End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network

Size: px
Start display at page:

Download "End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network"

Transcription

1 End-To-End QoS Architecture for s: MPLS Deployment in a Backbone Network Haeryong Lee, Jeongyeon Hwang, Byungryong Kang, Kyoungpyo Jun Electronics and Telecommunications Research Institute hrlee@etri.r& Abstract s enable companies to connect geographically dispersed oflces and remote workers via secure links to the private company network, using the public Internet as a backbone. Specially, service in the broadband data communication network is very important and necessary to take in users who want to specify group communication. mechanisms are needed which work over existing deployed backbones, and which can also be migrated to new backbones like MPLS. MPLS is the latest step in the evolution of multilayer switching in the Internet In this paper, we are trying to clarify how MPLS can be applied to creating s. For that, we researched an architectural model for building s in a MPLS domain. The proposed model takes advantage of both network layer peering and packet switching, and link layer circuit and per-stream switching. It comes with a design scheme and an implementation procedure for service in MPLS system. And then we describe MPLS based service procedures. And, we describe MPLS schemes that must be accommodated with existing network backbones and also provide for a full range of QoS characteristics. 1. Introduction A Virtual Private Network simulates the operation of a private wide are network(wan) over the public Internet. Especially, enterprises need a more affordable, scalable way to meet the demands of a growing community of remote users and to manage branch office connectivity. They need to be able to accommodate the pace and unpredictability of business by linking customers and partners into extranets on an ad-hoc basis. And they need to be able to provide all of this access to networked resources, including legacy systems and enterprise protocols, without compromising security. represent a tremendous market opportunity for service providers. The essence of a is its use of the next-generation public network infrastructure as the WAN backbone to supplement or replace costly long-distance leased or dial-up links in a private network. s will be deployed over a wide variety of public networks, not only the Internet but also service provider IP, frame relay and ATM networks. For the subscriber, sending private traffic via these next-generation public networks is not much different than sending internal correspondence by mail, or faxing sensitive documents through the PSTN. Information sent simply arrives at the appropriate destination, securely and reliably. Businesses should not need to, not do they want to, take responsibility for the intervening infrastructure. MPLS is an IETF standards based approach built on the efforts of the various proprietary multilayer switching solutions. schemes must be accommodated with existing network backbones and also provide for a full range of QoS characteristics. MPLS will allow packet based networks to provide a range of QoS service capabilities to IP flows, matching, for example, the current capabilities of ATM networks. When these mechanisms are applied to tunnels, this will allow for guaranteed QoS s, for which there is significant demand. This is more of a usage of MPLS rather than an intrinsic part of MPLS, however, as the same goal can be achieved by deploying s over other backbone technologies, such as ATM, which already provide a range of QoS capabilities. There is a spectrum of solutions from very MPLSspecific mechanisms on the one hand, to developing generic mechanisms which can be applied across different network infrastructures, including MPLS, on the other. The former seems quite restrictive since practical mechanisms must apply to existing networks, none of which currently support MPLS. In this paper, we define the general IP based services and explain the current status of IP s. It describes and diagrams some of the most popular IP applications. It also explains the underlying tunneling technology, including system components and industry standards for tunneling and tunnel based /00 $ EEE 479

