Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
|
|
|
- Piers Dickerson
- 10 years ago
- Views:
Transcription
1 Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks
2 Agenda 2
3 Why Load Sharing Need more bandwidth Utilize investment in existing infrastructure Ability to add bandwidth in small increments Cost-effectively add bandwidth Increased protection End to End protection with diverse paths 1+N link protection Avoid idling of backup paths Want to upgrade to next bandwidth level Transport carrier not offering higher bandwidth links 100GbE not available yet 3
4 Must Scale Beyond 10-G Ethernet, NOW R2 R5 R1 R4 R7 R3 R6 Ever increasing demand for bandwidth in backbones, transit links, Internet peering points, data centers, 100 Gigabit Ethernet is still ~18-24 months away OC-768 POS for many providers is an unaffordable alternative Equal Cost Multi-Path (ECMP) with nx10ge Link Aggregation Groups (LAG) is a far more affordable way of scaling capacity 4
5 Factors affecting Load Sharing Protocols: Determine multiple paths for ECMP Routing Protocols: IGP, BGP Provide path diversity Link Aggregation: Offer multiple links for load-sharing Link Aggregation/bundling/trunks Provide link diversity Data Forwarding: Decision on how packets are loadshared Load Balancing Algorithm Provide efficient utilization Fields in the packet used for load balancing Ability to tune to various traffic types 5
6 Factors affecting Load Sharing Additional factors for MPLS Protocols: Determine multiple paths for ECMP MPLS Protocols: LDP, RSVP-TE Provide LSP path diversity MPLS payload mapping: Assign MPLS services to LSPs BGP/MPLS-VPN & IPv4/v6 mapping to LSPs PW mapping to LSPs Provides per service/customer load balancing 6
7 Methods to boost capacity
8 Routing Protocols ECMP Routing Protocols determine multiple equal cost paths to a destination IGP (ISIS/OSPF) ECMP: Affects paths taken by IP traffic Affects paths taken by MPLS LSPs LDP paths follow IGP topology RSVP-TE LSPs follow IGP and IGP-TE topologies BGP ECMP: Affects paths taken by IP traffic Affects paths taken by IP & IP-VPN traffic in MPLS networks Multiple equal cost BGP next-hops reachable by diverse LSPs Multiple LSP paths to a BGP next-hop 8
9 Routing Protocols ECMP Considerations Number of ECMP paths per prefix supported by a router More paths give better path diversity Support of ECMP with link aggregation Very common that each path can contain LAG groups LAG bandwidth changes should optionally be automatically reflected in Layer 3 interface metrics allowing routing protocols to choose better paths Does the router support even distribution over any number of paths? For better utilization of network resources, must support even distribution for any number of paths (2, 3, 4, 5, 6,..) 9
10 MPLS Signaling Protocols ECMP MPLS signaling allows multiple LSPs to the same destination RSVP-TE: Selects a path for a LSP from multiple equal cost paths that satisfy the LSP constraints, as determined through CSPF Typical criteria used: Hops: Pick the path with least number of hops Less probability of failure Least-fill: Pick the path with highest available bandwidth Even spread of traffic Most-fill: Pick the path with lowest available bandwidth Leave room for higher bandwidth LSPs LDP: Allows a prefix to be reachable through multiple equal cost label paths 10
11 IP Mapping to LSPs: For IPv4/v6 Routing and BGP/MPLS-VPNs Pick from equal cost paths to routers Y & Z Router X BGP advertisement from Router Y LSP C LSP B LSP A Router Y Network N Router Z BGP advertisement from Router Z Typical mapping criteria used: Assign a prefix to single LSP Better predictability Map prefixes within a VRF to single LSP Better operator control Load-share on per flow basis Better traffic distribution 11
12 PW Mapping to LSPs: For VPWS and VPLS Pick from equal cost LSPs A & B PE1 PE2 Local Circuit PW Local Circuit Typical mapping criteria used: Bind PW to least used LSP (LSP with lowest number of PWs) Good distribution of traffic Bind PW to LSP with most available bandwidth or same class of service Useful for services with dedicated bandwidth requirements Explicitly bind PW to LSP Better operator control PW traffic split across multiple LSPs Better distribution of traffic based on flows 12
13 Link Aggregation/Bundling A very popular method of bundling multiple physical links between 2 devices Used on both local side and network side CE PE PE Typically, higher layer protocols unaware of the link bundling Doesn t increase routing overhead as opposed to ECMP 13
