness is provided by maximizing the minimum share and maximizing throughput for future expansion or revenue optimization. In addition, the off-line approach allows implementation of a shared protection mechanism for restoration. With this mechanism, backup capacity is reserved on links only when the corresponding primary path fails. Excluding all failures except single link failures, allows the sharing of protection capacity between primary paths that are node and link disjoint. Obviously, the fairness and throughput of the primary paths in a shared protection scheme are higher than that for a 1:1 protection scheme. The difference depends on the number of protected trunks and the protection capacity. If all trunks are protected for 50 percent of their capacity, the throughput of the primary paths increases on average by 16 percent, while the backup capacity on the links is decreased by 25 percent, compared to a 1:1 protection scheme (Figure 2). 6 ALCATEL

11 Results of the Off-line Traffic Engineering Approach Taken by GRATE The use of a preplanned off-line approach such as the GRATE algorithm allows for the optimal selection of explicit paths for the traffic trunks, while taking into account protection and QoS for each trunk or customer separately. For single path traffic engineering, in which a single path must be chosen for each trunk, the traffic handling capacity of the network (Figure 1) has been considerably increased. With the LSP path placement obtained from the Alcatel traffic engineering tool, the OSPF routing increase averages approximately 20 percent to 25 percent for fairness and throughput. This means that the throughput of the least served trunk, as well as the total throughput in the network, is increased by 20 percent to 25 percent. A comparison between GRATE and a conventional constraint-based routing algorithm is best explained using an example. For this purpose, we applied both algorithms to a set of randomly generated networks, exhibiting an Internet-like topology. The networks were carefully dimensioned to avoid underprovisioning and to limit overprovisioning. For all networks, GRATE achieved an LSP configuration that allowed the routing of all trunks. The constraint-based routing algorithm, on the other hand, never succeeded in routing all trunks. Depending on the order in which the trunks were set up, the average blocking rate (the percentage of trunks that could not be routed) ranged from 12 percent to 15 percent, with peaks of up to 70 percent. The average blocked demand percentage (the ratio of the sum of the demand of all blocked trunks over the sum of all demands) ranged from 7 percent to 21 percent. In some cases, however, it could be as high as 40 percent. Clearly, the constraint-based routing algorithm is outperformed by GRATE. In addition, the quality of its solution heavily depends on the order of the inputs. Ordering the trunks beforehand can establish a compromise between reducing the blocking rate, which leads to more fairness in the network, and increasing the throughput through a reduction of the blocked demand percentage. This explicit trade-off is implicitly present in GRATE. In conclusion, when compared to constraint-based routing, the linear programming-based single path traffic engineering algorithm significantly reduces the blocking probability of a trunk (note that the blocking probability is 0 percent for GRATE) and increases the total demand that can be supported by the network. In addition, a preplanned off-line tool allows the optimization of protection capacity and the introduction of QoS guarantees in the network. Traffic Engineering in a Complete OSS Off-line traffic engineering solutions can be used as a basis for a set of value-added applications for IP service providers. An IP OSS is generally broken down into three major functional areas: service provisioning and activation, service assurance, and customer care and billing. Traffic engineering is implemented in the areas of service provisioning and service assurance. For service provisioning, traffic engineering plays an important role in the bandwidth brokerage function. It can calculate whether the network can meet a certain traffic demand with a promised QoS. As such, it is an integral part of customer-oriented service activation. In service assurance, traffic engineering is used in a selftriggering mode. A performance management tool predicts when the network will be congested. When certain links in the network reach congestion, the performance management tool triggers the traffic-engineering tool to reoptimize and reconfigure the MPLS network. Traffic engineering is a key component in a complete IP OSS solution. It is a means to control the network s performance and, therefore, a way to achieve predictable services on the network. ALCATEL 7

