TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS
|
|
|
- Avice Bradley
- 10 years ago
- Views:
Transcription
1 TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS AThesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering in The Department of Electrical and Computer Engineering by Pooja S Aniker B.E., Bangalore University, India, 21 May 25
2 Acknowledgments I would like to extend my sincere gratitude to my advisor Dr. Morteza Naraghi-Pour for his excellent guidance and support without which this work would not be possible. I am very thankful to him for helping me to understand the concepts and organize my ideas. Throughout the process of working on my thesis, he has been very patient, understanding and supportive. I am very grateful for all the help that he has provided me. I also like to thank Dr.Subhash Kak and Dr. Ramanujam for being a very supportive and understanding committee. I am thankful to my parents and family for instilling confidence and encouraging me throughout my Master s Degree. Their blessings, love and well wishes have always been with me. Last, but not the least I sincerely thank all my friends for their support and patience. I could not have accomplished this without their help. ii
3 Table of Contents Acknowledgments List of Tables List of Figures Abstract ii v vi xi Chapter 1 Introduction Multiprotocol Label Switching Virtual Private Networks Traffic Engineering MPLS Path Protection Chapter2 TrafficEngineeringforMPLSVPN s Introduction Previous Work Route Based Routing Link Based Routing Label Constraint Loop Elimination Our Approach to Traffic Engineering in MPLS VPN s Route Based Routing of QoS Traffic for MPLS VPN s Link Based Routing of QoS Traffic Link Based Routing of Best Effort Traffic Experimental Results Networks Experimental results for Route Based Routing Experimental results for Link Based Routing iii
4 Chapter 3 Path Protection Introduction Previous Work Our Approach to Path Protection in MPLS VPN s Path Protection in MPLS VPN s Experimental Results Simulation Configuration and 1 : 1 Path Protection Chapter 4 Conclusion Bibliography Vita iv
5 List of Tables 2.1 Notation of MCF problem for route based routing of QoS traffic Notation of MCF problem for link based routing of traffic Notation of MCF problem with Hop Constraint Notation of MCF problem with route based routing in MPLS VPNs Notation for link based routing of QoS traffic in MPLS VPNs Notation of MCF problem for link based routing of traffic in MPLS VPNs Networks generated by two level Hierarchical Topology Notation of MCF problem for Path Protection of QoS traffic v
6 List of Figures 1.1 MPLS Network MPLS VPN Architecture MPLS VPN Operation Abstract US network level Hierarchical Topology Route based routing Route based routing Effect of Epsilon in Network Effect of Epsilon for Network Effect of Epsilon in Network Effect of granularity Effect of granularity with varying overload Comparison of LP and LP-to-INT for all networks Effect of earning rate for Network vi
7 2.12 Effect of earning rate for Network Effect of earning rate for Network Effect of e s,σ t for Network 1: One Stage Routing Effect of e s,σ t for Network 1: One Stage Routing Effect of e s,σ t for Network 2: One Stage Routing Effect of e s,σ t for Network 2: One Stage Routing Effect of e s,σ t for Network 3: One Stage Routing Effect of e s,σ t for Network 3: One Stage Routing Effect of e s,σ t for Network 3: One Stage Routing Effect of e s,σ t for Network 1: Two Stage Routing Effect of e s,σ t for Network 1: Two Stage Routing Effect of e s,σ t for Network 2: Two Stage Routing Effect of e s,σ t for Network 2: Two Stage Routing Effect of e s,σ t for Network 3: Two Stage Routing Effect of e s,σ t for Network 3: Two Stage Routing Effect of e s,σ t for Network 3: Two Stage Routing Effect of hop constraint under light load Effect of hop constraint under heavy load link disjoint path protection with B σ for Network link disjoint path protection with B σ for Network vii
8 link disjoint path protection without B σ for Network link disjoint path protection with B σ for Network link disjoint path protection with B σ for Network link disjoint path protection with B σ for Network link disjoint path protection without B σ for Network link disjoint path protection with B σ for Network link disjoint path protection with B σ for Network link disjoint path protection with B σ for Network link disjoint path protection without B σ for Network node disjoint path protection with B σ for Network node disjoint path protection with B σ for Network node disjoint path protection without B σ for Network node disjoint path protection with B σ for Network node disjoint path protection with B σ for Network node disjoint path protection with B σ for Network node disjoint path protection without B σ for Network node disjoint path protection with B σ for Network node disjoint path protection with B σ for Network node disjoint path protection with B σ for Network node disjoint path protection without B σ for Network viii
9 3.23 1:1 link disjoint path protection with B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection without B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection without B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection with B σ for Network :1 link disjoint path protection without B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection without B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection without B σ for Network :1 node disjoint path protection with B σ for Network :1 node disjoint path protection with B σ for Network ix
10 3.43 1:1 node disjoint path protection with B σ for Network :1 node disjoint path protection without B σ for Network x
11 Abstract Traffic Engineering (TE) attempts to establish paths for the flow of data in a network so as to optimize the resource utilization and maximize the network performance. One of the main goals of Traffic Engineering is to bring about efficient and reliable network operations. Constraint based routing is the key to Multiprotocol label switching TE. Constraint based routing helps to manage traffic paths within a MPLS network and allows for traffic to flow along certain desired paths. MPLS also supports explicit routing thus providing TE capabilities. MPLS TE enables resiliency and reliability to be built into networks, thus increasing the value and availability of the network. TE is deployed in MPLS networks by providing TE extensions to interior gateway protocols like OSPF and IS-IS. MPLS creates a connection oriented model over the traditional connectionless framework of IP based networks. This connection oriented model helps to overcome several shortcomings of the IP network and also provide the necessary framework to give quality guarantees to IP traffic. Quality of Service (QoS) can be built into MPLS networks where TE is used. MPLS has made significant progress in recent years and is used for deployment of networks all over the world. In this thesis, we propose several constraint-based routing algorithms for MPLS based VPN s. Our algorithms support routing of both Quality of Service (QoS) and traffic over the MPLS network. We have implemented a route based and a link based approach for routing of QoS and traffic. We also implement the and 1 : 1 link disjoint and node disjoint path protection mechanisms for the QoS traffic. We study the effect of the various parameters used in our equations such as epsilon, granularity, earning rate and hop count. The problem is formulated as a multicommodity flow (MCF) problem and is solved using the optimization tool - ILOG CPLEX. Our approach is scalable to large networks having a number of VPN s. xi
12 Chapter 1 Introduction In this chapter we provide an overview of the working of MPLS in Section 1.1. The concept of Virtual Private Networks (VPN s) and an overview of the architecture and operation in MPLS VPN s is discussed in Section 1.2. In Section 1.3 we explain the concepts of Traffic Engineering and Constraint Based Routing. Path Protection is introduced in Section Multiprotocol Label Switching In a traditional IP network the router analyzes the destination address in the packet header at each hop and makes a independent forwarding decision as the packet travels from the source to the destination. IP forwarding is based on routing protocols such as Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). These protocols are designed to find the shortest path from the source to the destination and do not consider factors such as latency and traffic congestion. In order to overcome some of these restrictions Multiprotocol Label Switching (MPLS) was introduced. MPLS establishes a connection oriented network overlaid onto the connectionless framework of IP networks. Due to this connection oriented architecture, a number of new techniques for traffic management are available. In MPLS packets are forwarded by label swapping or label switching. The labels are contained in a MPLS header inserted into the data packet. The label is a short fixed length physically contiguous identifier that tells the routers how to forward the packets from the source to the destination. The packets follow a predetermined path called the Label Switched Path (LSP). LSP is also referred to as a MPLS tunnel. It is simply a concatenation of one or more hops in the network. Signaling protocols such as Resource reservation protocol with Tunneling Extensions (RSVP-TE) and Label Distribution Protocol (LDP) can be used to establish connections and distribute labels. These protocols establish paths through the MPLS network and reserve network resources along the path according to the requirement. The routers in the MPLS network are called the Label Switch Routers (LSR s) and the routers in the edge of the network are called Label Edge Routers (LER s). The router at the entry point of the tunnel is referred to as the ingress router and the router at the end point is called the egress router. When packets enter the network they are classified into Forwarding Equivalence Classes (FEC). All the packets belonging to the same FEC 1
