MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
|
|
|
- Catherine Wade
- 10 years ago
- Views:
Transcription
1 MPLS Innovations: The Next Phase Technology for Today s Service Providers
2 Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular, MPLS allows service providers to cost-effectively support triple-play services and the diverse traffic types generated by enterprises and residential customers. However, this new capability introduces additional challenges within the metro network. The role of data aggregation at the edge of the metro network becomes increasingly critical for economic and operational reasons, and continues to evolve as a broader array of services is envisioned. Faced with the need to manage diverse traffic types, service providers continually seek the best alternatives for aggregating user flows into the MPLS core as shown in Figure 1. User traffic largely arrives over: Private leased lines (T1/E1, T3/E3) carrying ATM or Frame Relay traffic. Over time, Ethernet will replace these leased lines. Consumer access lines are typically delivered to the network from DSLAMs, which carry broadband traffic over either ATM or Ethernet links. Over time, these links will migrate to IP over Ethernet, and some portion of these links will become PON connections, which are high-bandwidth optical links. Ethernet-Based Ethernet-Based Metro User Flows MPLS Core Aggregated Flows ATM/FR-Ethernet Mixed MPLS Aggregation Switch Running s ATM-Based Figure 1: Evolution and the Importance of Data Aggregation For your convenience, a list of acronyms can be found at the end of this document. 1
3 The Challenges: Complexity and Cost To handle user traffic, service providers are faced with supporting multiple Layer 2 technologies (e.g., ATM, Frame Relay, and Ethernet) simultaneously. Given the need for more bandwidth on access lines, Ethernet will gradually replace most of the existing ATM and Frame Relay infrastructure. Within this complex and dynamic environment, the effectiveness of per-data-flow management and service interworking become vital. Cost management will also remain critical such that the service providers need an aggregation solution that is engineered to provide only the required functionalities. Over-engineered solutions (i.e., those that can route IP packets at the data forwarding layer with extensive IP routing protocol capabilities) have become less attractive and quite costly for broad deployment at the metro edge. The Solution: MPLS Technology Service providers have migrated to a converged IP/MPLS core that is capable of supporting all traffic types, but also want a way to converge traffic at the metro edge. MPLS pseudowires have emerged as the preferred technology to create a uniform interface that can serve this role. Purpose-built MPLS pseudowire switches, with a subset of router features geared for metro aggregation, provide a cost-effective solution for all interface types (e.g., channelized interfaces, PoS, EoS, and Ethernet). MPLS pseudowire technology was originally designed to encapsulate Layer 2 packets into the MPLS packet format for transport over an MPLS-enabled router core network. The LDP allows MPLS pseudowires to be set up over packet networks [1]. Since the MPLS pseudowire encapsulation method retains the characteristics of original Layer 2 circuits, service providers retain the powerful capability to provision, monitor and control user traffic on a per-flow basis at the network edge. Realizing these important implications and their potential, Fujitsu has been working with service providers to establish MPLS pseudowire technology as a common network service layer. To be adopted as a viable service, the original MPLS pseudowire technology needed to be enhanced in the following key areas: Service interworking QoS OAM Traffic protection and redundancy Inter-service provider-network data transport Scalability The combination of the MPLS pseudowire encapsulation and the above enhancements enable service providers to manage and control any type of Layer 2 circuits from the network edge, and are therefore categorized as a Layer 2.5 technology. Today, several service providers have started the process of deploying MPLS pseudowire technology as the means for service convergence. Service providers and vendors alike have been working closely in various standards bodies (in particular, the IETF and MFA Forum) to advocate and define the appropriate Layer 2.5 techniques. 2
