Multicast transmission in VPN Networks (mvpn)

Size: px
Start display at page:

Download "Multicast transmission in VPN Networks (mvpn)"

Transcription

1 Report of Internship Netzahualcoyotl ORNELAS Period: 04/04/2005 to 30/09/2005 GIP RENATER Multicast transmission in VPN Networks (mvpn) Master 2 Networks, Course Research Cycle

2 Thanks I would like to thank mainly and in particular to my two tutors Bernard Tuy and Jérôme Durand who help me and I had their support all the time during this internship for the good development of it, they were always in a good disposition to give me their advices and guide me by the right way, it allowed me to advance in the project and with whom I shared a good environment of ambiance and their friendship. In the same manner, I would like to thank Mr. Dany Vandromme (Director GIP Renater) to accept me to do this internship in the GIP Renater and that accepted the budget for this internship. I thank to the SIPA s team, with whom I had the opportunity of working and share of their good humor in an enjoyable and convivial atmosphere of work. Thanks to the administrative personal, the SSO department, the CERT of Renater whom share their experience in the work and in general to the good ambiance in the localities of Renater. To the University of Paris 6, Pierre et Marie Curie, for the formation within the framework of the Master Degree in Networks. Last but not least, to my parents Ines María García Beltran and Victor Manuel Ornelas Lopez whom support me all the time from Mexico and that encouraged to me to follow ahead in this important project to conclude my studies. Thanks to all of you. 2

3 Introduction: General context of the Internship RENATER IETF [2] L2vpn-WG L3vpn-WG PIM-WG mvpn State of the art What is mvpn? [23] Why mvpn? mvpn requirements [28] Propositions for mvpn Tunneling among CE s [27] Multicast Domain by Cisco Systems [28] Multicast VPN and VPLS by Juniper Networks [25] Solution by Yasukawa by NTT Corporation [26] Multicast in VPLS by Juniper Networks [24] Based I-D 2547bis by Cisco Systems and Juniper Networks [29] Test of an mvpn implementation Study of the mvpn testbed Implementation of mvpn in the Renater s testbed Test of the functionality of mvpn Experience feedback Discussions and prospects Study for the implementation of MVPN in RENATER s Network Coexistence between existing multicast services with mvpn Conclusions Annexes PN vs. VPN Types of VPNs Tunneling GRE (Generic Routing Encapsulation) PPTP (Point to Point Tunneling Protocol) P2MP (Point to Multipoint Protocol) Multicast Tunnel Bibliography Web pages RFCs Internet Drafts Books Glossary of terms Equipment s configuration

4 Introduction: The Multicast is a service in which it s permitted an efficient distribution of the information between a source and several receivers in a network. The multicast feature allows a single stream of information to be transmitted from a source device, regardless of the amounts of receivers. The routers automatically replicate a single copy of the stream to each interface where multicast receivers can be reached. The ISPs decided to offer VPN solutions to their customers. That makes it possible to reduce the costs of connectivity since several VPNs can share the same physical connections. The VPN (Virtual Private Network) use the telecommunication s network for transporting the communications of private information. As a brief definition, we can say that a VPN is a network connectivity across a shared infrastructure. Nowadays, the VPN customers want to have multicast services, but the standardization is at this moment a topic where the entities like the IETF work to have a stable solution. I m a student of the Master Degree in Networks in the University of Paris 6, this master includes one period of 6 months of internship that I have done in the GIP Renater [1]. The goal of this internship is to make a state of the art over all the new protocols and their implementations of what it is agreed to call multicast VPN (mvpn), to specify their field of application, their advantages and disadvantages for an internet service provider. A testbed is realized to show these aspects and the maturity of the existing implementations. One seeks in addition to check the relevance of the deployment of this type of solution in an operational network as the one of Renater. The coexistence with the services existing will also be the subject of tests on the testbed. This work should follow closely the effort of standardization in progress to the IETF on the techniques related to mvpn (l2vpn, l3vpn, working group in particular) and to propositions of new standards. Lastly, a detailed attention is paid to the deployment of these techniques in MPLS networks. This report presents the work done during the 6 months of the internship in Renater the topic mvpn (multicast VPN). The report is divided in 4 parts, the first one shows the context of this internship, the second shows the state of the art of mvpn, the third part shows the deployment of multicast VPN in the testbed of Renater, the fourth part shows my comments about the experience acquired and personal critics. Finally I give a conclusion of this work and the annexes. 4

5 1. General context of the Internship This internship is taken place at the GIP Renater, that is composed environ of 30 people. Renater is the National Research & Education Network in France (RENATER) Réseau National de Télécommunications pour la Technologie l Enseignement et la Recherche [1.1] in Paris. I joined the SIPA team "Services IP Avancés" (Advanced IP Services). Bernard Tuy is the manager of the team. It s composed as well by Jerome Durand, Simon Muyal, Emilie Camisard, Marcolino Pires. The goal of this team is to look for new technology, check their maturity and check that could be applied in the Network of Renater. The work that I did in the team of SIPA is concerning the topic of «mvpn» (multicast VPN). This is a new topic for me; nevertheless, I have already knowledge in multicast IPv4 and IPv6 that help me to the understanding of the topic RENATER Nowadays, more than 600 French establishments having an activity in the fields of Research, Technology, Teaching and the Culture are connected to RENATER. This network enables them to communicate among the research entities. The Renater s Network is composed of a national backbone and international connections with high bandwidth. RENATER is also present in the departments and overseas dominions. The third generation of the network is called RENATER-3. which uses optical technologies of multiplexing (DWDM), and the speed in the backbone is of 2.5 Gbits/s. The architecture of RENATER-3 is shown in figure