13 receive the same forwarding treatment. A FEC is a logical entity created by the router to represent a class of packets. After the initial classification the packets are then assigned a label and the path corresponding to that FEC by the LER. The label is used to identify a FEC. The packets are then forwarded along the LSP. At each hop, the LSR removes the incoming label and attaches a outgoing label. This outgoing label tells the next router how the packet should be forwarded. Fig 1.1 shows a typical MPLS network and the associated elements. The central cloud represents the MPLS network. The customer edge routers (CE routers) interface with the provider edge routers (PE routers). The PE router at the ingress point attaches the MPLS label to the packet and the PE router at the egress point removes the MPLS label from the packet. The CE and PE routers are the LER s. Within the MPLS domain, the Provider (P) routers forward the traffic hop by hop based on the labels. The P routers are the LSR s. Figure 1.1: MPLS Network As the name suggests, the techniques of MPLS are applicable to any network layer protocol. MPLS is a framework of functions. MPLS combines the benefits of packet forwarding based on Layer2 Switching with that of Layer3 Routing. MPLS also provides the benefit of Traffic Engineering (TE). It can also be used to set up Virtual Private Networks. 1.2 Virtual Private Networks A Virtual Private Network is a private communication network that makes use of the public telecommunication infrastructure to transmit data. It can be used within a single organization or several different organizations. It uses tunneling protocols to maintain confidentiality of data and message integrity. The main purpose of a VPN is to provide a company with the capabilities of private leased lines at a much lower price by using the shared public infrastructure. The Internet is a shared public infrastructure with open 2
14 transmission protocols. Hence, in order to set up a VPN, it must include packet encapsulation or tunneling, encryption and sender authentication in order that the data reaches the destination without being tampered. MPLS VPN Architecture Overview Since MPLS allows the tunneling of packets from the ingress router to the egress router VPN applications that require this capability can be easily built. VPN s built on MPLS provide users with all the benefits of MPLS such as traffic engineering, Quality of Service (QoS) and separation of traffic. MPLS VPN s allow service providers to deploy scalable VPN s and provide value added services. MPLS VPN s can be divided into two categories. One is the customer based VPN where the VPN is configured on the customer side equipment. The second category is the network based VPN where the VPN is configured on the service provider equipment and is operated by the provider. MPLS VPN s are network based and offer considerable cost savings and increased scalability. MPLS provides for traffic separation by uniquely identifying each VPN flow and setting up circuit like connections. A VPN consists of CE routers attached to the customer site. The customer sites use the CE routers to communicate with other customer sites. Only the PE routers are aware of the VPN s. The MPLS architecture is as shown in 1.2. The figure shows five customer sites communicating with three VPN s. Figure 1.2: MPLS VPN Architecture MPLS VPN Operation Overview Fig 1.3 shows the operation of a MPLS VPN. The CE router provides the PE router with the routing information of the corresponding customer site. This routing information is stored in a distinct routing and forwarding table called the Virtual Routing and Forwarding table (VRF) in the PE router to guarantee isolation between the various VPN s. Thus the PE router maintains a separate VRF table for each VPN. Each PE router needs a unique router ID that is used to allocate a label and enable VPN forwarding in the backbone of 3
15 the network. Each PE router allocates a unique label to each route in each VRF. The PE routers exchange information about the VPN customers and routes among themselves by using Border Gateway Protocol (BGP) as the routing protocol. In order to make the IP addresses used within a VPN unique, they are concatenated with a 64 bit prefix called a route distinguisher (RD). In order to uniquely recognize the VPN originated IP packets each of the packets are labeled by the ingress PE router with a label that uniquely identifies the egress PE router. Figure 1.3: MPLS VPN Operation Each PE-router assigns a unique label for each route in each VPN routing and forwarding (VRF) instance. These labels are then propagated along with the corresponding routes to all the other PE-routers. The PE-routers then install the received routes and the label assigned by the egress routers in the VRF tables. The MPLS/VPN network is now ready to forward VPN packets. When a VPN packet is received by the ingress PE-router, the corresponding VRF is examined, and the label associated with the destination address by the egress PE-router is obtained. Another label, pointing toward the egress PE-router, is obtained from the global forwarding table. Both labels are combined into an MPLS label stack, are attached in front of the VPN packet, and are sent toward the egress PE-router. All the P-routers in the network switch the VPN packet based only on the top label in the stack, which points toward the egress PE-router. Because of the normal MPLS forwarding rules, the P-routers never look beyond the first label and are thus completely unaware of the second label or the VPN packet carried across the network. The egress PE-router on receiving the labeled packet, drops the first label, and performs a lookup on the second label, which uniquely identifies the target VRF. A lookup is performed in the target VRF, and the packet is sent toward the proper CE-router. 4
16 1.3 Traffic Engineering Traffic Engineering (TE) is the process of selecting suitable paths for the flow of data in a network so as to efficiently utilize the network resources and enhance the network performance while maximizing the network revenue. One of the main goals of Traffic Engineering is to bring about efficient and reliable network operations. Traffic Engineering attempts to compute a path from the source node to the destination while adhering to constraints such as bandwidth,delay and other administrative requirements. After the path is computed, Traffic Engineering enables the establishment of the path and also maintains the forwarding capability of the path. In IP routing traffic between two points is sent over the shortest path available even though multiple paths may exist. During traffic congestion, this may lead to a few routes being overused and some routes being underused. This leads to inefficient utilization of network resources. MPLS manages bandwidth more efficiently by specifying explicit routes and by setting certain bandwidth guarantees. MPLS has a number of techniques that support Traffic Engineering. MPLS computes a path at the source taking into account all the constraints. This is possible only if the source has some way of gathering the network information either locally or from other routers. In addition to supporting explicit routing, MPLS also has the ability to distribute information about network resources and topology, reserve network resources and modify link attributes. MPLS Traffic Engineering (MPLS TE) increases the availability and the value of the network to users. TE is built into MPLS networks via traffic engineering extensions to protocols such as OSPF and IS-IS. OSPF-TE and IS-IS-TE carry additional information such as link bandwidth, link utilization, delay, priority, etc. to allow the network to utilize paths that meet service requirements, resource availability and other constraints. RSVP-TE is commonly used for MPLS Traffic Engineering. MPLS TE is deployed in the core