2 security. On the second part, we researched an architectural model for building s in a MPLS domain. The proposed model takes advantage of both network layer peering and packet switching, and link layer circuit and per-stream switching. It comes with a design scheme and an implementation procedure for service in MPLS system. And then we describe MPLS based service procedures. Finally, we describe MPLS schemes that must be accommodated with existing network backbones and the usage of MPLS traffic engineering mechanisms to deliver QoS guarantees to tunnels for backbone networks. 2. Current Status of IP s In this section, we define the general IP based services and explain the current status of IP s. It describes some of the most concerned issues of IP s. It also explains the underlying tunneling technology, including system components and industry standards for tunneling and tunnel based security. IP s over the Internet are good business for everyone. But, the problem with IP s is implemented over the Internet is that it is difficult to guarantee QoS. Three major problems can be found with the existing IP technologies. The first one is the explosion in the number of virtual circuits, the lack of effective control over QoS, and the lack of security due to Internet's own characteristics. 2.1 Scalability Issue A large could easily support hundreds of thousands of such relationships, and the Internet could support many millions. This quickly creates the need for so many virtual circuits that the process becomes untenable. A network with N points of service would create N(N- 1)/2 virtual circuits if each service-point-to-partner flow were mapped to a virtual circuit. In a network with 10 service points, this is manageable for 45 virtual circuits. In a network with 200 service points(a medium-sized ), about 20,000 virtual circuits would be required. 2.2 QoS Issue Another problem is QoS on the network. IP applications today have no direct mechanism to specify QoS. A number of activities, including work on the Resource Reservation Protocol(RSVP) have been directed at adding QoS selectivity, but many carriers and users are uncomfortable with individually selectable QoS, given that it would probably require special billing for high QoS level selected. Policy management rules to establish QoS based on users, server, or relationships ye possible, but users question the size of the administration task. A more manageable strategy would be simply assign a QoS level to an entire, and this is how frame relay or ATM networks would work. Doing this with IP services is difficult, however, because the routing protocols like OSPF used to build routing tables do not exchange QoS information or information about how much of a given node's or trunk's resources are already used up. Without knowledge of the commitments already made by the network, it is impossible to route IP flows along paths where resources, and therefore QoS, could be guaranteed. 2.3 Security Issue Security is one of the most common concerns with Internet s, especially s that rely on the public Internet for transport. Unlike private line, frame relay, and ATM-based services, IP networks do not assign "dedicated" physical or logical pipes to particular applications, protocols, users, or locations. The latest IETF solution to address Internet security is called IPSec(1nternet Protocol Security). This secure tunneling protocol was originally introduced as part of the IPv6 protocol, but has been adapted for use in today's IPv4 networks (like the Internet). IPSec defines a modular framework for providing strong, robust security for traffic on IP networks. This framework defines mechanisms for establishing, managing, and terminating secure communication channels, or "tunnels," using well-defined procedures for authenticating and encrypting IP packets. The encrypted message will look like useless random characters to the hacker. IPSec also provides replay protection. The network drops a packet if it identifies the packet as being identical to one previously received. IPSec supports DES (Data Encryption Standard) and 3DES (Triple DES) encryption schemes. These encryption schemes use secret encoding and decoding keys that are difficult to decode. IKE (Internet Key Exchange) is an important extension to the most recent draft of the IPSec recommendation. IKE simplifies the process of assigning keys to devices that need to communicate via encrypted connections. Users should require their vendor to implement the most recent set of drafts. IPSec and IKE are widely supported and are considered to be the standards for security. 480

3 3. MPLS based s In this section we describe an architecture to solve both the virtual circuit multiplication problem and the QoS problem. Before QoS capable architectures are described, we briefly introduces MPLS which is likely to play an important role in QoS based s. MPLS is a fast emerging Internet Task Force standard for scaling the Internet. MPLS brings the same kind of label swapping based forwarding used in frame relay and ATM to the handling of IP traffic, regardless of the layer 2 technology. I- I MPLS A I- I Figure 1. Integrated MPLS service network MPLS performs this task by attaching labels to IP packets. The labels enable routers and switches to forward traffic based on information in the labels instead of having to inspect the various fields deep within each and every packet. The less time devices spend inspecting traffic, the more time they have to forward it. One of the main concerns is the s ability to deliver QoS to the network. In order to establish a two tunnel paths must be created, first is that of the connection and second is that of encryption of the information that will be transported. Unfortunately during the development of the second encryption tunnel, all information including the IP and MAC addresses are encrypted thus erasing any hope one may have to control QoS. Another MPLS benefit is the technology's ability to simplify the topologies of larger router networks. MPLS helps to flatten hierarchical and hop intensive routed infrastructures. It makes them easier to monitor, manage and operate. Users can also control QoS and general traffic flow more precisely to avoid congested, constrained or disabled links. Although MPLS does come across as being a great technological break through the truth is not everyone needs it. Only private or very large WANs with complex mesh topology must engineer traffic. Smaller networks such as point-to-point and star network configurations already have distinct routes. 3.1 Guaranteed Performance Performance is a broad term, which has a number of meanings relating to networking and networking equipment. With s, there are two principal concerns. First, due to the best-effort nature of IP networks, users want assurances that they can depend on their WANs to deliver reliable and predictable service. Second, because performing security functions such as encryption and key exchange are processor intensive, users want to know that security gear will not slow network connections and create bottlenecks. MPLS makes use of the guaranteed QoS features of ATM, which underlies many ISP networks. MPLS adds a special label to layer two traffic that describes how it should be switched through the underlying network. Many vendors are already shipping both diffserv and MPLS implementations, and a number of service providers are testing or even piloting these offerings. By combining diffserv and MPLS, IP providers will be able to offer users granular Service Level Agreements with assured performance. 4. MPLS Service procedure MPLS allows ISPs to offer services by providing a simple, flexible, and powerful tunneling mechanism. An ISP can deploy a by provisioning a set of LSPs to provide connectivity among the different sites in the. Each sites then advertises to the ISP a set of prefixes that are reachable within the local site. Site V Site V Site V2 Site V1 - Site V1 Tunnel... Site VZ Tunnel Figure 2. sites connection interface Site V1 Site V2 48 1