4 Access Options MPLS pseudowire termination devices, or MPLS pseudowire packet switches, have the potential to costeffectively aggregate the three predominant types of traffic coming into a metro network as shown in Figure 2: ATM: Many access networks, and in particular wireless backhaul networks, are still deployed using ATM. The MPLS pseudowire switches at the metro edge can map ATM VPIs or VCIs onto MPLS pseudowires, and thereby support traffic moving over the metro network towards the core. In most service provider networks, ATM traffic has been managed in the form of SPVCs using the ATM PNNI protocol. There are a number of methods to carry ATM traffic over an MPLS pseudowire-based network, and the most efficient technique available is defined in a specification included in the MPLS/Frame Relay Alliance Technical Committee draft [2]. This technique requires a gateway to process both PNNI and MPLS pseudowire signaling protocols and map each SPVC into a single MPLS pseudowire. Draft-Swallow allows the service providers to migrate ATM circuits into other forms of circuits (such as Ethernet) transparently. Ethernet: Ethernet is rapidly becoming the predominant access media for end users. Service providers use Ethernet VLANs to separate different types of user traffic. MPLS pseudowire switches can map each Ethernet VLAN to an individual MPLS pseudowire. Because Ethernet VLAN flows and MPLS pseudowires operate on different network layers, OAM represents the major challenge in this area. OAM mapping enables the operators to monitor and diagnosis edge-to-edge user flows for Ethernet. MPLS s: A number of service providers bring end-user traffic into the metro network over MPLS pseudowires. For this configuration, the MPLS pseudowire switch must first terminate the incoming MPLS pseudowires and switch the data packets onto another MPLS pseudowire to traverse the metro network (see Figure 2). Since MPLS pseudowires can be established using various conventions static, PWid (also known as FEC 128), or Generic FEC [1], the MPLS pseudowire switch functions as a proxy to switch MPLS pseudowires directly. This proxy role is known as MPLS pseudowire stitching or switching. All three types of applications involve diverse traffic, and individual data flows will have different priorities and QoS parameters. To ensure that these priorities and QoS requirements are met, MPLS pseudowire switches must be able to protect user flows on a per-mpls pseudowire basis. 3
5 Access s LDP Psuedowire Access Switching Metro ATM Access Draft Swallow OAM Mapping Protection Ethernet Access Working Protection User VLAN Flow ATM PNNI SPVC Figure 2: MPLS Termination and Switching Devices Metro Deployment: MPLS LSR Within the metro network, MPLS pseudowire switches provide a cost-effective alternative to full-function routers. As shown in Figure 3, affordable MPLS pseudowire switches can function as typical MPLS LSRs if designed with the following built-in capabilities: Discover topology by using an IGP such as OSPF or IS-IS Set up LSPs using RSVP-TE or LDP Apply RSVP Fast Reroute [4] and other path protection techniques to ensure that service level requirements are met for each traffic flow Service providers have applied traditional MPLS-enabled routers for both the LER and LSR roles, but the requirements for these two functions are very different. The LERs must extensively interface with IP routing protocols (such as routing filtering, import and export) to route each individual data packet onto the corresponding LSPs. As a result, these routers are quite complex to operate and expensive to build. The LSRs, in contrast, are mainly used to switch data paths based on the MPLS labels and are therefore simpler to operate and less expensive to build. Purpose-built MPLS pseudowire switches can perform extremely well and provide cost savings when applied as LSRs within the metro network.
