Overlay Networks and Tunneling Reading: 4.5, 9.4
|
|
|
- Brendan Briggs
- 10 years ago
- Views:
Transcription
1 Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp:// 1
2 Goals of Today s Lecture MoVvaVons for overlay networks Incremental deployment of new protocols Customized rouvng and forwarding soluvons Overlays for parval deployments 6Bone, Mbone, security, mobility, Resilient Overlay Network (RON) AdapVve rouvng through intermediate node MulV protocol label switching (MPLS) Tunneling at L2.5 2
3 Overlay Networks 3
4 Overlay Networks 4
5 Overlay Networks Focus at the application level 5
6 IP Tunneling to Build Overlay Links IP tunnel is a virtual point to point link Illusion of a direct link between two separated nodes Logical view: A B E F tunnel Physical view: A B E F EncapsulaVon of the packet inside an IP datagram Node B sends a packet to node E containing another packet as the payload 6
7 Tunnels Between End Hosts B Src: A Dest: B A Src: C Dest: B Src: A Dest: B Src: A Dest: C Src: A Dest: B C 7
8 Overlay Networks A logical network built on top of a physical network Overlay links are tunnels through the underlying network Many logical networks may coexist at once Over the same underlying network And providing its own parvcular service Nodes are o`en end hosts AcVng as intermediate nodes that forward traffic Providing a service, such as access to files Who controls the nodes providing service? The party providing the service Distributed collecvon of end users 8
9 Overlays for Incremental Deployment 9
10 Using Overlays to Evolve the Internet Internet needs to evolve IPv6 Security Mobility MulVcast But, global change is hard CoordinaVon with many ASes Flag day to deploy and enable the technology Instead, bener to incrementally deploy And find ways to bridge deployment gaps 10
11 6Bone: Deploying IPv6 over IP4 Logical view: A B E F tunnel IPv6 IPv6 IPv6 IPv6 Physical view: A B C D E F IPv6 IPv6 IPv4 IPv4 IPv6 IPv6 Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F Src:B Dest: E Flow: X Src: A Dest: F Flow: X Src: A Dest: F data data data A-to-B: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4 E-to-F: IPv6 11
12 Secure CommunicaVon Over Insecure Links Encrypt packets at entry and decrypt at exit Eavesdropper cannot snoop the data or determine the real source and desvnavon 12
13 CommunicaVng With Mobile Users A mobile user changes locavons frequently So, the IP address of the machine changes o`en The user wants applicavons to convnue running So, the change in IP address needs to be hidden SoluVon: fixed gateway forwards packets Gateway has a fixed IP address and keeps track of the mobile s address changes gateway 13
14 IP MulVcast MulVcast Delivering the same data to many receivers Avoiding sending the same data many Vmes unicast multicast IP mulvcast Special addressing, forwarding, and rouvng schemes 14
15 MBone: MulVcast Backbone A catch 22 for deploying mulvcast Router vendors wouldn t support IP mulvcast since they weren t sure anyone would use it And, since it didn t exist, nobody was using it Idea: so`ware implemenvng mulvcast protocols And unicast tunnels to traverse non parvcipants 15
16 MulVcast Today Mbone applicavons starvng in early 1990s Primarily video conferencing, but no longer operavonal SVll many challenges to deploying IP mulvcast Security vulnerabilives, business models, ApplicaVon layer mulvcast is more prevalent Tree of servers delivering the content CollecVon of end hosts cooperavng to delivery video Some mulvcast within individual ASes Financial sector: stock Vckers Within campuses or broadband networks: TV shows Backbone networks: IPTV 16
17 Case Study: Resilient Overlay Networks 17
18 RON: Resilient Overlay Networks Premise: by building applicavon overlay network, can increase performance and reliability of rouvng Princeton Yale app-layer router Two-hop (app-level) Berkeley-to-Princeton route Berkeley 18
19 RON Circumvents Policy RestricVons IP rouvng depends on AS rouvng policies But hosts may pick paths that circumvent policies USLEC ISP me PU Patriot My home computer 19
20 RON Adapts to Network CondiVons B A C Start experiencing bad performance Then, start forwarding through intermediate host 20
21 RON Customizes to ApplicaVons B A bulk transfer C VoIP traffic: low latency path Bulk transfer: high bandwidth path 21
22 How Does RON Work? Keeping it small to avoid scaling problems A few friends who want bener service Just for their communicavon with each other E.g., VoIP, gaming, collaboravve work, etc. Send probes between each pair of hosts B A C 22
23 How Does RON Work? Exchange the results of the probes Each host shares results with every other host EssenVally running a link state protocol! So, every host knows the performance properves Forward through intermediate host when needed BB A C 23
24 RON Works in PracVce Faster reacvon to failure RON reacts in a few seconds BGP somevmes takes a few minutes Single hop indirect rouvng No need to go through many intermediate hosts One extra hop circumvents the problems BeNer end to end paths CircumvenVng rouvng policy restricvons SomeVmes the RON paths are actually shorter 24