4 The ISP s routing system distributes this information by piggybacking labels in the routing protocol updates or by using a label distribution protocol. Identifiers allow a single routing system to support multiple s whose internal address spaces overlap with each other. Finally, each ingress LSR places traffic LSPs based on a combination of a packet s destination address and membership information. Supporting s with MPLS requires three basic functions. 4.1 Discovery of Membership The members in MPLS domain should be connected to a provider network and those members need to find out what other members there are in the. Members can join and leave the service network and those changes need to be known by all remaining members. Mechanisms to support discovery include manual configuration, client-server approaches, and notification provided by the provider network. The discovery of membership in one must not allow members of other s to be discovered. That is, discovery within a is kept separate from discovery in another in the same provider network. 4.2 Exchanging Reachability Information Members in the same must be exchange reachability information about their network layer addresses. These addresses may be in a different space from the provider network and may in fact overlap with other address spaces. Control traffic could include topology information specific to that. As with the discovery mechanism, the exchange of reachability and control traffic must be kept separate between s sharing the same provider network. 4.3 Carrying Data Traffics This mechanism enables data traffic to be carried between users within a. Data traffic from different s is kept separate. The discovery mechanism involves local configuration (id) and then propagation in LDP, OSPF, or BGP. The reachability exchange is also accomplished by LDP, OSPF, or BGP. Topology information is not propagated between member subnets over the MPLS network providing the service. Data traffic is carried on LSPs which are created to connect all members of the same. Reachability and control traffic are exchanged over LSPs which are setup between members in the same. Data traffic is carried on LSPs which are created to connect all members of the same. pc Workstation Site V1 Router ec+ Interface pc Pc Internet Interface Workstation Site V2 Figure 3. MPLS facilitates the deployment of s 5. MPLS Deployment in a Backbone Network Emerging technologies, such as MPLS (Multiprotocol Label Switching), promise to deliver improved IP network traffic engineering tools that will enable providers to more easily measure, monitor, and meet different service level requirements across their backbones. MPLS takes advantage of the intelligence in routers and the speed of switches, providing a way to map IP packets into connection-oriented transports like ATM and frame relay in a reasonably efficient and scalable way. It also provides for definition of a QoS within the MPLS header. MPLS uses layer three routing information to establish forwarding (routing) tables and to allocate resources. It uses layer two (frame relay, ATM, and other layer two protocols) to then switch or forward the information over the appropriate path. A special MPLS label, attached to an IP packet, is then associated with a particular entry in the forwarding table and specifies the next hop. Flows that have common routing and service level requirements typically take the same path through the network. The benefit is a consistent level of service for flows that are of higher priority. MPLS does require the deployment of LSRs (Label Switching Routers) in the network, which will impact the rate at which MPLSbased solutions are deployed, but implementations are becoming available now. MPLS is currently targeted for deployment in the backbone first. The emerging generation of MPLS-enabled devices that live within the network core and the service provider POP will operate in conjunction with devices 482