14 Link Aggregation Considerations IEEE LAG (LACP) support Dynamic configuration Increased availability Static Link Aggregation Groups (LAG) support No need for control protocol Works in multi-vendor scenario LAG capacity Number of links in a LAG More the links, higher the bandwidth of the LAG Number of LAG groups 14
15 Link Aggregation Considerations The path to 100Gbps - Today LAG must support bundling of multiple 10GE links to reach 100Gbps Large number of links in a LAG is the way to scale network capacity until 100GE arrives Bundling of 10GE links is compatible with current optical infrastructure LAG should scale beyond 100Gbps to 200 and 300Gbps Already, 100Gbps is not sufficient in certain networks 100GE is still ~24 months away Bundling with 10GE links is the way to scale beyond 100Gbps 15
16 Methods for efficient utilization
17 Load-Sharing in the Forwarding Plane 2 common schemes to load-share traffic over equal cost paths/links Packet based Flow based 17
18 Packet based Forwarding Each packet in turn is sent on the next link Pkt 4 Pkt 3 Pkt 2 Pkt 1 Pkt 3 Pkt 1 Pkt 4 Pkt 2 Perfect load balancing Potential packet reordering issues Possible increase in latency and jitter for some flows 18
19 Flow based Forwarding Identifies packets as flows Based on packet content such as IP header Keeps flows on the same path Maintains packet ordering Flow A Flow B Flow B Flow A Pkt 4 Pkt 3 Pkt 2 Pkt 1 Flow A Pkt 4 Flow A Pkt 1 Flow B Flow B Pkt 3 Pkt 2 Hashing is one of the most popular load sharing scheme for flow based forwarding 19
20 Load Sharing for L3 Flows (1) IPv4 & IPv6 Flows based on Source IP & Destination IP addresses Works in most scenarios Issue: Traffic between 2 hosts gets relegated to one path Can lead to over-utilization of one path Source IP Address Destination IP Address All traffic between Host A and Host B takes the same path Packet Fields Inspected IM Telnet HTTP FTP Pkt Pkt Pkt Pkt Host A Host B 20
21 Load Sharing for L3 Flows (2) IPv4 & IPv6 Flows based on L2, L3 and L4 information Better traffic distribution for applications between 2 hosts Source MAC Address Destination MAC Address VLAN-Id Source IP Address Destination IP Address IP Protocol / IPv6 next hdr Source TCP/UDP Port Destination TCP/UDP Port Packet Fields Inspected HTTP Pkt FTP Pkt Traffic between Host A and Host B now utilizes different paths IM Telnet Pkt Pkt Host A Host B 21
22 Load Sharing for L3 Flows (3) Layer 4 usage considerations Fragmentation Issue: If payload is fragmented in IP packets, only the first IP packet carries the L4 information which may lead to packet ordering issues Solution: Set TCP segment size lower than the IP MTU to avoid fragmentation Load balance fragmented packets using L3 information only Load balance non-fragmented packets using L3 & L4 information 22
23 Use Case 1: Load Sharing in a IP network IPv4 Throughput Test routes advertised routes advertised routes advertised Router-1 Router-2 IXIA-1 IXIA-2 32 unbundled 1GE links = 32 Routed Interfaces Transmit 64 Bytes 98% line rate 32-1GE ports Link Aggregation Group = 1 Routed Interface Packets load balanced across 32-port LAG 32 unbundled 1GE links = 32 Routed Interfaces Ixia receives packets across 32 links Random Distribution 127,000 Source IP addr. 127,000 Destination IP addr. Monitor Throughput on IXIA-2 23
24 Use Case 1: Load Sharing in a IP network IPv4 Throughput Test Results Virtually no packet loss Load Sharing can result in almost line rate throughput (for any random traffic distribution) Tx stream from Ixia-1 port 1 Other 31 streams transmitting at same rate Rx streams on Ixia-2 from port 1 to 32 24
25 Load Sharing for L2 flows (1) Flows based on Layer 2 information in packet However, IP packets between 2 routers will always take the same path Source MAC Address Destination MAC Address Vlan-Id, Inner Vlan-Id Etype Layer 2 Packet Fields Inspected IM Pkt Telnet Pkt HTTP Pkt FTP Pkt IP Traffic between Router X and Router Y will take the same path since MAC addresses in the packets will be of the routers themselves Router X Router Y Host A Host B 25
26 Load Sharing for L2 flows (2) Consideration for IP packets Determine IPv4/v6 packets in L2 flows for better distribution: Flows based on Layer2/3/4 information for IPv4/v6 packets Flows based on Layer 2 information for other packets Source MAC Address Destination MAC Address Vlan-Id, Inner Vlan-Id Etype Layer 2 Packet Fields Inspected HTTP Pkt FTP Pkt IP Traffic between Router X and Router Y now distributed over different paths Host A IPv4/v6 Packet Fields Inspected Router X IM Pkt Telnet Pkt Router Y Source MAC Address Destination MAC Address VLAN-Id Source IP Address Destination IP Address IP Protocol / IPv6 next hdr Source TCP/UDP Port Destination TCP/UDP Port 26 Host B