6 RSVP Fast Reroute and Path Protection Metro RSVP Transit LDP Transit Label Switching (Data Path) Core OSPF, ISIS Primary LSP s Working Protection Figure 3: Metro Deployment with MPLS LSRs (MPLS Switches MPLS Implementation and Innovations Recognizing the potential benefits and widespread applicability of MPLS pseudowire technology within wireline and wireless service provider networks, Fujitsu became an early innovator using the emerging standard. Today, the Fujitsu 6400 Layer 2.5 aggregation switch offers the most advanced MPLS pseudowire implementation and several advanced features that transform the technology into a robust service platform for today s service provider networks. The 6400 platform combines the best of Layer 3 application awareness and the best of Layer 2 economics, operations, and interworking in a single platform. 5
7 Metro-Core Interface Alternatives Two prevalent methods exist for connecting metro networks to a provider s core network. The first conventional approach is the attachment circuit model as shown in Figure 4. This method has the advantage of simplicity because it is easy to implement with existing products. However, this model requires traffic to hop over multiple underlying technologies that may operate on different network management planes, making it very difficult to troubleshoot failures and manage end-to-end per-flow traffic. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 4: Conventional Model #1 s for Metro-Core Interfaces 6
8 The second conventional alternative is the service provider-over-service provider model as shown in Figure 5. This method is easy to understand since it is based on the well-known BGP 2547 specification. It offers the advantage of end-to-end MPLS functionality. RSVP tunnels are established to create an edge-toedge MPLS pseudowire connection. The most serious drawback in this model is the lack of security. To set up inter-domain RSVP tunnels, this model requires that the networks share network resource information, a condition that introduces numerous vulnerabilities between competing service providers. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 5: Conventional Model #2 Carrier-over-Carrier There have been a number of attempts in standards bodies to overcome the information leaking problem in RSVP-TE for inter-domain traffic engineering. More time is required to determine if these efforts will be successful. 7
9 To connect metro and core networks efficiently, Fujitsu has been working closely with service providers to pioneer an advanced capability known as the MPLS pseudowire multi-hop model as shown in Figure 6. In this model, the networks remain independent. Each user data flow goes through the entire network as a single MPLS pseudowire, and is mapped and aggregated into different RSVP tunnels at the edges of service provider networks. In other words, the MPLS pseudowires traverse multiple hops before reaching their destination. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 6: Carrier-preferred Model MPLS Multi-hop The MPLS pseudowire multihop capability provides service providers a solution characterized by: Management simplicity: MPLS pseudowire technology is becoming well understood, and service providers have access to network management tools that support MPLS pseudowires. Instead of working with multiple technologies as required in the attachment circuit model, the multihop model allows operators to monitor and control data traffic at the MPLS pseudowire level across the entire network. Security: MPLS pseudowires are handled at each service provider s network edge, which means that data forwarding can be controlled based on the service provider s resource and network policy criteria. Consequently, no network information must be exchanged between service provider networks. Scalability: All MPLS pseudowires are managed via a single control session between any two adjacent edge nodes. The edge nodes will always re-map and aggregate the MPLS pseudowires into different MPLS tunnels. The fact that the MPLS pseudowires are divided into segments enables the control plane to handle a greater number of connections. Standardization: The MPLS pseudowire multi-hop specification is in the process of being standardized within an IETF committee [3]. The Fujitsu implementation validates this approach and is driving this and future standardization efforts. 8