5 that live at the customer premises. In this scenario, the customer premises device could use technologies such as CBQ to classify traffic and DiffServRoS to mark it in a way that the service provider network understands the service level requirement. The network edge will then map the CPE-specified DiffServ/ToS service level specification into the QoS field of the MPLS header, providing a way to protect the service level definition on an end-to-end basis. LSR Even though the standards are still in draft form, MPLS has become a technology that is key to the future of larger-scale IP networks. MPLS has applications in the deployment of IP networks across ATM-based wide area networks, in providing traffic engineering capabilities to packet-based networks, in providing IP QoS capabilities, and in aiding the deployment of IPbased s. At the time of this writing, IETF is making progress with defining a standard for building core services in a service provider s MPLS backbone suitable for transporting labeled packets over the backbone. In the meantime, we have discussed the architectural and design considerations for a QoS capable MPLS service architecture. References ;NM-MPLS~/ MPLS!Network ij Network LSR 0 Labeled Packet (path I) i; Labeled Packet (path 2) ;/ unlabeled Packet (path 2);;..._......,,,......,,... :i... : Figure 4. MPLS deployment in a backbone The progress these QoS-related standards have made will allow service providers to extend SLAs from customer site to customer site and eventually across cooperative service provider boundaries. This crossnetwork SLA capability allows the building of s using multiple carriers as necessary, an option not available with most frame relay offerings. Clearly, there is a great deal of effort being devoted to ensuring IP performance across ISP backbones. Aside from the protocols described here, additional initiatives include IntServ (Integrated Services) and Constraint Based Routing. The benefits of assured performance and QoS mechanisms are obvious: they allow people to dictate the amount of bandwidth dedicated to each application and provide applications with predictable performance characteristics. Together, these technologies enable services with performance characteristics rivaling those of frame relay solutions but with the added benefit of being standards-based. Using these tools, one can implement s with confidence and begin migrating applications to converged IP networks. Service providers can use these tools to create unique services with guaranteed performance parameters. [I] [2] E. Rosen and Y.Rekhter, BGP/MPLS s, RFC 2547, Mar (Cisco) [3] Paul Ferguson and Geoff Huston, What is, The Internet Protocol Journal(Cisco and Telstra) [4] Cisco 10s Release 12.0(7)T, MPLS Virtu1 Private Network Enhancements (Cisc0) [5] Stefan0 Previdi, Introduction to MPLS-BGP-, Proceeding of MPLS Forum 2000, Apr. 2OOO(Cisco) [6] txt [7] Rene Rigault, MPLS- Solution Developed by France Telecom, Proceeding of MPLS Forum 2000, Apr. 2000(FT) [8] Robert Pulley, Implementing s Using MPLS, Proceeding of MPLS Forum 2000, Apr. 2000(Harris & Jeffries) [9] Juan Manuel Ramos, Building Scaleable s in Metropolitan Areas, Proceeding of MPLS Forum 2000, Apr. 2000(Bell Nexxia) [lo]alan Talor, Pratical Deployment of Provider Based IP- s With MPLS, Proceeding of MPLS Forum 2000, Apr. 2000(Juniper) [ 111Karthik Muthukrishnan and Andrew malis, Core MPLS IP Architecture, IETF Draft, Jul (Lucent) 5. Conclusion 483

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Welcome to Today s Seminar!