of the MPLS network and it helps to reduce traffic congestion and enables efficient utilization of the available resources. MPLS also supports Quality Of Service (QoS). QoS is defined in RFC2386 as a set of service requirements to be met by the network while transporting a flow. A flow refers to a packet of data being transmitted with a certain level of QoS. QoS is basically a certain level of service provided to customers. Some of the characteristics that determine the level of service are probability of packet loss, bandwidth requirements, delay etc. QoS based routing is a mechanism wherein paths are determined on the basis of availability of network resources and QoS requirement. QoS routing selects routes that satisfy the QoS requirement. MPLS along with Differentiated Services (Diffserv) makes QoS support possible. Some of the techniques used by MPLS to provide QoS are IP Precedence, Random Early Detection (RED), Weighted RED, Weighted Fair Queuing (WFQ), Class -Based WFQ and Priority Queuing. Unlike MPLS TE, QoS is used at the edge of the MPLS network. It ensures that high priority packets get a preference over low priority traffic. Together, QoS and traffic engineering enable organizations to move away from multiple, specialized networks for voice, video, and data to a single converged IP/MPLS network, dramatically reducing overhead and cost. Constraint Based Routing (CBR) is a mechanism of determining a path from the 5
17 source to the destination subjected to certain constraints such as link capacity, available bandwidth, delay requirement and administrative policies. It uses information about network resources, topology and traffic patterns to compute routes. CBR only determines the path and does not reserve any resources on the path. For reserving resources a reservation protocol such as RSVP has to be used. CBR manages traffic paths within a MPLS network, allowing the traffic to flow along desired paths. CBR can be online or offline depending on where the path computation is performed. Online CBR takes into account resource constraints and calculates one LSP at a time. Path calculation is performed at the routers and hosts without knowledge of new requested traffic. Online CBR can adapt to network changes and state updates. In Offline CBR, path computation is performed outside the network for a fixed traffic demand and network topology. Offline CBR helps to optimize network resource usage but it cannot adapt to network changes. 1.4 MPLSPathProtection Since MPLS supports Traffic Engineering, it allows explicit routing of packets. This feature allows MPLS networks to pre-establish backup paths for the primary paths. Each of these backup LSP s have the same amount of bandwidth as the primary LSP s. Path Protection provides an end to end failure recovery mechanism for MPLS Traffic Engineering tunnels.the backup paths have the same source-destination pair as the corresponding primary paths. One or more LSP s are established in advance to provide failure protection for the protected LSP. If the primary LSP fails, the traffic is immediately temporarily switched onto the backup LSP s. It is important that the backup LSP s are either link disjoint or node disjoint with the primary LSP s i.e the backup LSP s do not share a link or a node with the primary LSP s else the failure of a shared link or node would affect both the primary and backup paths. Rerouting is another technique of providing path protection. In this method, upon failure of the primary path the traffic is simply rerouted along a new path or path segment. No resources are reserved in advance until the fault occurs. This mechanism provides a higher resource utilization, but is slow compared to protection switching as the secondary path is established upon detection of a failure. 1+1PathProtectionmechanism In 1+1 path protection the backup path carries a copy of the traffic on the primary path. Upon detection of a failure, the traffic is routed along the backup path. The backup path resources are not available to low priority traffic. There is no sharing of the resources of the backup path. It is the fastest path protection mechanism. 1+1 path protection can be link disjoint or node disjoint. 6
18 1:1PathProtectionmechanism In 1:1 path protection, the resources of the backup path are available to low priority traffic. There is a sharing of the backup path resources. Upon detection of a failure, the low priority traffic is preempted and the traffic is switched from the primary to the backup LSP. 1:1 path protection can be link disjoint or node disjoint. 7
19 Chapter 2 Traffic Engineering for MPLS VPN s 2.1 Introduction In section 2.2 we review off-line constraint-based algorithms for routing both Quality of Service (QoS) and Best Effort() service classes. We review the notations used in the formulation of the multi commodity flow (MCF) problems and also discuss certain MPLS attributes such as label constraint and hop constraint.our approach towards traffic engineering including link based and route based routing is introduced in 2.3. The experimental results showing the effects of various parameters on routing for several example networks is explained in Previous Work In [1], Mitra and Ramakrishnan proposed a technique for multiservice, multipriority traffic engineering in QoS supported data networks using a multi-commodity flow problem. In their approach the high priority QoS traffic is routed first utilizing all the available link capacities. The Best Effort traffic is routed after QoS and is allowed to utilize the residual capacities. But this method had some drawbacks. In [4], Chung-Yu Wei proposed a method to overcome these drawbacks and extended the multi-commodity flow problem to support QoS and Best Effort routing in MPLS networks. We have extended the approach in [4], to MPLS Virtual Private Networks and have incorporated link based routing for QoS and classes of traffic. We have also extended the route based approach in [1] to accommodate MPLS VPN s and have modified the objective function. In the following sections we will explain the approach in [1] and [4] and our contribution in detail Route Based Routing Traffic within a network can be differentiated into several classes depending on the kind of service required. A network should be able to accommodate and provide service for different classes of traffic. Different kinds of traffic require different constraints and grades 8
20 of service. To handle these end to end constraints the concept of admissible route sets is introduced in [1]. The admissible route sets are specific to each QoS service class s and to each origin-destination pair σ and are denoted as R(s, σ). For each class that requires QoS, an admissible route set is pre-determined for a specific origin- destination (OD) pair and the final routes for routing are selected from this route set. Real-time services such as voice and video are sensitive to delay and hence require admissible route sets which are restricted in their hop number, while for a delay insensitive service class such as data traffic the admissible route set could have a less stringent hop restriction. Based on the service classes, traffic can be differentiated into high priority Quality of Service (QoS) traffic and low priority Best Effort () traffic. The routing of high priority QoS traffic is not affected by the presence of the Best Effort traffic. Admissibility of a route depends on factors such as link capacities, available bandwidth, ability of nodes to handle certain services, administrative policies, etc., The concept of route based routing for a single data network was introduced in [1]. We will discuss this concept in detail and show our extension of this approach to MPLS Virtual Private Networks. Network Model and Problem Formulation Consider a connected network with N nodes and L links with each link having a capacity C l. The group of service classes that require QoS are denoted as S QoS. Each individual class is denoted by s. s S QoS. Let the network be represented by a graph G =(V,E), where V is the set of all vertices that represent the nodes in the network and E is the set of all edges representing the links in the network.for each class s, weconsidera N N matrix D s of bandwidth demands from source node σ i to destination node σ j.the problem is formulated as a multi-commodity flow problem with the objective to maximize the network revenue subjected to various constraints. Additional notation is given in Table 2.1. In [1], the network revenue for QoS traffic is defined as follows: W QoS = e s,r X s,r s S QoS σ r R(s,σ) where e s,r and X s,r are given in Table 2.1. The multi-commodity flow problem presented in [1] is described below. MCF problem P1: Maximize W QoS = e s,r X s,r (2.1) s S QoS σ r R(s,σ) subject to the constraints } r R(s,σ) X s,r D s,σ s S X s,r, r R(s, σ) QoS, σ (2.2) s S QoS σ r R(s,σ):l r 9 X s,r C l, l (2.3)