10 ATM SPVC to MPLS Interworking Many vendors support ATM-MPLS pseudowire network-level interworking as shown in Figure 7. At the network ingress edge, each ATM SPVC is mapped into an MPLS pseudowire and transported over the core. At the egress edge, the MPLS pseudowire is recovered and mapped to an ATM SPVC. There are a number of disadvantages in this approach, the most serious of which is that the access networks must all be ATM-based. This requirement will handicap a service provider s ability to move away from the existing ATM infrastructure to IP or Ethernet. In addition, this approach does not scale well since each SPVC-MPLS pseudowire mapping pair must be statically configured at the edge nodes. ATM SPVC-1 ATM SPVC-2 PW-1 PW-2 MPLS/IP SPVC-1 ATM SPVC-2 Figure 7: Conventional ATM-MPLS Interworking A more efficient approach, Draft-Swallow, has been undergoing standardization in the MFA Forum. The Fujitsu 6400 platform is the first system that supports this functionality in response to significant demand from service providers. 9
11 With the Draft-Swallow approach, the MPLS pseudowire switch performs the role of a gateway for connecting the PNNI-based ATM/Frame Relay networks and MPLS/IP networks as shown in Figure 8. This is referred to as service interworking (as opposed to network interworking) since the ingress and egress networks are not the same. As a gateway, the MPLS pseudowire switch will first translate IP edge node addresses into ATM, and then inform the ATM edge nodes about those addresses. Therefore, ATM edge nodes will view the IP edge nodes as ATM neighbors connected through the MPLS pseudowire switch. The ATM edge nodes will initiate the SPVCs and transfer data traffic to the MPLS pseudowire switch, which will then map each SPVC to an MPLS pseudowire and forward the traffic to the appropriate IP edge nodes. ATM Flow Frame Flow ATM-SW Frame-SW SPVC-1 ATM with PNNI SPVC-2 PW-1 MPLS/IP PW-2 Router 1 Router 2 Figure 8: ATM-MPLS Service Interworking (Draft-Swallow) There are two major differences between the Draft-Swallow approach and the conventional approach: 1. The conventional approach is to tunnel one protocol/application across another network. The Draft-Swallow technique translates one service to another and provides true service interworking. 2. With the conventional approach, the network interworking is to terminate and encapsulate the protocol over point-to-point connections. The Draft-Swallow approach is to translate the control protocol information transparently via an interworking gateway. The result is that the new approach will allow service providers to seamlessly transfer the existing ATM or Frame Relay services onto IP/MPLS networks. Since the MPLS pseudowire switches interface with both PNNI and MPLS signaling protocols, all the connections can be established automatically. 10
12 MPLS Traffic Protection and Restoration Service providers need to ensure traffic protection on every segment and in every layer of the network. MPLS pseudowire deployments can incorporate adequate protection and redundancy as shown in Figure 9. Working s MPLS/IP Protection s Figure 9: MPLS Protection For each operational (or working) MPLS pseudowire, the network edge nodes will set up one or multiple back-up (or protecting) MPLS pseudowires. In the event of a network failure, data traffic can continue to be forwarded through the backup MPLS pseudowires. In today s MPLS networks, service providers have been deploying MPLS Fast Reroute [4] for traffic protection. However, there are a number of limitations that can only be solved with MPLS pseudowire protection: Bandwidth mismatch: When a lower-speed link is being used as a backup for a higher-speed link, problems can arise during protection and restoration operations. If the higher-speed link fails, all traffic will be switched onto the lower-speed link. However, mission-critical traffic could be dropped as the result of link congestion during the switchover process. This problem is easily resolved by giving each MPLS pseudowire its own priority, which allows the MPLS pseudowires to preempt each other when necessary. Also note that, since the MPLS pseudowires are always bidirectional, the priority assignment must be consistent on both ends of the MPLS pseudowires. Low-cost access devices: Due to cost and operational reasons, network access devices such as PON ONTs do not have the full functionality of an IP/MPLS router, and use MPLS FRR for traffic protection. However, these access devices can implement MPLS pseudowires and MPLS pseudowire protection for data access and protection. The 6400 platform allows the configuration of hot, warm, and cold standby connections. In the case of hot standby situations, the platform delivers a fast switchover of less than 50 ms. Planned traffic shifting: During times of network maintenance, MPLS pseudowire traffic on one link may be shifted to another link. To support this capability, MPLS pseudowire protection features of the 6400 platform give operators the ability to manually trigger traffic shifting when desired. MPLS pseudowire protection is currently undergoing standardization in the IETF [5]. 11