6 Fig Global Architecture of RENATER-3 In Île-de-France a specific architecture was developed that corresponds at the potential of this area in educational establishments higher and research. Fig Fig Architecture of Renater 3 in Île de France 6

7 Connections whit other R&E networks in the world. RENATER is inter-connected to 10 Gbit/s with the other European and American networks of research - including the Internet 2 (network ABILENE) - via the GEANT European network which is, at the world level, the greatest structure of this type. A connection with 155 Mbit/s leading in Korea ensures the communication with the networks of the research of the zone Asia-Pacific. Connections with the Internet In France the communication with the Internet is carried out by the node of exchange SFINX (link of 3*1 Gbit/s with more than 80 operators) that is managed by RENATER. The communication with the Internet in the rest of the world is ensured by the connection of RENATER to the backbone to 5 Gbit/s in the backbone OpenTransit France Telecom. Among the services, RENATER offers: the protocols IPv4 and IPv6 (new generation of the Internet), IPv4 multicast, it s used mainly for the videoconferences, the management of the quality of service (QoS), and the security which is ensured by the CERT-RENATER. To produce these services the GIP-RENATER develops technologies such as metrology and maintains relations followed with its users. The department of SIPA has a testbed where the new technologies are tested for checking their maturity. As an example, there are currently tests of IPv6 multicast and MPLS. When I joined to RENATER, after the first month, it was inaugurated the fourth generation of the Network that is called RENATER 4. Main changes are: Reinforced grid of the network for a better availability (suppression of pendular links) Introduction of a more "intelligent" routing to optimize the use of the network ("traffic engineering") and to reduce time convergence in the case of breakdown or of maintenance in a connection Infrastructure of connections of the type "black fibres" to transport large projects, and thus deployment of equipment WDM (DWDM) in the "shelters" of the operators and in the POP (Points of Presence). The services already available in RENATER-3 stay in the new version of the backbone: IPv4 & IPv6 unicast IPv4 Multicast VPN services : MPLS-VPN of level 2 and 3, service of EoMPLS The pilot services in RENATER-3 will be deployed as services in RENATER-4: IPv6 Multicast (M6BONE Network [4]) Classes de services (CoS) LBE (Less than Best Effort) BE (Best Effort) BBE (Better than Best Effort) IP Premium 7

8 Class supervision/control (reserved) Fig Architecture of RENATER-3 vs Architecture of RENATER-4 Fig Architecture of RENATER-4 8

9 1.2. IETF [2] The IETF is the Internet Engineering Task Force that is composed of designers, operators, and people that do the research concerning the Internet architecture. This task Force is open to any interested individual. This IETF has different topics that are discussed in different working groups that are of the interest of the community of the internet, these topics are discussed mainly in mailing lists and in meetings that are leading 3 times per year. I realized that there were some working groups that have a direct relation to the works related to mvpn. Those groups are L2vpn, L3vpn and the PIM group where I describe the interest of my part to join this working group in the sections 1.2.1, 1.2.2, and L2vpn-WG This working group (wg) has as a mission to specify solutions to be supported in a providerprovisioned L2 VPN. In this working group there is some approach of the topic of multicast VPN, but at this time, the propositions are starting to be discussed in this working group. I follow the discussions in this working group, as the Internet Drafts that are submitted are discussed in the mailing list L3vpn-WG The L3vpn working group has the mission of specifying solutions to support in a providerprovisioned L3vpn. The topics that are discussed at this time are based on the RFC 2547, as the aspects of IPv6 (Internet Protocol version 6) and multicast in VPNs. The topic of multicast VPN is mainly discussed in this working group, so I have been more interested in the discussions of this working group PIM-WG The Protocol Independent Multicast (PIM) working group has been created to discuss and promote the PIM v2 Sparse Mode (SM) ands Dense Mode (DM) as scalable and efficient multicast routing protocol. I follow the discussion of this working group because there are aspects like make modifications to PIM to use it for the implementation of mvpn. 9

10 2. mvpn State of the art In order to know the works that have started concerning mvpn, I decided to make a state of the art to knowk all the solutions proposed and their status, so we can know the maturity of every solution that could be implemented in a production network. 2.1 What is mvpn? [23] mvpn makes reference to multicast VPN, it indicates a VPN in which, the VPN client have the multicast service. Now, with the works that have been done, so for the new definition is that a mvpn is a solution that allows to perform the multicast service in a Layer 3 provisioned VPN. 2.2 Why mvpn? Nowadays, the customers for multicast services, for example for: - Videoconference - E-Learning - Applications based in Multicast As the customers are connected through VPN s, ISP s need to offer multicast in VPN s, so they have to offer a solution that solves the necessity of the client in an efficient way. The applicability of mvpn is to provide a solution that allows an entity to have the service of multicast in a private way, for those entities that are connected through a VPN, according to the architecture that is described in the IETF Internet Draft BGP/MPLS IP VPNs [32]. In this way, the customer doesn t do the work of providing the multicast service; it s the ISP that is going to be the responsible. 10