21 Table 2.1: Notation of MCF problem for route based routing of QoS traffic. V set of vertices (routers) in the network E set of edges (directed links) in the network G =(V,E) Representation of the network as a graph l E Link C l Capacity on link l D s,σ Bandwidth demand for class s and OD pair σ, σ =(σ i,σ j ) R(s, σ) The pre-selected route set for class s and OD pair σ S QoS The set of service classes for QoS traffic e s,r The earning per unit of carried traffic for class s on route r W QoS Network revenue for QoS traffic Allocated bandwidth for class s on route r X s,r In (2.1), the objective is to maximize the network revenue W QoS which is the product of the earning rate per unit of carried traffic for class s S QoS,onrouter R(s, σ) and the allocated bandwidth for a OD pair σ on the route r. The summation is taken over all classes s S QoS, for all OD pairs σ in the network and for all routes r R(s, σ). The constraint in (2.2) ensures that the carried bandwidth for class s and OD pair σ does not exceed the demand D s,σ for that class and that OD pair. It also ensures that the allocated bandwidths should be greater than zero i.e non-negative. The constraint in (2.3) ensures that the total carried bandwidth on a link l for all routes r R(s, σ), for all OD pairs and for all classes s S QoS does not exceed C l, the capacity of that link. The MCF problem P1 is a linear programming problem and can be solved by using a linear programming package such as CPLEX [14] to obtain a solution.on solving the above problem we obtain the maximum revenue W QoS. In [1], Best Effort traffic is routed using link based routing. An explanation of the link based routing for QoS and Best Effort traffic provided in [4] are discussed below Link Based Routing In link based routing, there are no pre-selected route sets for a specific class or for a particular origin destination pair. The MCF problem here attempts to determine the allocated bandwidth on the links in a network instead of the routes. Network model and Problem Formulation for Best Effort Traffic The network model and problem formulation for link based routing of Best Effort traffic according to [1] and [4] is as follows. Consider a connected network with N nodes and L links with each link having a capacity C l. Let the network be represented by a graph G =(V,E), where V is the set of all vertices that represent the nodes in the network and 1
22 E is the set of all edges representing the links in the network. We consider a N N matrix D s,σ of bandwidth demands from source node σ i to destination node σ j. The problem is formulated as a multi-commodity flow problem with the objective to maximize the network revenue subjected to various constraints. W = σ e,σ F,σ, where F,σ is the total Best Effort traffic carried for OD pair σ, ande,σ is the earning per unit of carried Best Effort traffic of OD pair σ. The objective is to maximize the network revenue W. The notation and the problem formulation are given in the following. Table 2.2: Notation of MCF problem for link based routing of traffic. W e,σ F,σ D,σ Y σ,l C l L in (n) L out (n) σ i σ j Network revenue for traffic The earning per unit of carried traffic for OD pair σ Total carried traffic for OD pair σ Bandwidth demand of OD pair σ for traffic Allocated bandwidth for OD pair σ on link l Capacity of link l Set of links directed into node n Set of links directed out of node n Source node of OD pair σ Destination node of OD pair σ MCF problem P2: Maximize W = σ e,σ F,σ (2.4) subject to l L in (n) Y σ,l F,σ D,σ, σ (2.5) F,σ if n = σ j Y σ,l = F,σ if n = σ i n, σ (2.6) otherwise Y σ,l, σ, l (2.7) Y σ,l C l, l (2.8) l L out(n) σ The objective function in (2.4) is the network revenue. The constraint in (2.5) ensures that the total carried traffic F,σ for OD pair σ does not exceed the demand D,σ for 11
23 that OD pair. Equation (2.6) is the flow conservation constraint. It ensures that the total incoming traffic equals the total outgoing traffic for all nodes except the source node σ i and the destination node σ j. The constraint in (2.7) ensures that the allocated bandwidths are all non-negative. (2.8) ensures that the total allocated bandwidths on link l does not exceed its capacity C l. The allocated bandwidth Y σ,l indicates the bandwidth allocated on each link l for each OD pair σ. It does not give the utilized paths. Multiple paths could share a single link. In order to determine the routes for the flow of traffic a procedure called flow decomposition is necessary. This procedure is repeated for all OD pairs and is as follows. Flow-decomposition: 1. Fix an OD pair σ. 2. A subgraph N is generated by removing all the links l such that Y σ,l =andthe remaining graph is denoted by G. The traffic for OD pair σ uses only those links present in graph G. 3. Trace a route r in G from the source σ i to the destination σ j using the depth first search method. Let Y,r = min l r Y σ,l. Compute F,σ = F,σ Y,r, and Y σ,l = Y σ,l Y,r, l r. 4. End if F,σ = else goto 2 Repeat for all OD pairs σ. In [4] the flow decomposition procedure is modified such that the path with the maximum bandwidth is chosen from the source to the destination Label Constraint In the above approach, there is no constraint on the number of Label Switched Paths that are set up for each OD pair. As a result, the label space becomes very large at the Label Switch Routers and this is undesirable. In [6], Applegate and Thorup proposed some algorithms to reduce the label space. Label constraint was introduced in [4] to overcome these drawbacks. In order to constrain the label space, the number of incoming labels at a node has to be controlled. Since MPLS supports label merge,the number of incoming labels equals the number of outgoing labels. The traffic bifurcation and traffic non-bifurcation concepts introduced in [1] and [11] can be used to constrain the label space. This leads to a Mixed Integer Programming (MIP) problem. A parameter called granularity g ( g 1) is introduced to control the splitting of traffic among multiple paths. Granularity specifies how coarsely the traffic is divided. For a granularity g, the traffic is split among 1/g paths. 12
24 Thus, by defining the granularity the splitting of traffic can be controlled and the label space can be restricted. The label constraint defined in [4] is as follows. Y σ,l = M σ,l (D,σ g), σ, l (2.9) σ l L in (n) M σ,l L max (n), n (2.1) M σ,l Z, where Z is the set of integers. M σ,l 1/g, σ, l (2.11) In (2.9), (D,σ g) is the basic unit of flow that can be allocated to Y σ,l,andm σ,l is an integer variable corresponding to Y σ,l. The constraint in (2.9) ensures that the traffic carried on link l for OD pair σ can only be an integer multiple of the basic unit of traffic (D,σ g). In (2.1), L max (n) is the maximum number of labels allowed on a node n. l L in (n) M σ,l The constraint in (2.1) ensures the maximum number of incoming labels σ toanoden does not exceed the label bound L max (n). When g is set to 1, the demand between an OD pair will not be split between multiple LSP s.a single path is used to carry the demand between the OD pair. When g =1,M σ,l isor1forallσ and for all l. If g<1, the range of M σ,l increases. The demand can be split up to at most among [1/g] different LSP s. Adding the above label constraint to MCF problem P 2, modifies it to a MIP problem. The MIP problem is similar to a LP problem except that in a LP problem some of the variables are constrained to be integers. Here M σ,l is an integer. One of the methods of solving a MIP problem is the branch and bound method. In this method the optimal solution is first found without the integer constraints. If the variables whose values are constrained to be integers already have integer values, then it stops. If one or more integer variables have non-integral values, one fractional variable is chosen for branching, and two new subproblems are generated where the variable is more tightly constrained. In the branch and bound method, a series of LP subproblems are solved, and a tree of subproblem is built. Solving such problems requires far more computing time than the same problem without any integer constraints. The commercial package CPLEX can be used to solve MIP problems. This approach however, is extremely time consuming. In Section 2.4, we propose a method for getting around the complexity of solving MIP problems Loop Elimination The routing technique described in [1], could lead to the creation of loops within a network. These loops increase the network resource utilization without increasing the efficiency or the network revenue. The loops can be eliminated by modifying the objective function so as to account for the utilized resources. The modified objective function is given by: MaximizeW = σ e,σ F,σ ε σ 13 Y σ,l (2.12) l