13 OAM and OAM Mapping The OAM function is critical in access networks. In core networks, data traffic can be readily re-routed over an alternative path in the event of a network failure. In access networks, however, data traffic seldom has alternative or backup paths. Another challenge is imposed by end-to-end OAM support. A variety of OAM techniques are employed for the various network topologies. ATM, Ethernet, and MPLS all have different OAM requirements and mechanisms. However, in most of the service provider networks, an access network is based on either Ethernet or ATM while the core is typically based on MPLS. Therefore, the pseudowire switches must be able to support multiple OAM mechanisms and map the OAM parameters from one network type to another. Figure 10 illustrates how the Fujitsu 6400 platform handles OAM and OAM mapping using VCCV and Ethernet OAM (802.3ah). For example, in the event of an Ethernet failure, the switch will capture the failure alarms and piggyback them onto the VCCV messages. Consequently, remote nodes will receive the failure notification and act appropriately. MPLS/IP Ethernet Ethernet OAM-VCCV Mapping Backbone s Ethernet User Flows Figure 10: OAM and OAM Mapping 12
14 Conclusion MPLS pseudowire technology presents today s service providers with many opportunities to cost-effectively aggregate diverse traffic onto an IP/MPLS core network while maintaining excellent service to customers with legacy networks. The purpose-built 6400 switch allows service providers to reduce costs at the metro edge by deploying a lower-cost alternative to traditional full-function IP/MPLS routers. Fujitsu provides service providers with the most stable, full-function MPLS pseudowire foundation technologies, and will continue to lead in offering advanced features required for robust, commercial networks. This future direction and commitment are evident in the most recent 6400 MPLS pseudowire enhancements, including: MPLS pseudowire multihop networking for secure, scalable metro-core interfacing; Service interworking functionality for connecting ATM and Frame Relay networks to IP/MPLS networks; MPLS pseudowire traffic protection and restoration features for fast switch-overs Ethernet-MPLS OAM mapping for end-to-end traffic monitoring and diagnosis. References [1] PW-Ctrl Pseudo-wire Setup and Maintenance using the LDP, Luca Martini, et al, IETF draft [2] Draft-Swallow Soft Permanent Virtual Interworking between MPLS MPLS s and ATM: Unmapped Mode Version 1.0, George Swallow, MFA Contribution, July 2005 [3] PW-Mhop Dynamic Placement of Multi Segment Pseudo Wires, Balus et al, IETF draft [4] MPLS-FRR Fast Re-route Extensions to RSVP-TE for LSP Tunnels (RFC 4090), P. Pan et al [5] PW-Protect Protection, P. Pan, IETF draft 13
15 Acronym ATM BGP BGP 2547 DSLAM EoS FEC FRR IETF IGP IP IS-IS LSP LDP LER LSR MFA Forum MPLS OAM ONT OSPF PON PoS PNNI PW PWE3 PWid QoS RSVP RSVP-TE SPVC TDM VPI VCI VCCV VLAN Descriptor Asynchronous Transfer Mode Border Gateway Protocol RFC2547 a BGP extension for MPLS VPN Digital Subscriber Line Access Multiplexer Ethernet over SONET/SDH Forward Error Correction Fast Re-route Internet Engineering Task Force Interior Gateway Protocol Internet Protocol Intermediate System-Intermediate System Label-Switched Path Label Distribution Protocol Label Edge Router Label Switch Router MPLS/Frame Relay Alliance Forum Multi-Protocol Label Switching Operation, Administration, and Management Optical Terminal Open Shortest Path First Passive Optical Packet over SONET/SDH Private - Interface Edge-to-Edge Emulation ID Quality of Service Resource Reservation Protocol Resource Reservation Protocol for Traffic Engineering Soft Permanent Virtual Time-Division Multiplexing Virtual Path Identifier Virtual Identifier Virtual Connection Verification Virtual LAN 14
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Connection-Oriented Ethernet: Operational and Deployment Considerations
Connection-Oriented Ethernet: Operational and Deployment Considerations Connection-oriented Ethernet technology holds great promise. It creates, for the first time, a single metro aggregation and transport
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Migrating to MPLS Technology and Applications
Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals
Innovation in Access and Metropolitan Area Networks -
Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
APPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
QoS Implementation For MPLS Based Wireless Networks
QoS Implementation For MPLS Based Wireless Networks Subramanian Vijayarangam and Subramanian Ganesan Oakland University, Rochester, Michigan Abstract : Voice has been the primary application in wireless
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
IP/MPLS Networks for Public Safety
APPLICATION NOTE IP/MPLS Networks for Public Safety Highly reliable mission-critical communications infrastructures Abstract Alcatel-Lucent delivers a converged IP/MPLS-based network for public safety
Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.
Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about
WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing
WHITE PAPER Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing www.ixiacom.com 915-1838-01 Rev. C, January 2014 2 Table of Contents Abstract... 4 Introduction... 4 What is MPLS?...
APRICOT 2012 MPLS WORKSHOP L2VPN
APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 [email protected] 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
Use of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
White Paper: Carrier Ethernet
White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
Brochure More information from http://www.researchandmarkets.com/reports/2251494/ Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL Description:
IP/MPLS Networks for Highways
A P P L I C A T I O N N O T E IP/MPLS Networks for Highways Infrastructures for highly available mission-critical communications Abstract Alcatel-Lucent delivers a converged IP/MPLS-based network for highways
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice
#128 TECHNOLOGY WHITE PAPER Page: 1 of 6 MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice Tim Wu, Riverstone Networks ABSTRACT Since there s been data networking, there s been a debate between switched
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
Industry s First QoS- Enhanced MPLS TE Solution
Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, [email protected] Contact Info: Kim Gibbons, [email protected],, 408-525 525-4909 1 Agenda MPLS Traffic Engineering
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
Evaluating performance on an ISP MPLS network
Evaluating performance on an ISP MPLS network Dilmohan Narula, Mauricio Rojasmartinez, Venkatachalapati Rayipati [email protected], [email protected], [email protected]
POINT OF VIEW. MPLS A Strategic Technology. Executive Summary
MPLS A Strategic Technology Executive Summary Multiprotocol Label Switching (MPLS) is a comprehensive data networking technology that provides many benefits to enterprises and carriers. AT&T has had many
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
MPLS-TP in Metro Transport Networks. Bringing Carrier Grade Performance to Data Services
MPLS-TP in Metro Transport Networks Bringing Carrier Grade Performance to Data Services MPLS-TP in Metro Transport Networks - Bringing Carrier Grade Performance to Data Services December 2012 Copyright
Agilent N2X Layer 2 MPLS VPN Emulation Software
Agilent N2X Layer 2 MPLS VPN Emulation Software E7884A Technical Data Sheet An easy-to-use solution specifically designed for measuring the scalability and performance of Layer 2 MPLS VPNs and pseudo wire
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
Service Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
MPLS Virtual Private Networks
MPLS Virtual Private Networks A review of the implementation options for MPLS VPNs including the ongoing standardization work in the IETF MPLS Working Group Paul Brittain, [email protected] Adrian Farrel,
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Reliable Airport IP Networks
APPLICATION NOTE Reliable Airport IP Networks MPLS enables mission-critical communications Abstract Alcatel-Lucent envisions a converged IP/MPLS-based network for airports using next-generation products
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless,
EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless, Scalable, Resilient MPLS Networks TECHNICAL White Paper Increasing demand for video content, Mobile broadband and Cloud services
Metro Ethernet Networks (MEN)
185 Metro Ethernet Networks (MEN) Luis Velasco, Jordi Perelló, Gabriel Junyent Optical Communication Group - Universitat Politècnica de Cataluya (UPC) E-mail: [email protected], [email protected],
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
KEY REQUIREMENTS FOR INTERWORKING BETWEEN MPLS-TP NETWORK AND IP/MPLS NETWORK
KEY REQUIREMENTS FOR INTERWORKING BETWEEN MPLS-TP NETWORK AND IP/MPLS NETWORK Mounir Azizi 1, Redouane Benaini 2 and Mouad Ben Mamoun 3 Data Mining & Network Laboratory, Department of Computer Science