11 2.3 mvpn requirements [28] These requirements are based in the IETF draft draft-ietf-l3vpn-ppvpn-mcast-reqts-01. The requirements shows what is needed to implement multicast VPN in L3 provider networks. Those requirements are oriented to the end user and the Service Provider (SP). In order to provide the multicast private service in an efficient way, new mechanisms must be implemented to support it. The solution implemented has to be compatible with the Internet Draft BGP/MPLS IP VPNs [32], in this draft, the multicast is not taken into account. The solution should ensure that the multicast traffic of the client is not lost nor duplicated, and concerning the architecture, the security aspect has to be the same as for the unicast and the multicast. The multicast private service doesn t need to have extra features in CE (Customer Edge), as the unicast solution. Another important aspect is the scalability; the solution must to take into account the number of equipment in the core of the Service Provider and the number of equipments in the Customer side. In a summary way, this draft has aspects as : RP engineering, Carrier s Carrier model in a scalable and efficient way, Security, QoS. I think that the IPv6 aspects must be taken into account, address range, and protocols required, that is going to help to the solutions that are proposed, there is a proposition concerning IPv6, at this time, only the unicast is taken into account according with the Internet Draft RFC 2547bis that is the ietf draft BGP-MPLS IP VPN extension for IPv6 VPN [31]. This draft is based on RFC 4031 [21], where the ISP only takes into account layer 3 VPN s. 11

12 2.4 Propositions for mvpn Tunneling among CE s [27] This solution is referenced in the IETF draft draft-rosen-vpn-mcast-03.txt that proposes a solution for providing the multicast service. In the soultion proposed, it s the customer that makes all the work for the implementation, the ISP only forwards the unicast traffic of the customer, and the ISP doesn t have any control of it. The Internet Drat draft-ietf-l3vpn-rfc2547bis-03 (BGP/MPLS IP VPNs) [32] describes a method for providing a VPN service. It specifies the protocols and procedures which must be implemented in order for a Service Provider to provide a unicast VPN. This solution extends that specification by describing the protocols and procedures which a Service Provider must implement in order to support multicast traffic in a VPN, assuming that PIM (Protocol Independent Multicast) is the multicast routing protocol used within the VPN, and the SP network can provide PIM as well. This solution that was taken is to make tunnels between the CE (Customer Edge), as shown on Figure This solution was abandoned because it s not scalable for the following reasons: - Point to point tunnels removes the benefits of multicast - The traffic has to be replicated by the CE router for each remote CE router - The customer has to manage the private multicast service - Configuration complexity and overhead for the customer - Service Provider cannot control the service as it is hidden in tunnels Fig Unicast Tunnel to provide the private multicast service 12

13 2.4.2 Multicast Domain by Cisco Systems [28] This mvpn solution is based on the Internet draft (draft-rosen-vpn-mcast-08.txt). In the previous solution 2.4.1, is the customer that looks for having a solution to have the private multicast service. In this solution of Multicast Domain, the Service Provider is in charge to offer the solution to the customer. One of the problems that the Service Provider realized is that, if they would like to offer the native private multicast service to their customers, there will be an amount of PIM-Instances and multicast distribution information [(S,G), (*,G) states] to be maintained in the Core of the network. This solution is based in an architecture that is in the Internet Draft RFC-2547bis [32], but in this draft, the multicast service is not taken into account. The solution of multicast domain consist in establishing tunnels among the PE s, using as the tunnel destination a multicast address to connect all the PE routers that have a site that belongs to the same VPN. To achieve this, it s necessary to enable PIM in the core of the Network, so it can extend the multicast service to another customers that are connect between PE routers. This type of tunnels are considered as Point to Multipoint Protocol Note that the multicast address is assigned by the Service Provider and there is a different 1 multicast group for every Multicast Domain (MD). In the network of the ISP is created what is called Default Multicast Distribution Tree (Default-MDT). It s formed by P and PE routers of the Service Provider that are used to construct the path to bypass the control messages, this tree is constructed by PIM-SM mechanisms. This Default-MDT is showed in the figure Fig Default-MDT in the Service Provider 1 A Multicast Domain is a set of VRFs instances that are multicast enable. 13

14 The Default-MDT is always used to send multicast control traffic between PE routers in a multicast domain. The amount of the states in the core of the service provider depends in the number of VPNs that it connects, this reduces considerably the states, because there wont be a Default-MDT for every multicast group flow of the customer. When the Default-MDT is created, there is a multicast interface that is created to bypass the multicast traffic of the customer to the receivers, this is called Multicast Tunnel. It is then thorugh the Multicast Tunnel (MT) where the traffic is bypassed through this tunnel s showed in the figure Fig Multicast Tunnel between PEs to bypass the customer multicast traffic. In fact, there is a MTI (Multicast Tunnel Interface) that is the way to access to the multicast domain. This MTI appears in the mvrf (multicast vpn routing and forwarding) as an interface called Tunnelx, where x is the number of the tunnel. We can say that the MTI is a gateway that connects the customer side (mvrf) to the service provider side (MDT). There s need of one MTI to access a multicast domain and forward the customer traffic. The MTI is created dinamically upon the configuration of the Default-MDT. 14