25 In (2.12), the first term σ e,σ F,σ is the total network revenue resulting from the carried traffic. The second term σ l Y σ,l is the total bandwidth or network resource consumed in the network and may be considered as the cost of carrying the traffic. If there are loops in the network the utilized resources would increase without increasing the network revenue.by accounting for the utilized resources in the network revenue, we penalize the network revenue and thus eliminate the loops in the network. The parameter ε must be chosen appropriately for the prevention of loops. The effect of ε is discussed later in Section The modified MCF including label constraint and loop elimination is given below. MCF problem P3: Input: G=(V,E), g 1,D,σ, {C l : l =1, 2,..., E },L max (n),ε maximize W = σ e,σ F,σ ε σ Y σ,l (2.13) l subject to F,σ D,σ, σ Y σ,l F,σ if n = σ j Y σ,l = F,σ if n = σ i n, σ l L in (n) l L out(n) otherwise Y σ,l = M σ,l (D,σ g), σ, l Y σ,l C l, l σ Label limitation: M σ,l L max (n), n σ l L in (n) M σ,l Z, where Z is the set of integers, M σ,l 1/g, σ, l In the objective function (2.13), we reduce the network revenue by accounting for the utilization of resources and thus eliminate loops in the network. The other constraints are as explained earlier. Problem Formulation for Link Based QoS Routing QoS traffic can be differentiated into several classes depending on the kind of service required. Each class is assigned a different earning rate e s,σ. The class that has a higher earning rate e s,σ has a higher precedence than that with a lower earning rate. The traffic flow for a lower class cannot preempt that of a higher class. The constraints imposed in MCF problem P 3 hold good for QoS traffic also. An additional hop constraint is imposed so as to limit the number of hops in the route [4],[8]. For the hop constraint to be effective, 14
26 a non- bifurcation problem is considered i.e the granularity g is set to 1. The hop constraint is as follows. Yσ,l s H max (s) Dσ s (2.14) l In (2.15), H max (s) is the maximum number of hops for the traffic of class s. Dσ s is the traffic demand for class s and OD pair σ. Yσ,l s is the allocated bandwidth on link l, for class s and OD pair σ. Since it is a non-bifurcation problem, the traffic does not split among multiple paths and the bandwidth allocated on link l for OD pair σ and class s, Yσ,l s is either Dσ s or zero. By ensuring that the allocated bandwidth for OD pair σ and class s on all the network links does not exceed H max (s) Dσ s, we ensure that the length of the path for this OD pair does not exceed H max (s). The formulation of the MCF problem for the QoS traffic as in [4] is given below. Additional notations are given in Table 2.3. Table 2.3: Notation of MCF problem with Hop Constraint. e s,σ Fσ s Dσ s Yσ,l s H max (s) The earning per unit carried traffic for class s and OD pair σ Total carried traffic for class s and OD pair σ Bandwidth demand for class s and OD pair σ Allocated bandwidth for class s and OD pair σ on link l Allocated bandwidth for class s and OD pair σ on link l MCF problem P4: subject to l L in (n) Maximize W QoS = e s,σ Fσ s ε s,σ s,σ Y s σ,l l L out(n) l Y s Fσ s Dσ, s σ, s F Yσ,l s = σ s if n = σ j Fσ s if n = σ i otherwise Y s σ,l H max(s) D s σ, σ,l = M σ,l s Ds σ, s σ Y s σ,l C l, M s σ,l 1 s, σ σ, l, s l l Y s σ,l n, σ, s 15
27 2.3 Our Approach to Traffic Engineering in MPLS VPN s In this section we propose our model for traffic engineering of QoS and Best Effort traffic in MPLS VPN s.in section 2.3.1, the MCF problem for route based routing in a MPLS VPN is explained. The link based routing approach for QoS traffic are discussed in detail in section Traffic bifurcation in MPLS VPN s and hop constraint is also presented in this section. The link based routing approach for traffic are discussed in detail in section Our experimental results showing the effect of various parameters is presented in section Route Based Routing of QoS Traffic for MPLS VPN s The concept of route based routing for a single data network has been explained earlier in section We have extended this algorithm to accommodate MPLS VPN s and also modified the objective function to account for utilization of network resources. Network Model and Problem Formulation Consider a connected network with N nodes and L links with each link having a capacity C l.lett be the set of all VPN s which is defined as T = t1,t2,t3,... The group of service classes that require QoS are denoted by S QoS. Each individual class is denoted by s. s S QoS. Let the network be represented by a graph G =(V,E), where V is the set of all vertices that represent the nodes in the network and E is the set of all edges representing the links in the network.for each class s, weconsideran N matrix D s of bandwidth demands from source node σ i to destination node σ j. The problem is formulated as a multi-commodity flow problem with the objective to maximize the network revenue subjected to various constraints.additional notation is given in Table 2.4. The network revenue for route based routing for QoS traffic is given as: W QoS = e s,r t σ P s,r t σ ɛ e s,r t σ Ps,r l (2.15) σ t s S QoS t σ r t σ R(s,σt ) s S QoS The MCF problem P5 for route based routing of QoS traffic is as follows. MCF problem P5: Maximize W QoS = e s,r t σ P s,r t σ ɛ s S QoS subject to the constraints t σ r t σ R(s,σt ) r t σ R(s,σt ) P s,r t σ D s,σ t P s,r t σ, r R(s, σ) 16 } t σ s S QoS r t σ t σ l r t σ l e s,r t σ P l s,r t σ (2.16), s S QoS, σ, t (2.17)
28 Table 2.4: Notation of MCF problem with route based routing in MPLS VPNs. σ t OD pair with source node σ i and destination node σ j for VPN t rσ t Route for OD pair σ and VPN t R(s, σ t ) Admissible route set for class s, ODpairσ and VPN t, rσ t R(s, σ t ) e s,r t σ earning per unit of carried traffic for class s,router, ODpairσ and VPN t P s,r t σ allocated bandwidth for class s, route r, ODpairσ and VPN t Ps,r l allocated bandwidth for class s,router, ODpairσ and VPN t on link l σ t D s,σ t demand for class s, ODpairσ and VPN t Network revenue for QoS traffic W QoS s S QoS t σ r t σ R(s,σ t ):l r P s,r t σ C l, l (2.18) The objective is to maximize the network revenue given by (2.16). The first term in (2.16) represents the total network revenue as a result of carrying the traffic. It is the product of the earning rate per unit of carried QoS traffic for a particular OD pair and the carried traffic for that class and OD pair. The second term in (2.16) accounts for the utilization of resources. Ps,r l is the carried traffic on a single link l. A longer route has σ t more links than a shorter one. The different classes s S QoS are assigned different earning rates e s,r t σ with a higher rate being assigned to the high priority traffic. The second term in (2.16) has to be as small as possible in order to maximize the network revenue. By including the earning rate in the second term we ensure that the routes for high priority traffic are shorter than those of low priority traffic. W QoS which is the sum of the earnings over all classes s S QoS, all VPN s in T,all OD pairs σ and over all routes r R(s, σ) indicates the total network revenue. The constraint in (2.17) ensures that the carried bandwidth for class s,vpn t and OD pair σ does not exceed the demand D s,σ t forthatclassandthat OD pair. It also ensures that the allocated bandwidths should be greater than zero i.e non-negative. The constraint in (2.18) ensures that the total carried bandwidth on a link l for all routes rσ t R(s, σ t ), for all VPN s T, for all OD pairs σ and for all classes s S QoS that utilize a link l does not exceed C l, the capacity of that link. The MCF problem P5 is a linear programming problem and can be solved by using a commercial linear programming package such as CPLEX [13] to obtain a solution.on solving the above problem we obtain the maximum revenue WQoS Link Based Routing of QoS Traffic Our approach to link based routing of QoS traffic is presented in this section. The MCF problems in [4] are extended to support MPLS Virtual Private Networks. 17
29 Network Model and Problem Formulation for Link Based QoS Routing Consider a connected network with N nodes and L links with each link having a capacity C l. Let T be the set of all VPN s which is defined as T = t1,t2,t3,... The group of service classes that require QoS are denoted by S QoS. Each individual class is denoted by s. s S QoS. Let the network be represented by a graph G =(V,E), where V is the set of all vertices that represent the nodes in the network and E is the set of all edges representing the links in the network.for each class s, weconsideran N matrix D s of bandwidth demands from source node σ i to destination node σ j. The problem is formulated as a multi-commodity flow problem with the objective to maximize the network revenue subjected to various constraints. Additional notation is given in the table below Table 2.5: Notations for link based routing of QoS traffic in MPLS VPNs. σ t origin destination pair with source i, destination j for vpn t, σ =(σ i,σ j ) g Granularity- controls number of LSP s earning per unit of carried traffic for class s and OD pair σ in vpn t carried traffic for class s and OD pair σ in vpn t demand for class s and OD pair σ in vpn t allocated traffic for class s and OD pair σ in vpn t on link l l integer variable corresponding to Ys,σ t C l Capacity of link l set of links incoming into node n set of links outgoing from node n e s,σ t F s,σ t D s,σ t Ys,σ l t Ms,σ l t L in(n) L out(n) The MCF problem P6 for link based QoS routing is given below. The network revenue for link based routing for QoS traffic is given as: W QoS = e s,σ tf s,σ t ɛ Ys,σ l (2.19) t s σ s σ MCF problem P6: subject to the constraints l L in (n) Maximize W QoS = s Y l s,σ t l L out(n) t e s,σ tf s,σ t ɛ t σ s t l Ys,σ l (2.2) t F s,σ t D s,σ t σ, t, s (2.21) F s,σ t if n = σ j Ys,σ l = F t s,σ t if n = σ i n, σ, t, s (2.22) otherwise Ys,σ l C t l l (2.23) s t σ 18 t σ l