25 RON Limited to Small Deployments Extra latency through intermediate hops So`ware delays for packet forwarding PropagaVon delay across the access link Overhead on the intermediate node Imposing CPU and I/O load on the host Consuming bandwidth on the access link Overhead for probing the virtual links Bandwidth consumed by frequent probes Trade off between probe overhead and detecvon speed Possibility of causing instability Moving traffic in response to poor performance May lead to congesvon on the new paths 25
26 We saw tunneling on top of IP. What about tunneling below IP? Introducing MulV Protocol Label Switching (MPLS) 26
27 Why Tunnel? Reliability Fast Reroute, Resilient Overlay Networks (Akamai SureRoute) Flexibility Topology, protocol Stability ( path pinning ) E.g., for performance guarantees Security E.g., Virtual Private Networks (VPNs) Bypassing local network engineers Censoring regimes: China, Pakistan, 27
28 MPLS Overview Main idea: Virtual circuit Packets forwarded based only on circuit idenvfier Source 1 Destination Source 2 Router can forward traffic to the same destination on different interfaces/paths. 28
29 MPLS Overview Main idea: Virtual circuit Packets forwarded based only on circuit idenvfier Source 1 Destination Source 2 Router can forward traffic to the same destination on different interfaces/paths. 29
30 Circuit AbstracVon: Label Swapping A 1 2 D Tag Out New A 2 D 3 Label switched paths (LSPs): Paths are named by the label at the path s entry point At each hop, MPLS routers: Use label to determine outgoing interface, new label Thus, push/pop/swap MPLS headers that encapsulate IP Label distribu9on protocol: responsible for disseminavng signalling informavon 30
31 Reconsider security problem 31
32 Layer 3 Virtual Private Networks Private communicavons over a public network A set of sites that are allowed to communicate with each other Defined by a set of administravve policies Determine both connecvvity and QoS among sites Established by VPN customers One way to implement: BGP/MPLS VPN (RFC 2547)
33 Layer 2 vs. Layer 3 VPNs Layer 2 VPNs can carry traffic for many different protocols, whereas Layer 3 is IP only More complicated to provision a Layer 2 VPN Layer 3 VPNs: potenvally more flexibility, fewer configuravon headaches 33
34 Layer 3 BGP/MPLS VPNs VPN A/Site 2 VPN B/Site /16 CE 1 B1 P /16 CE A2 PE 2 CE B2 10.2/16 VPN B/Site 2 CE 2 B1 P 2 BGP to exchange routes PE 1 PE 3 MPLS to forward traffic CE A1 P 3 CE A3 10.3/ /16 CE B3 VPN A/Site 3 VPN A/Site /16 VPN B/Site 3 Isola9on: MulVple logical networks over a single, shared physical infrastructure Tunneling: Keeping routes out of the core 34
35 High Level Overview of OperaVon IP packets arrive at PE PE 2 DesVnaVon IP address is looked up in forwarding table PE 1 PE 3 Datagram sent to customer s network using tunneling (i.e., an MPLS label switched path) 35
36 BGP/MPLS VPN key components Forwarding in the core: MPLS DistribuVng routes between PEs: BGP IsolaVon: Keeping different VPNs from rouvng traffic over one another Constrained distribuvon of rouvng informavon MulVple virtual forwarding tables Unique Addresses: VPN IPv4 extensions RFC 2547: Route DisVnguishers 36
37 Virtual RouVng and Forwarding Separate tables per customer at each router Customer 1 Customer /24 RD: Purple /24 Customer /24 RD: Blue Customer /24 37
38 Forwarding PE and P routers have BGP next hop reachability through the backbone IGP Labels are distributed through LDP (hop by hop) corresponding to BGP Next Hops Two Label Stack is used for packet forwarding Top label indicates Next Hop (interior label) Second label indicates outgoing interface / VRF (exterior label) Corresponds to LSP of BGP next-hop (PE) Corresponds to VRF/ interface at exit Layer 2 Header Label 1 Label 2 IP Datagram 38
39 Forwarding in BGP/MPLS VPNs Step 1: Packet arrives at incoming interface Site VRF determines BGP next hop and Label #2 Label 2 IP Datagram Step 2: BGP next hop lookup, add corresponding LSP (also at site VRF) Label 1 Label 2 IP Datagram 39
40 Layer 3 BGP/MPLS VPNs VPN A/Site 2 VPN B/Site /16 CE 1 B1 P /16 CE A2 PE 2 CE B2 10.2/16 VPN B/Site 2 CE 2 B1 P 2 PE 1 PE 3 CE A1 P 3 CE A3 10.3/ /16 CE B3 VPN A/Site 3 VPN A/Site /16 VPN B/Site 3 BGP to exchange routes MPLS to forward traffic 40
41 Conclusions Overlay networks Tunnels between host computers Build networks on top of the Internet Deploy new protocols and services Provide bener control, flexibility, QoS, isolavon, Underlay tunnels Across routers within AS Build networks below IP route Provide bener control, flexibility, QoS, isolavon, Next Vme Peer to peer applicavons 41
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
Professor Yashar Ganjali Department of Computer Science University of Toronto. [email protected] http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto [email protected] http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Solutions Guide. Ethernet-based Network Virtualization for the Enterprise
Solutions Guide Ethernet-based Network Virtualization for the Enterprise Introduction The concept of Tunnelling Layer 2 and Layer 3 connections across a shared Layer 2 network used to be the preserve of
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
IPv6 Deployment Strategies
Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.