15 At the beginning it seams a good solution, because the customers can extend the private multicast services to another site of the same VPN. But what they realized after is that there were PE routers that receive the multicast traffic where there were no receivers. This is a problem because it s not optimal for the Serivce Provider, due that, it spends a lot of CPU processing and bandwidth, this is showed in the figure where the customer of the site A1 of the VPN blue that is connected thorough PE-1 sends to different sites of the same VPN blue. In this case only PE-3 has a receivers that are the site A3 and A4. The customer A2 has no receivers, but it receives the multicast traffic anyway. Fig PE-2 spends CPU processing and bandwidth for no receivers in A-2 To solves the waste of CPU processing and bandwidth, there is another MDT type that is called Data-MDT. This Data-MDT is used to bypass high traffic from one source to only PEs that have receivers for that flow. The Data-MDT is created dinamically when the multicast traffic of the customer exceeds a bandwidth threshold. For every VRf there s need of a rank of addresses to be allocated to the Data-MDT. This Data-MDT work as follow: First, the PE that connnect the customer that is the source realizes that the flow exceeds a treshold determined by the Service Provider. The source PE is going to send a new join message called MDT join TLV. This messge is going to be sent through the Default-MDT with a User Datagram Protocol (UDP) type-length-vector (TLV), the MDT TLV join describes with another multicast address that is going to be the address that describes the source and group (S,G) that is actually working in the VRF instance and the new data MDT group address used in the provider space. 15

16 All the PE routers of that multicast group are going to receive the MDT join TLV because it is sended through the Default-MDT. The PE with receivers are the only routers that can join to the new group that is sent by the new MDT by the source PE. The PE routers that don t have receivers ignore the MDT TLV join. When the PE routers have joined to the new group, the remote PEs send a PIM join message to be added in the new group of the Service Provider. The source PE encapsule the customer multicast traffic using the new Data-MDT after 3 seconds, this time allow to the PE routers to switch to the new group. The creation of Data-MDTs depends on the monitoring of the multicast source data rate. At this time, this internet draft has no new modifications because the work has stopped because there is an approach that is explained in section

17 2.4.3 Multicast VPN and VPLS by Juniper Networks [25] This draft proposes a solution to overcome the limitations of existing multicast VPN and multicast VPLS solutions. It gives procedures to enhance the scalability of multicast for BGP/MPLS VPNs. The solution proposes the utilisation of the protocol BGP to discover and maintaining PIM neighbors in a given mvpn. This solutions aims to overcome the limitations of IP multicast in VPLS with existing solutions. The limitations of current VPLS proposals for VPLS Multicast are that; It doesn t allow using P-Multicast Trees for VPLS multicast data traffic. The Pes with VPLS sites that do not have receivers in a given multicast customer receive traffic for that flow. There s no use of PIM peering between CE s and PEs and there s no PIM peering amon Pes. At this time, this internet draft has expired and there are no updates. 17

18 2.4.4 Solution by Yasukawa by NTT Corporation [26] In this solution proposes procedures to establish optimal virtual private IP Multicast in a Service Provider network in dividing the multicast of the customer in several regions. The solution propose to minimize the PIM neighbor maintenance to the remote PEs. As a result, the solution can construct IP multicast distribution trees that have optimal topologies for IP multicast distribution and avoid using multiple multicast and unicast distribution tunnels in the service provider core during the customer's tree transition phase. This simple multicast tunnel operation mechanism within a core provides easy and flexible IP multicast VPN service operation for the service provider. And, because the solution can terminate each customer's Join/Prune message at PEs, the solution can minimize PIM neighbor maintenance over remote PEs. This enhances the scalability performance of multicast VPN service network. This document also describes a P2MP TE LSP based multicast tunnel mechanism which could enhance TE capability and reliability of IP multicast VPNs. This work is stopped because, the authors has joined the work that are doing in the Internet Draft RFC-2547bis [25]. 18

19 2.4.5 Multicast in VPLS by Juniper Networks [24] The Virtual Private LAN Services (VPLS) allows service providers to deliver VPN services based on Ethernet with the same level of support and reliability as existing services such as Frame Relay and ATM. This draft describes procedures for VPLS (Virtual Private LAN Service) multicast that utilize multicast trees in the sevice provider (SP) network. One such multicast tree can be shared between multiple VPLS instances. Procedures for propagating multicast control information, learned from local VPLS sites, to remote VPLS sites, are described. These procedures do not require IGMP-PIM snooping on the SP backbone links. This is a reasonable model when the bandwidth of the multicast traffic is low or/and the number of replications performed on an average on each outgoing interface for a particular customer VPLS multicast packet is small. If this is not the case it is desirable to utilize multicast trees in the SP core to transmit VPLS multicast packets. Note that unicast packets that are flooded to each of the egress PEs, before the ingress PE performs learning for those unicast packets, will still use ingress replication. 19

20 2.4.6 Based I-D 2547bis by Cisco Systems and Juniper Networks [29] This draft presents a new model that involves the enterprises Cisco Systems and Juniper Networks, the thing is that the solutions proposed have different topologies, it means that Juniper proposes use BGP to the construction of MDT and Cisco propose use PIM mechanisms to achieve this. What it happened is that they have proposed a solution where there are new terms. They have called this P-MSI that means Provider Multicast Service Interface which there are three types: The first one allow the communication of all with all, the second one allows the communication from all to some, and the last one can transmit from some to some, where it provides a major options that the models related, note that this is a work that has not been implemented yet. Several types of tunnels can be used (MPLS, GRE, etc) for the encapsulation. To my point of view, there are some aspects that need to be clarified. 20