30 (2.2) represents the total network revenue. The first term in (2.2) represents the total network reward as a result of carrying the traffic. It is the product of the earning rate per unit of carried QoS traffic and the carried traffic for that class.the second term in (2.2) accounts for the utilization of resources. Ys,σ l t is the allocated traffic on a single link l for class s and OD pair σ t. The second term can be viewed as the cost of carrying the traffic and this is subtracted from the network revenue to account for the utilized resources.if the utilized bandwidth is increased without increasing the network revenue, as in the case of loops in the network, the network revenue is penalized. The constraint in (2.21) ensures that the carried bandwidth for class s,vpn t and OD pair σ does not exceed the demand D s,σ t forthatclassandthatodpairandalsothatthe carried bandwidth is greater than zero i.e nonnegative. The constraint in (2.22) is the flow conservation constraint. It ensures that the total incoming traffic equals the total outgoing traffic for all nodes except the source node σ i and destination node σ j. (2.23) ensures that the total traffic carried on a particular link l for all classes s, for all OD pairs and all VPN s does not exceed the capacity of that link. The MCF problem P6 is a linear programming problem and can be solved by using a commercial linear programming package such as CPLEX [13] to obtain a solution.on solving the above problem we obtain the maximum revenue WQoS. Traffic Bifurcation in MPLS VPN s In order to constrain the label space and prevent large routing tables at the routers we use the traffic bifurcation technique discussed in section The traffic bifurcation constraint for MPLS VPN s is : Ys,σ l = M l t s,σ (D t s,σt g), σ, t, s, l (2.24) Ms,σ l t 1/g, σ, t, s, l (2.25) Ms,σ l t Z, where Z is the set of integers. (2.26) In (2.24), (D s,σ t g) is the basic unit of flow that can be allocated to Ys,σ l t,andm s,σ l is t an integer variable corresponding to Ys,σ l t. The constraint in (2.24) ensures that the traffic carried on link l for OD pair σ can only be an integer multiple of the basic unit of traffic (D,σ t g). When g is set to 1, the demand between an OD pair will not be split between multiple LSP s. A single path is used to carry the demand between the OD pair. When g =1,Ms,σ l t isor1forallσ and for all l. Ifg<1, the range of Ms,σ l increases. The demand can be t split up to at most among [1/g] different LSP s. The MCF problem along with the traffic bifurcation constraint is given below. MCF problem P7: Maximize W QoS = e s,σ tf s,σ t ɛ Ys,σ l (2.27) t s σ s σ t t l 19
31 subject to the constraints l L in (n) Y l s,σ t l L out(n) M l s,σ F s,σ t D s,σ t σ, t, s (2.28) F s,σ t if n = σ j Ys,σ l = F t s,σ t if n = σ i n, σ, t, s (2.29) otherwise Ys,σ l = M l t s,σ (D t s,σt g), σ, t, s, l (2.3) Ms,σ l t 1/g, σ, t, s, l (2.31) t Z, where Z is the set of integers. (2.32) Ys,σ l C l, l (2.33) t s t σ (2.3) augments the problem to a Mixed Integer Programming problem as Mσ,l s is an integer. The above problem is solved using CPLEX with the LP-to-Integer method. HopConstraintinMPLSVPN s As mentioned earlier, differentiation of VPN traffic can be done by choosing earning rates for all the classes of traffic. The class with a higher earning rate receives a higher priority compared to other classes that have a lower earning rate. The hop constraint discussed in section [2.2.6] is extended to MPLS VPN s. The hop constraint for MPLS VPN s is given below. Ys,σ l H max(s) D t s,σ t, s, σ, t (2.34) l In (2.31), H max (s) is the maximum number of hops for the traffic of class s. D s,σ t is the traffic demand for class s and OD pair σ. Ys,σ l t is the allocated bandwidth on link l, for class s and OD pair σ. We treat this is as a non-bifurcation problem and set the granularity to 1. As a result, the traffic does not split among multiple paths and the bandwidth allocated on link l for OD pair σ and class s, Ys,σ l is either D t s,σt or zero. By ensuring that the allocated bandwidth for OD pair σ and class s on all the network links does not exceed H max (s) D s,σ t, we ensure that the length of the path for this OD pair does not exceed H max (s). The MCF problem P8 with the hop constraint for QoS routing is given below. MCF problem P8: Maximize W QoS = s subject to the constraints subject to l L in (n) Y l s,σ t e s,σ tf s,σ t ɛ t σ s Ys,σ l (2.35) t F s,σ t D s,σ t, σ, t, s (2.36) F s,σ t if n = σ j Ys,σ l = F t s,σ t if n = σ i n, σ, t, s (2.37) l L out(n) otherwise 2 t σ l
32 M l s,σ Ys,σ l max(s) D t s,σ t, s, σ, t (2.38) l Ys,σ l s,σ (D t s,σt g), σ, t, s, l (2.39) Ms,σ l t 1/g, σ, t, s, l (2.4) t Z, where Z is the set of integers. (2.41) Ys,σ l C l, l (2.42) t Link Based Routing of Best Effort Traffic s t σ Our approach to link based routing of traffic is presented in this section. The MCF problems in [4] are extended to support MPLS Virtual Private Networks. Network Model and Problem Formulation for Link Based traffic Routing Consider a connected network with N nodes and L links with each link having a capacity C l. Let T be the set of all VPN s which is defined as T = t1,t2,t3,... Here we consider only a single class of traffic i.e Best Effort. Let the network be represented by a graph G =(V,E), where V is the set of all vertices that represent the nodes in the network and E is the set of all edges representing the links in the network.we consider a N N matrix D of bandwidth demands from source node σ i to destination node σ j.the problem is formulated as a multi-commodity flow problem with the objective to maximize the network revenue subjected to various constraints. Additional notation is given in Table 2.6. Table 2.6: Notation of MCF problem for link based routing of traffic in MPLS VPNs. σ t origin destination pair with source i, destination j for vpn t, σ =(σ i,σ j ) g Granularity- controls number of LSP s earning per unit of carried traffic for OD pair σ in vpn t carried traffic for class and OD pair σ in vpn t demand for class and OD pair σ in vpn t allocated traffic for class and OD pair σ in vpn ton link l C l Capacity of link l set of links incoming into node n set of links outgoing from node n integer variable corresponding to Y,σ l t e,σ t F,σ t D,σ t Y,σ l t L in(n) L out(n) M,σ l t 21
33 The MCF problem P9 for link based routing of traffic is given below. The network revenue for link based routing for traffic is given as: W = e,σ tf,σ t ɛ Y,σ l (2.43) t t σ t σ l MCF problem P9: Maximize W QoS = t e,σ tf,σ t ɛ σ t Y,σ l (2.44) t σ l subject to the constraints σ l L in (n) Y l,σ t σ F,σ t D,σ t, σ, t (2.45) F,σ t if n = σ j Y,σ l = F t,σ t if n = σ i n, σ, t (2.46) otherwise l L out(n) Y,σ l = M l t,σ (D t,σt g), σ, t, l (2.47) M,σ l t [1/g], σ, t, l M l,σ t Z, where Z is the set of integers. (2.48) Y,σ l C l, l (2.49) t t σ The MCF problem formulation is similar to that of QoS with the exception of the hop constraint. There is no hop constraint imposed on the routing of Best Effort traffic. (2.41) represents the total network revenue. The first term in (2.41) represents the total network reward and the second term in (2.41) accounts for the utilization of resources. The constraint in (2.42) ensures that the carried bandwidth for Best Effort does not exceed the demand D,σ t for that OD pair and also that the carried bandwidth is greater than zero i.e nonnegative. The constraint in (2.43) is the flow conservation constraint. (2.44) ensures that the carried traffic is always an integer multiple of the basic unit of traffic. (2.46) ensures that the total traffic carried on a particular link l for class Best Effort for all OD pairs and all VPN s does not exceed the capacity of that link. The MCF problem P9 is a linear programming problem and is solved by using a linear programming package such as CPLEX [13] to obtain a solution. On solving the above problem we obtain the maximum revenue WQoS. 2.4 Experimental Results In this section, we present our experimental results. In Section 2.4.1, we describe the networks used in our simulations. The method of generation of synthetic networks is 22