27 Load Sharing on MPLS PE router Ingress & Egress PE L3VPN endpoint LSP VPWS endpoint VPLS endpoint Ingress PE Transit LSR Egress PE At Ingress PE (packets entering a MPLS LSP): Can load share across multiple LSPs and multiple links in a LAG Apply load sharing principles of L2 & L3 flows At Egress PE (packets exiting a MPLS LSP): Can load share per LSP/VC label: High usage PWs/VPN labels will over-utilize one path Per flow: Better distribution of traffic Using LSP/VC label and load sharing principles of L2 & L3 flows 27
28 Load Sharing on MPLS LSRs Packet Speculation Transit LSRs (and PHP nodes) have no information on packet payload Originating LER load balances using L2/L3/L4 hashing How will Transit LSR load-share over a LAG using Flows? Terminating LSR load balances using LSP/VC label/l2/l3/l4 hashing LSP Transit LSR speculates on the packet type Checks first nibble after bottommost label If 4/6, speculates on packet as IPv4/IPv6 Else (optionally) speculates on packet as Ethernet Can now load-share using LSP Label/VC label/l2/l3/l4 headers 28
29 Load Balancing Algorithm Considerations for flow based forwarding A good load balancing algorithm is essential for efficiently utilizing the increased capacity of LAG/ECMP paths Must Distribute Traffic Evenly For example, a good algorithm needs to ensure that effective capacity of a 32-port 10GE LAG should be close to 320Gbps Other Considerations: Number of fields in packet header that can be used for load balancing More the fields, better the distribution Number of hash buckets More hash buckets result in better distribution Minimal correlation of ECMP with LAG Correlation will lead to over-utilization of some paths/links Can treat each packet type differently For example, L2 & L3 flows have to be treated differently 29
30 Use Case 2: Load Sharing across a 32-port LAG Group IPv4 Traffic Distribution Test 100,000 routes advertised 100,000 routes advertised 100,000 routes advertised Router-1 Router-2 IXIA-1 IXIA-2 One 1GE link = 1 Routed Interface 32-1GE ports Link Aggregation Group = 1 Routed Interface One 1GE link = 1 Routed Interface Transmit 64 Bytes 1Gbps Packets load balanced across 32-port LAG Ixia receives packets on 1GE link Random Distribution 127,000 Source IP addr. 16,645,890 Destination IP addr. Monitor Traffic Distribution on 32-port LAG on Router-1 30
31 Use Case 2: Load Sharing across a 32-port LAG Group IPv4 Traffic Distribution Test Results Number of transmitted packets per port Very small difference between packet rates across links Traffic distributed evenly across 32-port LAG group 31
32 Hash based forwarding issues and solutions: Polarization Effect In a multi-stage network, similar routers pick the same path for flows with identical hash Leads to over-utilization of some parts of the network Flows A & B have the same hash In this example, each router picks the first link for flows with same hash Flow A Flow B Packets to Network X Network X 32
33 Hash based forwarding issues and solutions: Basic Hash Diversification (Neutralizes Polarization Effect) Each router uses a unique-id per router in hash calculations Alternatively, hashing using Source and Destination MACs may give comparable results in most scenarios Similar routers now pick different links However, flows are still together on same links In this example, each router doesn t pick the first link for flows with same hash, thus achieving link diversity but not flow diversity Flow A Flow B Packets to Network X Network X Flows A & B have the same hash 33
34 Hash based forwarding issues and solutions: Advanced Hash Diversification (Neutralizes Polarization Effect) Routers in each stage of the network run a different variant of the hash algorithm and neutralize polarization effect Flows can now be distributed In this example, each router may pick a different link for flows with same hash, thus achieving both link diversity and flow diversity Flow A Flow B Flow C Packets to Network X Network X Router X Flows A, B & C have the same hash on Router X but different hash on other routers 34
35 Summary Load-Sharing is a cost-effective technique to improve network utilization Works over multiple paths and links Multiple methods to boost capacity at various layers Can effectively increase throughput beyond the current limits of physical link capacity Flow based forwarding offers many advantages for efficient utilization of the increased capacity Watch out for polarization effects and neutralize them Not a one size fits all approach Choose optimal schemes based on traffic types and operator policy 35
36 Thank You!
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks [email protected] 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007. Sanjay Khanna Foundry Networks skhanna@foundrynet.