21 3. Test of an mvpn implementation In order to test the maturity of mvpn, a testbed is deployed according to the Multicast in MPLS/BGP IP VPNs [28] solution of Eric Rosen described in section This model has been tested in the testbed of RENATER. This model has been chosen because at this time, it s a solution that has certain maturity comparing to the existing propositions that are leaded in the IETF. This solution offers a stable solution that can be implemented by a Service Provider. The idea is to test what is the advantage of multicast VPN comparing with the existent services that Renater already has concerning the multicast service. We are going to check how it works, the level of maturity and how to configure it. 3.1 Study of the mvpn testbed According to the architecture of the Internet Draft <draft-ietf-l3vpn-rfc2547bis-03> BGP/MPLS IP VPNs, we need at least 3 routers to test at the core level of the ISP, these routers are one P router (Provider router), and two PE routers (Provider Edge routers). In addition, we need two routers that work as the CE (Customer Edge routers). There is already a testbed network where the tests of new technologies are done. Some routers of the testbed are M6Bone [4] nodes. I detail the steps in order to configure the mvpn. I divided the implementation in two levels. The first level will be in the core of the ISP, and the second will be at the client level. First level, (ISP s core) : Concerning the ISP level, we need to check how to make the multicast traffic of a source of one VPN arrive to an interested customer in a different site but that belongs to the same VPN. To achieve this, I detail in 5 steps what is needed to configure mvpn at the ISP level as follow: - Configure VRF interfaces in PE : First of all, we need to create the interface to allow the communication between two different sites of the same VPN. We need to identify the name of the VPN with a name, as example blue. This VPN called blue need to be specified in the PEs where it is connected a Customer of the same VPN. So it must be configured in all the PE s of the same VPN. After that, the forwarding for this VPN blue must be configured in the PE routers and in the interface of the PE that connect the CE (Customer Edge). In this case, I have configured a Loopback interface to emulate a CE router to test, because I had some technical problems in the router that was going to function as CE, and because the time, I couldn t fix the problem in that CE router. - Configuration of Multicast in the Core As described in the internet draft of Eric Rosen [28], there s a need to have a protocol that permits to transport the multicast traffic of the customer of the different sites of the same VPN. The way to do it, it s using a PIM mode that could be PIM-SM or PIM-SSM. The enterprise Cisco Systems says that PIM-SSM is easier to be deployed than PIM-SM, because PIM-SSM doesn t need RP configuration. The provider network is a known and stable group of multicast devices. But we have chosen the PIM-SM mode due to his maturity as protocol 21

22 and to test how it works and how the PIM messages are treated. So an RP is implemented in the core of the testbed network. Using PIM-SM v2 it s possible to bypass the control messages and data plane of the clients of the different sites that belongs to the same VPN through what is called Default-MDT that is configured statically in all the PEs with the same multicast address taking into account the P routers of the Service Provider. - Configure the Provider Network for PIM-SM The destination addresses of the tunnels are multicast addresses, they are used to create the multicast distribution trees in the core of the network, we need a protocol that permits to bypass the multicast traffic of the client through the Service Provider backbone, we need a multicast protocol that administrate the trees that are created, so PIM-SMv2 [33] is the solution. - Choose the VPN group addresses used in the Provider Network This is basically to assign the multicast addresses that are used to establish the MDT (Multicast Distribution Tree) in the Service Provider Network. The addresses are chosen from the RFC 2365 (Administratively Scoped IP Multicast) [11]. These addresses were taken because if the ISP provides the multicast service, we need be sure to not re-use the Provider group addresses that are used in the internet multicast. That s why the RFC 2365 [11] is taken. The groups that I have chosen for the creation of the Default-MDT are in /16 IPv4 prefix. - Configuration of Peer BGP. In order to exchange the prefixes of the different sites of the same VPN, it s needed to establish a session called session de ibgp between the PEs. In the case that a PE connects 2 different sites of different VPNs, that has the same prefix, the distinction can be done thanks to the RD (Route Distinguisher). It allows separating and identifying the prefix of every site without send it to an erroneous site. The configurations can be checked in section 6.6. Second level, (Customer) : When we want to integrate the Customer level, there are no big changes to be done in the multicast configuration that the customer already has, due that the ISP makes the work to connect the different sites. I detail in 3 steps for implementing multicast VPN in the customer side: - Enable the multicast routing in the router. - Enable the interfaces PE-CE for sparse-dense mode, which make sure that either auto-rp or bsr messages are received and forwarded allowing the PE to learn the group to rp inside the vpn. - The PIM sparse-dense mode is the multicast routing protocol 22

23 3.2 Implementation of mvpn in the Renater s testbed In order to implement the mvpn, some changes needed to be done in this network. The testbed consists of 5 routers, which are placed as follow: The first equipment will work as PE in the testbed and will be called PE-1 (gsr-6net). The second equipment will work as P in the testbed and will be called gsr-nio. The third equipment will work as PE in the testbed and will be called PE-2 (7200-MCAST). In the three first routers, we have the architecture for the Core of the network, so the other 2 equipments in the testbed work as the Customer Edge (CE). The fourth equipment will work as CE in the testbed and will be called CE-1 (7200-MPLS). The fifth equipment will work as CE in the testbed and will be called CE-2 (FM6BONE). Unfortunately, as I explain in section 3.1, I couldn t test the second level that is the customer tests due to a problem in the router 7200-MPLS that has a problem in the interface ATM. Because the time, I couldn t fix the problem in this router, nevertheless, I did something else. I configured one logical interface of loopback in every PE in the router gsr-6net and the router 7200-MCAST to emulate the interface that acts as a CE. It allows me to exchange the prefixes between the PEs. After a brief description of the routers, the testbed is showed as follows in the fig Fig Testbed network topology for mvpn 23