34 described. In Section the results for route based routing of QoS traffic are presented. In Section 2.4.3, the effect of parameters like ɛ, granularity and the earning rate are shown. The results for onestage and twostage routing for all three networks are also presented. The LP-to-Integer method and its comparison with the LP method is also presented Networks Figure 2.1: Abstract US network In this experiment, two types of networks are considered. The first one is the abstract US backbone network which has a fixed topology. The network has 12 nodes and 38 edges. The network topology along with link capacities are shown in Figure 2.1. We consider the US network as network 1 in all our simulations. The second type of networks are randomly generated by a graph generator GT-ITM [1] to produce synthetic 2-level networks. The 2-level networks are used to simulate the hierarchical networks. The construction of the network topology is as follows. In the first level, a connected graph is generated with the given node number inside a unit square as in Figure 2.2. In the second level, the nodes of the first level which are denoted as cluster are replaced by a smaller connected graph which is generated inside a unit square with the given node number. The first level edges are typically longer than the second level edges. We have generated two hierarchical networks. One has 18 nodes and 62 edges and is considered as network 2. The other hierarchical network has 3 nodes and 94 edges and is considered as network 3. The individual VPNs for each of these networks are generated by the user. The size of the VPN, the OD pairs for the VPN and the number of VPN s are specified by the user. The demand for each OD pair for a given VPN is generated as described in [6]. The method is based on the Euclidean distance of the OD pair. The graph generator randomly places the nodes in a unit square. The distance δ(x, y) between two nodes x and y is 23
35 Figure 2.2: 2 level Hierarchical Topology obtained from their coordinates. For node x, we generate two random numbers o x, d x [,1]. Similarly, for node y, wehaveo y, d y [,1]. For each OD pair (x, y), we pick a random number c (x,y) [,1]. Then the demand between x and y is given by αo x d y c (x,y) e δ(x,y)/2 (2.5) Here α is the parameter that controls the maximum demand and is the largest Euclidean distance between any pair of nodes. This method generates more demand between pairs of nodes that have a smaller distance than those that have a longer distance. The networks generated by GT-ITM are listed as in Table
36 Table 2.7: Networks generated by two level Hierarchical Topology. Network Number of Nodes Number of Edges network network Experimental results for route based routing In this section we present the results for route based routing of QoS traffic. We have implemented route based routing only for the US network as it has a fixed topology and it is possible to specify certain admissible route sets for each OD pair. We specified two VPN s each with 3 OD pairs and each OD pair having 3 routes between them. The results are shown in Figures 2.3 and 2.4. We plot the percentage of carried traffic vs. percentage of demand for both VPN s and both classes of traffic. The percentage of carried traffic for each class for a individual VPN is also plotted. It can be seen that Class A has a higher percentage of carried traffic when compared to Class B. This is due to the higher earning rate of Class A which gives it a higher priority and it also generates a higher network revenue.the average hop number for each class is also shown. It is seen that Class B has a higher average hop number than Class A. This shows that a shorter route is being chosen for Class A when compared to Class B. VPN 1 VPN CLASS B % of demand CLASS B % of demand Figure 2.3: Route based routing 25
37 Carried traffic per VPN Carried traffic per class VPN1 VPN CLASS B Average Hop 3.5 Average hop number CLASS B Figure 2.4: Route based routing 26
38 2.4.3 Experimental results for link based routing Effect of ɛ In this section, we show the effect of varying ɛ in networks 1, 2 and 3 and also identify its proper range. We compare the network resources, the percentage of carried traffic, the total number of paths, and the number of loops for different values of ɛ. Theearningrate is set to one for all VPNs, so that the carried traffic is maximized in the network. e s,σ t σ F s,σ t Since the sum of allocated bandwidth Ys,σ l is greater than the total carried traffic t over all the OD pairs σ for all VPN s t the ɛ should be small enough,so that the second term in the objective function is as small as possible and the network revenue is maximized. If ɛ is set to zero, it has the same effect as removing the utilized resource from the network revenue and this will create loops in the network. In Figures we plot the network resources, percentage of carried traffic, the total number of paths, and the total number of loops vs the value of ε for each of the three networks. The percentage of the carried traffic is defined as the ratio of carried traffic to the traffic demand. It can be seen in some cases from the figures as ε is close to zero or equal to zero, loops are created in the network. But as ε increases from zero, the number of loops decreases and reaches for ε in the range of 1 6 to 1 2. As the number of loops decreases, the utilized resources in the network also decreases. But, the percentage of carried traffic and total number of paths remains unchanged. For large values of ε, (e.g,ε>.1) the carried traffic, the number of paths, and the utilized resources all decrease rapidly. This is due to the fact that as ɛ increases, the cost of carrying the traffic increases compared to the network reward. In order to maximize the network revenue, the percentage of carried traffic is reduced for large values of ɛ.very large values of ε should therefore be avoided. Granularity In this section, we show the effect of granularity on the total carried traffic for all the three networks. The problem is treated as a MIP problem due to the integer constraint in equation (2.38) and is solved using CPLEX. The carried traffic plotted in Figure 2.8 is the largest amount that the given network can carry for the given value of granularity g. Fora given granularity g, the demand for an OD pair can be split among 1/g different paths. Consequently, if the value of g is very large, the routing conditions will be more stringent, and may result in lesser carried traffic. However, from Figure 2.8 it is seen that this effect is small and the carried traffic does not vary significantly with the choice of granularity g. 27
39 3 1 Network Resource Epsilon Epsilon 2 1 Number of paths Epsilon Number of loops Epsilon Figure 2.5: Effect of Epsilon in Network 1 28
40 Network Resource Epsilon Epsilon Number of paths Epsilon Number of loops Epsilon Figure 2.6: Effect of Epsilon for Network 2 29
41 Network Resource Epsilon Epsilon 18 2 Number of paths Number of loops Epsilon Epsilon Figure 2.7: Effect of Epsilon in Network 3 3
42 12 Network 1 Network 2 Network Granularity Figure 2.8: Effect of granularity 31
43 In Figure 2.9 we show the effect of granularity for varying demand. It is seen that when granularity is set to 1, for varying demand the percentage of carried traffic is low. When granularity is set to.5, the percentage of carried traffic increases and is highest when granularity is set to.1. This is because when granularity is set to.1 the traffic is split among [1/.1] multiple paths. Granularity=1. Granularity =.1 % carried traffic Network 1 2 Network 2 Network 3 % carried traffic Network 1 2 Network 2 Network 3 Granularity=.5 % carried traffic Network 1 2 Network 2 Network 3 Figure 2.9: Effect of granularity with varying overload 32
44 LP to Integer Approach As discussed earlier, MIP problems are computationally extensive and complex. Therefore we try to find a solution which is computationally less complex, although the solution may not be optimal. Such a suboptimal solution will be acceptable only if it s performance is close to that of the optimal solution. Since most demands can be satisfied in one or two routes, we propose an approach that seeks an LP solution first and later modifies it to obtain a MIP solution. We first solve the original MIP problem, but do not enforce the variables Ms,σ l to be integer. As a result,m l t s,σt may be a real number. We then round down Ms,σ l to the nearest integer to obtain a MIP solution. t In this section, we compare the difference of the LP-to-Integer approach and the LP approach for all the three networks. The granularity g is set to one to study the worst case performance. In this case, if the demand is split, the traffic demand will be dropped by the LP-to-Integer approach. We plot the combined traffic demands of all VPNs s in a network. In Figure 2.1 we plot the percentage of carried traffic vs the value of alpha. The parameter α controls the amount of the demands as described in Section As α increases, demands between OD pairs also increases but the percentage of carried traffic drops. It can be seen that the LP-to-Integer approach does not carry as much traffic as LP approach in the worst