Welcome to Today s Seminar! Welcome to Today s Seminar! Welcome to this exciting, informative session on Internet VPNs and the QoS Difference Keynote speakers Eric Zines, Sr Market Analyst, TeleChoice Ashley Stephenson, Chairman,

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Introducción n a MPLS y MPLS VPN MPLS VPN

Introducción n a MPLS y MPLS VPN MPLS VPN Introducción n a MPLS y MPLS VPN nemunoz@cisco.com Nelson Muñoz Presentation_ID 200, Cisco Systems, Inc. Agenda Introducción Que es una VPN? IP+ATM Conceptos básicos de MPLS MPLS VPN QoS en MPLS Ventajas

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Cisco Configuring Basic MPLS Using OSPF

Cisco Configuring Basic MPLS Using OSPF Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs : Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Service Assurance Tools

Service Assurance Tools Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

A Review Paper on MPLS VPN Architecture

A Review Paper on MPLS VPN Architecture 32 A Review Paper on MPLS VPN Architecture Tejender Singh Rawat 1, Manoj Kumar Pandey 2, *Upendra Kumar 3 1, 2, 3 - Assistant Professor, ECE Department, ASET, Amity University Haryana Abstract A Virtual

More information

POINT OF VIEW. MPLS A Strategic Technology. Executive Summary

POINT OF VIEW. MPLS A Strategic Technology. Executive Summary MPLS A Strategic Technology Executive Summary Multiprotocol Label Switching (MPLS) is a comprehensive data networking technology that provides many benefits to enterprises and carriers. AT&T has had many

More information

MPLS VPN basics. E-Guide

MPLS VPN basics. E-Guide E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While

More information

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

MPLS Virtual Private Networks

MPLS Virtual Private Networks MPLS Virtual Private Networks A review of the implementation options for MPLS VPNs including the ongoing standardization work in the IETF MPLS Working Group Paul Brittain, pjb@metaswitch.com Adrian Farrel,

More information

MPLS - A Choice of Signaling Protocol

MPLS - A Choice of Signaling Protocol www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Lesson 13: MPLS Networks

Lesson 13: MPLS Networks Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

MPLS Multiprotocol Label Switching

MPLS Multiprotocol Label Switching MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465

More information

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

The Essential Guide to Deploying MPLS for Enterprise Networks

The Essential Guide to Deploying MPLS for Enterprise Networks White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN

More information

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis) MEE09:44 BLEKINGE INSTITUTE OF TECHNOLOGY School of Engineering Department of Telecommunication Systems Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Quality of Service for VoIP

Quality of Service for VoIP Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper MONITORING SERVICE DELIVERY IN AN MPLS ENVIRONMENT A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee highbandwidth capacity

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

How to cut communications costs by replacing leased lines and VPNs with MPLS

How to cut communications costs by replacing leased lines and VPNs with MPLS in association with How to cut communications costs by replacing leased lines and VPNs with MPLS March 09 End of the line for leased lines and IPSec VPNs as MPLS comes of age Contents Executive summary

More information

MPLS VPN Security Best Practice Guidelines

MPLS VPN Security Best Practice Guidelines Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. mmorrow@cisco.com mbehring@cisco.com

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Rolling Out New SSL VPN Service

Rolling Out New SSL VPN Service Rolling Out New SSL VPN Service Introduction Typically, service providers offer infrastructure services, such as site-to-site connectivity and data center hosting. In addition to this, they are always

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

QoS Performance Evaluation in BGP/MPLS VPN

QoS Performance Evaluation in BGP/MPLS VPN 1 QoS Performance Evaluation in BGP/MPLS VPN M. C. Castro, N. A. Nassif and W. C. Borelli 1 Abstract-- The recent exponential growth of the Internet has encouraged more applications, users and services

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

MPLS VPNs with DiffServ A QoS Performance study

MPLS VPNs with DiffServ A QoS Performance study Technical report, IDE1104, February 2011 MPLS VPNs with DiffServ A QoS Performance study Master s Thesis in Computer Network Engineering Azhar Shabbir Khan Bilal Afzal School of Information Science, Computer

More information

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh adrian@wshlab2.ee.kuas.edu.tw, gary@hpds.ee.ncku.edu.tw,

More information

Monitoring Service Delivery in an MPLS Environment

Monitoring Service Delivery in an MPLS Environment Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Industry s First QoS- Enhanced MPLS TE Solution

Industry s First QoS- Enhanced MPLS TE Solution Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, asayeed@cisco.com Contact Info: Kim Gibbons, kgibbons@cisco.com,, 408-525 525-4909 1 Agenda MPLS Traffic Engineering

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information