24 According to the study done in section 3.2, I detail the steps done for the implementation of mvpns. In this testbed, the implementation was divided in two steps. First step is the configuration of the core of the network, taking in account the P and PE routers. The second step is the configuration of the Customers part, which in this case are the CE-1 and CE-2 routers. The links of this testbed are OC-3 ATM (155 Mbps). The configuration of routers is detailed in section 6.6. In this section I describe the steps and procedures that I had to do in order to implement the multicast vpn in the core of the testbed. The router used as an example is the GSR-6NET (PE-1). As shown in figure 3.2.1, I created the sites VPN need in the PEs. A VRF (VPN Routing and Forwarding) must be configured for each VPN. These example VRF blue, Figure 3.2.2, shows how to configure it. Fig Create the vrf blue. The rd is used to distinguish the distinct VPN routes of separate customers who connect to the provider. It has only one purpose: to make IPv4 prefixes globally unique. The 8-byte route distinguisher consists of 3 fields: Type field (2 bytes) determines the lengths of the other two fields, as well as the semantics of the administrator field. Administrator field typically the 4-byte (AS) autonomous system number of the provider. Assigned Number field assigned by the provider. The multicast routing in the router must be configured in the PE routers; this is done as follow in the figure 3.2.3: Fig Configure the multicast routing After the vrf is created and the multicast is available, we configure the logical interfaces where the BGP peers are established between the PEs. PE routers are the only routers that need to be MVPN aware and able to signal to remote PE's information regarding the MVPN. That s way it is fundamental that all PE routers have a BGP relationship with each other. The 24

25 address of this interface is the and the number of the Loop back is 0, in this interface we have to qualify the interface of PIM, to create the MDT s in the core of the network, these steps are showed in figure Fig Create the interface loopback for peerings The source address of the Default-MDT will be the same address used to source the ibgp sessions with the remote PE routers that belong to the same VPN and MVRF. The RPF check on the PE is satisfied when the next hop for the source of the CE data is the BGP neighbor, which is the source of the MDT. After, interface is created; we can specify the RP (Rendez-Vous Point) statically in the router, and an access list to avoid Fig Specify the address of the RP statically The test consists into creating a VPN that I have called VPN "blue. In this VPN, there will be a multicast customer traffic, so we will check how is the creation of the multicast distribution trees, default and data (MDT s), and the manage of VRF s in the PE. Note in this case I just have one vrf that will be the blue one. There were chosen two prefixes to announce in the 2 sites configured in the testbed. In the site 1 the prefix used is /24 and in the site 2, the prefix used is /24. The tests are shown below in section 3.3. In figure 3.2.6, I show the BGP peer for the VPN Blue. 25

26 Fig Configuration of the BGP peering of the VPN blue 3.3 Test of the functionality of mvpn In this section all the tests are shown. First I ll show the tests done in the core of the network and after I ll present the tests for the customers. Note that the configuration of the routers are in section 6.6. In the figure 3.3.1, I show the ibgp peer established among the PE-1 and the PE-2. The AS (Autonomous System) number used is the one of the Renater s testbed The address of PE-1 used to establish the peer is , and the address of PE-2 is The figure was taken from the gsr-6net equipment, as you can see; there is an exchange of prefixes between the PE-1 and the PE-2 in the VPNv4 Unicast address family. To show this information the command sh ip bgp neighbors is used. 26

27 Fig Peering established among the PE-1 and the PE-2 27

28 After the peering is established, I show in the figure the exchange of prefixes of the VPN blue. They are announced by an logical interface, this is done with the command sh ip bgp vpnv4 vrf blue, and in this case the gsr-6net equipment has the prefix of the 2 sites. As in CE were not disponibles, the thing that I did is to configure an interface logic Fig It shows the prefix announced of the PE-2 Now, I describe the tests of the creation of the MDT (Multicast Distribution Tree). In this step the configuration is done statically as shown in section 6.6. I decided to use the multicast address for the creation of the Default-MDT, and the multicast address for the Data MDT. In the figure is displayed the multicast address for the Default-MDT. Fig It shows the multicast address of the Default-MDT When the Default-MDT is configured, there is a Tunnel that is created automatically that is called the Multicast Tunnel MT. The multicast traffic of the customer is going to be transported through the core of the ISP in the tunnel. This interface is showed in the Fig 3.3.4, the number of the interface is assigned automatically. In this case the number of the interface is the number 4. The command to display this interface and the status in a router is sh ip igmp vrf blue interface tunnel 4. 28

29 Fig The multicast tunnel is created automatically As shown in the fig , the PE is going to function like the DR (Designated Router) that is going to send the IGMP and Hellos messages. Fig The PE works as the DR (Designated Router). In order to verify the group of the Default-MDT is running and the status, we can verify with the command sh ip pim rp as showed in the fig Fig Status of the multicast group of the Default-MDT 29

30 In the previous example, we have checked the status for a specific group, but in fact we can check the list of groups that are actives and the time that has been up. In the fig are shown the groups that are in use. We can see in addition of the previous example the address , that is reserved by IANA, this multicast address serves for the cisco-rpdiscovery. Fig Status of the multicast groups of the PE To display the contents of the multicast trees and states, use the command show ip mroute command, it displays the all groups and sources as shown in fig Fig This figure shows the multicast trees and states 30