Transition to IPv6 in Service Providers
Transition to IPv6 in Service Providers Jean-Marc Uzé Director Product & Technology, EMEA [email protected] UKNOF14 Workshop Imperial college, London, Sept 11 th, 2009 1 Agenda Planning Transition Transition
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007. Sanjay Khanna Foundry Networks skhanna@foundrynet.
Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN 2007 Sanjay Khanna Foundry Networks [email protected] Agenda Why we need Load-Sharing Methods to boost capacity Trunks/Link
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
MPLS Traffic Engineering - A Choice Of Signaling Protocols
MPLS Traffic Engineering - A Choice Of Signaling Protocols Analysis of the similarities and differences between the two primary MPLS label distribution protocols: RSVP and CR-LDP Paul Brittain, [email protected]
Design of MPLS networks VPN and TE with testing its resiliency and reliability
MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare
Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected]. George Swallow Cisco Systems, Inc. [email protected]
Requirements for End-to-End VoIP Header Compression (draft-ash-e2e-voip-hdr-comp-rqmts-00.txt) End-to-End VoMPLS Header Compression (draft-ash-e2e-vompls-hdr-compress-01.txt) End-to-End VoIP Header Compression
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks rvir@foundrynet.
100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks [email protected] 1 Agenda 2 40GE/100GE Timeline to Standardization The Ethernet Alliance
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
MPLS. Packet switching vs. circuit switching Virtual circuits
MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel
BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building
Provisioning Cable Services
CHAPTER 10 This chapter describes how to provision MPLS VPN cable in IP Solutions Center (ISC). It contains the following sections: Overview of MPLS VPN Cable, page 10-1 in ISC, page 10-5 Creating the
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions
MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs
: Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Internet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
l.cittadini, m.cola, g.di battista
MPLS VPN l.cittadini, m.cola, g.di battista motivations customer s problem a customer (e.g., private company, public administration, etc.) has several geographically distributed sites and would like to
VPN Technologies A Comparison
VPN Technologies A Comparison Matthew Finlayson, [email protected] Jon Harrison, [email protected] Richard Sugarman, [email protected] First issued February 2003 100
Internetworking II: MPLS, Security, and Traffic Engineering
Internetworking II: MPLS, Security, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London Last Fme: Internetworking IP interconnects
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
MPLS VPNs with DiffServ A QoS Performance study
Technical report, IDE1104, February 2011 MPLS VPNs with DiffServ A QoS Performance study Master s Thesis in Computer Network Engineering Azhar Shabbir Khan Bilal Afzal School of Information Science, Computer
Introduction Inter-AS L3VPN
Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back
Traffic Engineering & Network Planning Tool for MPLS Networks
Traffic Engineering & Network Planning Tool for MPLS Networks Dr. Associate Professor, Department of Electrical Engineering Indian Institute of Technology Bombay, Powai, Mumbai 76 Founder & Director, Vegayan
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
Customized BGP Route Selection Using BGP/MPLS VPNs
Customized BGP Route Selection Using BGP/MPLS VPNs Laurent Vanbever Université catholique de Louvain, BE!"#$%&'()"&*%+%$,#-./#+"0&(*% Pierre Francois (UCLouvain, BE), Olivier Bonaventure (UCLouvain, BE)