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007 Sanjay Khanna Foundry Networks [email protected] Agenda Why we need Load-Sharing Methods to boost capacity Trunks/Link
Steve Worrall Systems Engineer. [email protected]
Steve Worrall Systems Engineer [email protected] Agenda 100GbE Load sharing/link aggregation Foundry Direct Routing 2 100 Gigabit Ethernet 3 Current Status PAR approved, 802.3ba task force set up
100 GIGABIT ETHERNET TECHNOLOGY OVERVIEW & OUTLOOK. Joerg Ammon <[email protected]> Netnod spring meeting 2012
100 GIGABIT ETHERNET TECHNOLOGY OVERVIEW & OUTLOOK Joerg Ammon Netnod spring meeting 2012 Agenda Industry trends 100GE technology Outlook 2 Traffic growth NetNod:'Yearly' graph (1
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
Transition to IPv6 in Service Providers
Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA [email protected] UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012
MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES Greg Hankins RIPE 68 RIPE 68 2014/05/12 AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
MPLS. A Tutorial. Paresh Khatri. [email protected]
MPLS A Tutorial Paresh Khatri [email protected] Agenda 1. MPLS overview and LSP types 2. Distribution Protocol (LDP) 3. Questions Introduction Paresh Khatri ([email protected])
OPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Understanding MPLS Hashing
Understanding MPLS Hashing And how it affects your brand new equipment Jeff Wheeler [email protected] Job Snijders [email protected] NANOG57 Jeff Wheeler Who are we? Consultant design, implement,
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Design of MPLS networks VPN and TE with testing its resiliency and reliability
MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare
Troubleshooting Bundles and Load Balancing
CHAPTER 5 This chapter explains the procedures for troubleshooting link bundles and load balancing on the Cisco ASR 9000 Aggregation Services Router. A link bundle is a group of ports that are bundled
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Routed VPLS using BGP draft-sajassi-l2vpn-rvpls-bgp-00.txt
Routed VPLS using BGP draft-sajassi-l2vpn-rvpls-bgp-00.txt IETF 77, Anaheim, CA March 2010 Authors: Ali Sajassi, Samer Salam, Keyur Patel Requirements 1. Load balancing on L2/L3/L4 flows 2. Flow-based
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen nlayer Communications, Inc. 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Testing Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned. Richard A Steenbergen <[email protected]>
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used only link cost to select a best
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
Juniper Networks NorthStar Controller
Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
l.cittadini, m.cola, g.di battista
MPLS VPN l.cittadini, m.cola, g.di battista motivations customer s problem a customer (e.g., private company, public administration, etc.) has several geographically distributed sites and would like to
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
Transforming Evolved Programmable Networks
Transforming Evolved Programmable Networks CKN: New Capabilities in the Evolved Programmable Network (EPN) Greg Nehib, Senior Marketing Manager, Cisco Systems Bertrand Duvivier, Principal Engineer, Cisco
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
DD2490 p4 2011. Routing and MPLS/IP. Olof Hagsand KTH CSC
DD2490 p4 2011 Routing and MPLS/IP Olof Hagsand KTH CSC 1 Literature Lecture slides and lecture notes (on web) Reference JunOS Cookbook: Chapter 14 2 Background MPLS - Multiprotocol Label Switching Originally
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Overlay Networks and Tunneling Reading: 4.5, 9.4
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos461/
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans
Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Contents Overview...3 1. VPLS Traffic CoS Test...3 2. VPLS VSI Isolation Test...5 3. VPLS MAC Address Purge Test...7
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL
SERVI PROVIDER Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL An overview of Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL) and Brocade solutions for deploying
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
MPLS for Dummies. Richard A Steenbergen <[email protected]> nlayer Communications, Inc.
MPLS for Dummies Richard A Steenbergen nlayer Communications, Inc. 1 Purpose of This Tutorial There are lot of IP people out there who still don t like MPLS. Many of the concepts are completely
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
Multiprotocol Label Switching Load Balancing
Multiprotocol Label Switching Load Balancing First Published: July 2013 The Cisco ME 3800 and ME 3600 switches support IPv4 and IPv6 load balancing at the LER and LSR. Effective with Cisco IOS Release
Content CHAPTER 1 MPLS OVERVIEW... 1-1
Content Content CHAPTER 1 MPLS OVERVIEW... 1-1 1.1 MPLS OVERVIEW... 1-1 1.1.1 MPLS Introduction... 1-1 1.1.2 MPLS Network Introduction... 1-5 1.1.3 Introduction to MPLS and Routing Protocols... 1-6 1.1.4
APNIC elearning: Introduction to MPLS
2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security DNS/DNSSEC
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA [email protected]
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing
WHITE PAPER Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing www.ixiacom.com 915-1838-01 Rev. C, January 2014 2 Table of Contents Abstract... 4 Introduction... 4 What is MPLS?...
Network Architecture Validated designs utilizing MikroTik in the Data Center
1-855-MIKROTIK Network Architecture Validated designs utilizing MikroTik in the Data Center P R E S E N T E D B Y: K E V I N M Y E R S, N E T W O R K A R C H I T E C T / M A N AG I N G PA R T NER I P A
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