31 There are new state flags for (*,G) / (S,G) Entries as shown in fig : Z, Multicast Tunnel : Signifies the (*, G) (S, G) entry in the global table is an MDT and local PE has a matching MDT group associated with mvrf. If Z is set, then arriving packets must be decapsulated to reveal customer multicast packet. Y, Joined Data-MDT : Signifies traffic for (S, G) entry in mvrf is received from data- MDT. y, Sending to Data-MDT : Signifies traffic for (S, G) entry in mvrf is transmitted to Data- MDT. 3.4 Experience feedback During the implementation, I have experienced that there are not big requirements concerning the equipment, in the core of the network. We only need a technology that is very well tested as the multicast, in order to transport the multicast traffic of the clients in a private way. The PE is the router that has more activity concerning the process of CPU for the mvpn. When the PE receives traffic where it doesn t have customers to join it, there s a The problem in PE routers is the consummation of CPU, due to the process usefulness of multicast traffic when there are no receivers. There s no need to change anything in the customer network to implement the multicast VPN, which is going to help to the deployment in a network. At this time, there is a draft for requirements in multicast VPN and several drafts propositions concerning multicast VPN at the IETF [2], there s no a solution that is a RFC, but works are still in progress. I think that it should be specified in a clearly way what is a must and what is not in the implementation. 31

32 4. Discussions and prospects 4.1 Study for the implementation of MVPN in RENATER s Network A Multicast-VPN allows an entity to transparently interconnect its private network across the network backbone of a service provider. The use of a Multicast-VPN to interconnect a network in this way does not change the way that network is administered. If we take the solution of Eric Rosen [28], we have to check that in the Renater s Network, there are routers that act as a PE and P at the same time, du that some routers in the core are used to connect other sites, so they have the function of P and PE in the network. There wouldn t be a problem for making the implementation in the Network of Renater, in order to have a scalable multicast solution, the amount of states maintained by the P routers should be proportional to be under control, so this solution at least, the amount of states maintained in the P routers is proportional only to the number of VPNs which run over the backbone, the amount of the states in the P (Provider routers) routers is not sensitive to the number of multicast groups or to the number of multicast transmitters within the VPN. In this solution, the optimality of the multicast routes is reduced to have a good and acceptable scalability. The SP however has control over the tradeoffs between optimal routing and scalability. The mvpn can serve to those entities that are connected through a VPN that internally has the multicast service and that want to extend it to another site, so the entities that Renater connect through a VPN can have the multicast service. There are several aspects that have to keep in mind for a good implementation as the encapsulation that could be IPinIP, GRE, or MPLS, that only works for the transport of the multicast traffic of the client. 32

33 4.2 Coexistence between existing multicast services with mvpn The Network of Renater offers already the multicast service for IPv4. Very soon it will offer multicast IPv6 (January 2006). The goal of this work is to have a vision of what the multicast VPN can offer comparing with the existing services that are already deployed in Renater, as showed in the tests done, we can say that the multicast service in IPv4 in a VPN can be offered, having the coexistence with the multicast services already deployed in Renater. The multicast VPN can serve to the sites connected through a VPN that want to extend this service to other sites. 33

34 5. Conclusions We can conclure this work with good experiences about the multicast VPN, in this work I have done a state of the art of the works related to mvpn, but the works are still in progress, so as showed in the report, the solution that is taken that at this time is the one that present a major level of maturity comparing to the other propositions at the IETF. 34

35 6. Annexes 6.1 PN vs. VPN Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). Leased lines, ranging from ISDN (integrated Services Digital Network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases. In the other hand we have the VPN is a secure network connectivity across a shared infrastructure. The VPN sends data over the network through "tunnels". An academic definition of a VPN is connectivity deployed on a shared infrastructure with the same policies and performance as a private network, with lower total cost of ownership. Fig show the difference of the PN and a VPN Types of VPNs Increasingly challenged to offer much more than just basic connectivity and Internet access, service providers must address key business concerns of today s enterprises to attract and keep customers. VPNs are designed based on one of two architectural options client-initiated or network access server (NAS)-initiated VPNs. 35

36 Client-initiated VPNs: Users establish a tunnel across the Internet service provider (ISP) shared network to the customer network. The customer manages the client software that initiates the tunnel. The main advantage of client-initiated VPNs is that they secure the connection between the client and ISP. However, client-initiated VPNs are not as scalable and are more complex than NAS-initiated VPNs. NAS-initiated VPNs: Users dial in to the ISP NAS, which establishes a tunnel to the private network. Network access server (NAS)-initiated VPNs are more robust than client-initiated VPNs and do not require the client to maintain the tunnel-creating software. NAS-initiated VPNs do not encrypt the connection between the client and the ISP, but this is not a concern for most customers because the Public Switched Telephone Network (PSTN) is much more secure than the Internet. VPNs can also run from a remote client PC or remote office router across the Internet or an IP service provider network to one or more corporate gateway routers. VPNs between a company s offices are a company intranet. VPNs to external business partners are extranets. 6.2 Tunneling Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network GRE (Generic Routing Encapsulation) GRE is a tunneling protocol that was originally developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork PPTP (Point to Point Tunneling Protocol) PPTP is a protocol that allows corporations to extend their own corporate network through private "tunnels" over the public Internet. Effectively, a corporation uses a wide-area network as a single large local area network. A company no longer needs to lease its own lines for wide-area communication but can securely use the public networks. This kind of interconnection is known as a virtual private network (VPN) P2MP (Point to Multipoint Protocol) Point-to-Multipoint (p2mp) is a method of communication between a series of receivers and transmitters to a central location. P2MP typically is set up in three segments to enable frequency re-use. 36