12 Future Applications for Off-line Traffic Engineering Link with Layer 2 and Layer 1 Traffic Engineering A clear migration towards network architectures, where the IP layer runs directly on top of the optical layer, is perceived. Evolutions in optical transmission networks show that in the near future optical paths (lambdas) can be dynamically set up or broken down. This will enable traffic engineering to dynamically change the physical links between routers and as such introduce a new degree of freedom. Although this degree of freedom is quite new for the physical layer, the link layer (e.g. ATM) can already provide dynamic setup or teardown of links (virtual paths/virtual connections). Typically, the calculation of an optimal lambda or an optimal VP/VC will be done by traffic engineering algorithms introduced in the respective layers of the OSI stack. However, traffic engineering tools that run on Layer 3 have to take into account the new degrees of freedom introduced by extra capabilities on the underlying layers. For MPLS networks, traffic engineering will have to take into account that part of the network s topology that can be changed by reconfiguring the links on Layer 2, or on the optical layer. This will enable even more optimal sets of LSPs. Capacity Analyses and Disaster Risk Assessment with What-If Scenarios What-if scenarios give operators the ability to simulate a network s behavior if a network error occurs (i.e., a router outage occurs or a link goes down). A primary class of what-if scenarios uses the off-line traffic engineering tool to recalculate the network s optimized configuration, taking into account the network s changed configuration. They can be used for network planning purposes. By using this type of scenario, the benefit of an addition or removal of a router or a link can be calculated. It is also possible to see the effect on customers and services when traffic changes. A secondary class of what-if scenarios simulates the network s actual behavior (i.e., MPLS, constraint-based routing, etc.). They can be used for disaster risk assessment. By using this type of scenario, one can calculate which customers or services will be affected when a router goes down or a link breaks. Bandwidth Brokerage for IP Services Essentially, a bandwidth broker is a domain-based network resource management scheme that dynamically binds policies and resource usage situations to the allocation of network resources. Dynamic policy enforcement introduces more sensitivity to available resources and provides a mechanism for dynamic allocation of the resources based on sets of rules. Two factors are used to distinguish different types of bandwidth brokerage: whether the bandwidth is offered from a provider s own domain (intra-domain) or rented from another provider in a wholesale business model (inter-domain), and whether or not negotiation is possible on the type of QoS offered and the price. With intra-domain bandwidth brokerage, the main question is: Can I give a certain customer the bandwidth and QoS requested or not? Do I have to reoptimize the network s configuration for this? This should not only involve bandwidth on IP, but also the transmission layer (ATM, synchronous digital hierarchy [SDH]) and the physical layer (i.e., dense wave division multiplexing [DWDM]) which can be traffic engineered. Future solutions will take all layers into account when optimizing the network s configuration. Inter-domain bandwidth brokerage extends intra-domain bandwidth brokerage with the ability to use bandwidth from peer providers or transmission network providers (i.e., SDH, ATM, DWDM, etc.). Basic traffic engineering algorithms offer all network and resource utilization information needed to take decisions in a bandwidth broker. This information comes for free, as a byproduct of the algorithms calculations. It is, for example, possible to know each link s usage or each queue s state as a result of the traffic engineering calculations, because these metrics are used in the algorithm s cost function. This makes traffic engineering the optimal stepping stone for bandwidth broker functionality. 8 ALCATEL

13 Further Reading 1. ALMA Vision IP white paper, Carl Rijsbrack, Robert Mathonet, Alcatel Telecommunications Review 2Q ALMA Vision IP Traffic Engineering, Product Description, 3. ALMA Vision IP Traffic Engineering, Product Leaflet, 4. ALMA Vision IP, Product Description, 5. Multi-Objective Traffic Engineering of IP Networks Using Label Switched Paths, S. Van den Bosch, F. Poppe, H. De Neve and G. Petit, accepted for presentation at Networks 2000, September 2000, Toronto, Canada 6. Choosing the Objectives for Traffic Engineering in IP Backbone Networks based on Quality-of-Service Requirements, S. Van den Bosch, F. Poppe, H. De Neve and G. Petit, submitted to QofIS 2000, September 2000, Berlin, Germany ALCATEL 9

14

15

16 For more information Alcatel and the Alcatel logo are registered trademarks of Alcatel. All other trademarks are the property of their respective owners. Alcatel assumes no responsibility for the accuracy of the information presented, which is subject to change without notice Alcatel. All rights reserved CL TQZCA Ed.01

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

MPLS - A Choice of Signaling Protocol

MPLS - A Choice of Signaling Protocol www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Multi-Protocol Label Switching To Support Quality of Service Needs

Multi-Protocol Label Switching To Support Quality of Service Needs Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD

More information

MPLS. Packet switching vs. circuit switching Virtual circuits

MPLS. Packet switching vs. circuit switching Virtual circuits MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Project Report on Traffic Engineering and QoS with MPLS and its applications

Project Report on Traffic Engineering and QoS with MPLS and its applications Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to

More information

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Performance Evaluation of Voice Traffic over MPLS Network with TE and QoS Implementation

Performance Evaluation of Voice Traffic over MPLS Network with TE and QoS Implementation Master Thesis Electrical Engineering November 2011 Performance Evaluation of Voice Traffic over MPLS Network with TE and QoS Implementation Jeevan Kharel Deepak Adhikari School of Computing Blekinge Institute

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Migrating to MPLS Technology and Applications

Migrating to MPLS Technology and Applications Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

Lesson 13: MPLS Networks

Lesson 13: MPLS Networks Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000 Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

OPNET simulation of voice over MPLS With Considering Traffic Engineering

OPNET simulation of voice over MPLS With Considering Traffic Engineering Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing

More information

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Quality of Service for VoIP

Quality of Service for VoIP Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Industry s First QoS- Enhanced MPLS TE Solution

Industry s First QoS- Enhanced MPLS TE Solution Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, asayeed@cisco.com Contact Info: Kim Gibbons, kgibbons@cisco.com,, 408-525 525-4909 1 Agenda MPLS Traffic Engineering

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

Traffic Engineering Management Concepts

Traffic Engineering Management Concepts 3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page

More information

MPLS Multiprotocol Label Switching

MPLS Multiprotocol Label Switching MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465

More information

MPLS Traffic Engineering in ISP Network

MPLS Traffic Engineering in ISP Network MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications

More information

MPLS Architecture for evaluating end-to-end delivery

MPLS Architecture for evaluating end-to-end delivery International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

VoIP versus VoMPLS Performance Evaluation

VoIP versus VoMPLS Performance Evaluation www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,

More information

RSVP- A Fault Tolerant Mechanism in MPLS Networks

RSVP- A Fault Tolerant Mechanism in MPLS Networks RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data

More information

Evolution of QoS routing in the Internet

Evolution of QoS routing in the Internet Evolution of QoS routing in the Internet Olivier Bonaventure Dept. Computing Science and Engineering Université catholique de Louvain http://www.info.ucl.ac.be/people/obo June 4th, 2004 Page 1 Agenda Routing

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Service Assurance Tools

Service Assurance Tools Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Designing Reliable IP/MPLS Core Transport Networks

Designing Reliable IP/MPLS Core Transport Networks Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture

More information

Traffic Engineering for the New Public Network

Traffic Engineering for the New Public Network Traffic Engineering for the New Public Network Chuck Semeria Marketing Engineer Juniper Networks January 25, 1999 Contents Introduction 2 Traffic Engineering 2 Applications for Traffic Engineering 3 Looking

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification

Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification Multiprotocol Label Switching Architecture & LDP Introduction MPLS Basics LDP Procedures LDP Specification 1 MPLS&LDP->Introduction Conventional network forwarding Each router analyzes the coming packet

More information

A Wheeling and Steering based route reconstruction approach in congested MPLS network

A Wheeling and Steering based route reconstruction approach in congested MPLS network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7959-7965 A Wheeling and Steering based route reconstruction approach in congested

More information

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE) 1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Performance Evaluation for VOIP over IP and MPLS

Performance Evaluation for VOIP over IP and MPLS World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Internet Protocol (IP)/Intelligent Network (IN) Integration

Internet Protocol (IP)/Intelligent Network (IN) Integration Internet Protocol (IP)/Intelligent Network (IN) Integration Definition The convergence of the public switched telephone network (PSTN) and Internet protocol (IP) data networks promises exciting opportunities

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information