37 6.2.4 Multicast Tunnel The MT (Multicast Tunnel) is a tunnel that is created dynamically and is used to transport multicast traffic of their customer through the backbone of the Service Provider. The Multicast Tunnel is used to create the MDT (Multicast Distribution Tree) in the core of the Service Provider. 6.3 Bibliography Web pages [1] [2] [3] [4] RFCs [5] 2637, PPTP (Point to Point Tunneling Protocol) [6] 2547, BGP/MPLS VPNs [7] 2770, GLOP Addressing in 233/8 [8] 2362, Protocol Independent Multicast-Sparse Mode (PIM-SM) [9] 2283, Multiprotocol Extensions for BGP-4 [10] Multicast Address Dynamic Client Allocation Protocol (MADCAP) [11] 2365, Administratively Scoped IP Multicast [12] 2784, Generic Routing Encapsulation (GRE) [13] 2974, Session Announcement Protocol [14] 2917, A Core MPLS IP VPN Architecture [15] 3031, Multiprotocol Label Switching Architecture [16] 3032, MPLS Label Stack Encoding [17] 3353, Overview of IP Multicast in a (MPLS) Environment [18] 2685, Virtual Private Networks Identifier [19] 3193, Securing L2TP using IPsec [20] 1483, Multiprotocol Encapsulation over ATM Adaptation Layer 5 37

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

Overlay Networks and Tunneling Reading: 4.5, 9.4

Overlay Networks and Tunneling Reading: 4.5, 9.4 Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos461/

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

Table of Contents. Cisco Configuring a Basic MPLS VPN

Table of Contents. Cisco Configuring a Basic MPLS VPN Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

Why Do IPv6 over MPLS?

Why Do IPv6 over MPLS? IPv6 and IPv6 VPN services over MPLS Quality Excellence for Suppliers of Telecommunications TL 9000 Certified Mark Williams miw@juniper.net 1 Why Do IPv6 over MPLS? IPv6 Layer 3 VPN Maybe have connecting

More information

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?

More information

Designing and Developing Scalable IP Networks

Designing and Developing Scalable IP Networks Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii

More information

MPLS Security Considerations

MPLS Security Considerations MPLS Security Considerations Monique J. Morrow, Cisco Systems mmorrow@cisco.com November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Configuring MPLS Hub-and-Spoke Layer 3 VPNs CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice #128 TECHNOLOGY WHITE PAPER Page: 1 of 6 MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice Tim Wu, Riverstone Networks ABSTRACT Since there s been data networking, there s been a debate between switched

More information

Implementing MPLS VPNs over IP Tunnels

Implementing MPLS VPNs over IP Tunnels Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead

More information

What Is a Virtual Private Network?

What Is a Virtual Private Network? C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

MPLS multi-domain services MD-VPN service

MPLS multi-domain services MD-VPN service MPLS multi-domain services MD-VPN service Xavier Jeannin, RENATER Tomasz Szewczyk / PSNC Training and Workshops for advancing NRENs 8-11 Sept 2014 Chisinau, Moldova MPLS brief overview Original purpose:

More information

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Fundamentals Multiprotocol Label Switching MPLS III

Fundamentals Multiprotocol Label Switching MPLS III Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 alastair.johnson@alcatel-lucent.com AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN

More information

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments

More information

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis) MEE09:44 BLEKINGE INSTITUTE OF TECHNOLOGY School of Engineering Department of Telecommunication Systems Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions

More information

S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task

More information

Introduction Inter-AS L3VPN

Introduction Inter-AS L3VPN Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back

More information

IPv6 Deployment Strategies

IPv6 Deployment Strategies Version History Version Number Date Notes 1 10/15/2001 This document was created. 2 11/13/2001 Update to the explanation of NAT along tunnel paths. 3 03/08/2002 Update to the Related Documents section.

More information

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Design of MPLS networks VPN and TE with testing its resiliency and reliability MASARYK UNIVERSITY FACULTY OF INFORMATICS Design of MPLS networks VPN and TE with testing its resiliency and reliability Diploma thesis Michal Aron Brno, spring 2014 ZADANIE DP Declaration I declare

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding Rissal Efendi STMIK PROVISI Semarang, Indonesia ABSTRACT MPLS is a network management

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Methods of interconnecting MPLS Networks

Methods of interconnecting MPLS Networks Methods of interconnecting MPLS Networks NANOG31, May 2005 San Francisco Cable & Wireless Internet Engineering Udo Steinegger What this talk is about General This presentation covers technologies on how

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

A Resilient Path Management for BGP/MPLS VPN

A Resilient Path Management for BGP/MPLS VPN A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private

More information

Internetworking II: VPNs, MPLS, and Traffic Engineering

Internetworking II: VPNs, MPLS, and Traffic Engineering Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual

More information

IPv6 Co-existence & Integration

IPv6 Co-existence & Integration IPv6 Co-existence & Integration Salman Asadullah Technical Advisor, IPv6 Forum Technical Leader, Cisco Systems 1 Key Aspects Reminder IPv6 is NOT a feature. It is about the fundamental IP network layer

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information