case, but it stays quite close to the LP. The biggest gap between the LP-to-Integer and LP approach is around 4%. This is quite acceptable for saving a lot of computational time when compared to the MIP problem. Effect of Earning Rates In this section, we illustrate the effect of the earning rate e s,σ t on the priorities of routing traffic. We assign different earning rates for the three classes of traffic namely Class A, Class B and Best Effort. We perform the experiment on all the networks considering that all three networks carry all three classes of traffic. The QoS and traffic of each network are routed together. The different service classes are differentiated by the values of e s,σ t. The graphs show the plot of the percentage of carried traffic vs the percentage of demand for different earning rates of all three classes. The Figures 2.11, 2.12 and 2.13, show the effect of earning rate e s,σ t for network 1, network2 and network 3 respectively. We tested the effect of earning rate by setting the values for Class A, Class B and as (1, 1, 1), (3, 2, 1), (9, 2, 1), (9, 6, 3). It can be seen that all the three classes have a different drop precedence. Since the earning rate for Class A is higher when compared to Class B and it is dropped to a much lesser degree. traffic receives lowest priority. As we increase the demand, the traffic class with the lowest earning rates starts dropping. 33
45 Network 1 Network LPtoINT LP Alpha LPtoINT LP Alpha Network LPtoINT LP Alpha Figure 2.1: Comparison of LP and LP-to-INT for all networks 34
46 A,B,=(1,1,1) A,B,=(3,2,1) % carried traffic % carried traffic CLASS B A,B,=(9,2,1) 4 2 CLASS B % carried traffic % carried traffic CLASS B A,B,=(9,6,3) 4 2 CLASS B Figure 2.11: Effect of earning rate for Network 1 35
47 A,B,=(1,1,1) A,B,=(3,2,1) % carried traffic % carried traffic CLASS B A,B,=(9,2,1) 4 2 CLASS B % carried traffic % carried traffic CLASS B A,B,=(9,6,3) 4 2 CLASS B Figure 2.12: Effect of earning rate for Network 2 36
48 A,B,=(1,1,1) A,B,=(3,2,1) % carried traffic % carried traffic CLASS B A,B,=(9,2,1) 4 2 CLASS B % carried traffic % carried traffic CLASS B A,B,=(9,6,3) 4 2 CLASS B Figure 2.13: Effect of earning rate for Network 3 37
49 Onestage and Twostage Routing In this section we further show the effect of earning rate e s,σ t by routing the traffic in two different methods. In the first case, referred to as one stage routing, the high priority QoS traffic and the low priority traffic are routed together. We plot the percentage of carried traffic and the average hop number vs the percentage of demand for all the three networks. The different earning rates for all the classes results in a different drop precedence. In this case, traffic is dropped faster than the QoS traffic as it has a lower earning rate. The traffic is followed by Class B and then Class A. In some cases Class B might have a higher percentage of carried traffic. This is because of the approximation to the LP-to- INT approach, network topology and VPN distribution. The result is shown for both LP and LP-to-INT approach. The average hop number also starts to drop as the demand increases. This is because the route with a larger hop number utilizes more resources and this is undesirable when resources are deficient. In Figures we show the effect of one stage routing for Networks 1, 2 and 3. In two stage routing, the QoS and traffic are routed separately in two different stages. In the first stage, the high priority QoS traffic is routed allowing it to use the available link capacities. In the second stage, the traffic is routed and it uses the residual capacities left after routing QoS traffic. Our results show that in this method of routing, has a higher percentage of carried traffic than in onestage routing. The result is shown for both LP and LP-to-INT approach. The average hop number also starts to drop as the demand increases. This reduces the resource utilization when resources are deficient and helps in maintaining the network revenue. In Figures we show the effect of two stage routing for Networks 1, 2 and 3. It is clearly seen that the percentage of carried traffic for is higher than that in onestage routing. Effect of Hop Constraint In this section we show the performance of QoS traffic under the hop constraint. The hop constraint is set only for Class A and Class B traffic of all VPN s. traffic is unaffected by the hop constraint. We consider two different sets of traffic demands : a light load and a heavy load, to show the effect of the hop constraint. The light load has less demands and is sufficient to carry all the VPN traffic in the network. The heavy load is more than the network can afford, and results in the dropping of demands for certain VPNs. The Figure 2.28, show the performance of each network under light load conditions. We observe that once the hop bound is more then the maximum number of hops, the network acts as if no hop constraint is imposed. At a lower value of the hop number, the percentage of carried traffic for Class A and Class B is low and as the hop number increases the amount of carried traffic also increases. Beyond the maximum hop number, the hop constraint does not have any effect. Also, we observe that the traffic is not affected by the hop constraint. 38
50 In Figure 2.29, we show the performance of the network under heavy load conditions. In this case we observe that all of the traffic is not allocated bandwidth. This is because of the heavy load conditions. When the hop bound is less, the percentage of carried traffic for Class A and Class B is less. But, as the hop bound increases, the network can accommodate more of class A and class B traffic and traffic is dropped due to the heavy load. Carried traffic per VPN Carried traffic per class Average hop number VPN1 2 VPN2 VPN Average Hop Number 1.5 CLASS B Figure 2.14: Effect of e s,σ t CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP for Network 1: One Stage Routing 39
51 Carried traffic for VPN 1 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 2.15: Effect of e s,σ t for Network 1: One Stage Routing 4
52 Carried traffic per VPN Carried traffic per class Average hop number VPN1 VPN2 2 VPN3 VPN Average Hop.5 CLASS B CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP Figure 2.16: Effect of e s,σ t for Network 2: One Stage Routing 41
53 Carried traffic for VPN 1 Carried traffic for VPN CLASS B CLASS B 2 2 Carried traffic for VPN 3 Carried traffic for VPN CLASS B CLASS B 2 2 Figure 2.17: Effect of e s,σ t for Network 2: One Stage Routing 42
54 Carried traffic per VPN Carried traffic per class VPN1 4 VPN2 VPN3 2 VPN4 VPN CLASS B 3.5 Average Hop Average hop number CLASS B Figure 2.18: Effect of e s,σ t for Network 3: One Stage Routing 43
55 Carried traffic for VPN 1 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 2.19: Effect of e s,σ t for Network 3: One Stage Routing 44
56 Carried traffic for VPN 4 Carried traffic for VPN CLASS B CLASS B Comparison of LP and LPtoINT LPtoINT LP Figure 2.2: Effect of e s,σ t for Network 3: One Stage Routing 45
57 Carried traffic per VPN Carried traffic per class Average hop number VPN1 2 VPN2 VPN Average Hop 1.5 CLASS B CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP Figure 2.21: Effect of e s,σ t for Network 1: Two Stage Routing 46
58 Carried traffic for VPN 1 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 2.22: Effect of e s,σ t for Network 1: Two Stage Routing 47
59 Carried traffic per VPN Carried traffic per VPN Average hop number VPN1 VPN2 2 VPN3 VPN Average Hop 1.5 CLASS B CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP Figure 2.23: Effect of e s,σ t for Network 2: Two Stage Routing 48
60 Carried traffic for VPN 1 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 2.24: Effect of e s,σ t for Network 2: Two Stage Routing 49
61 Carried traffic per VPN Carried traffic per class VPN1 4 VPN2 VPN3 2 VPN4 VPN CLASS B 3.5 Average Hop Average hop number CLASS B Figure 2.25: Effect of e s,σ t for Network 3: Two Stage Routing 5
62 Carried traffic for VPN 1 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 2.26: Effect of e s,σ t for Network 3: Two Stage Routing 51
63 Carried traffic for VPN 4 Carried traffic for VPN CLASS B CLASS B Comparison of LP and LPtoINT LPtoINT LP Figure 2.27: Effect of e s,σ t for Network 3: Two Stage Routing 52
64 Network 1 Network CLASS B Hop Number CLASS B Hop Number Network CLASS B Hop Number Figure 2.28: Effect of hop constraint under light load 53
65 8 Network 1 CLASS B 1 Network 2 CLASS B Hop Number Hop Number 1 Network 3 CLASS B Hop Number Figure 2.29: Effect of hop constraint under heavy load 54
66 Chapter 3 Path Protection 3.1 Introduction In this chapter we introduce the path protection algorithms for MPLS Virtual Private Networks.In section (3.2) we review the path protection techniques proposed in [4]. Our approach to path protection in MPLS Virtual Private Networks is introduced in section (3.3). The experimental results for our approach is explained in section (3.4). 3.2 Previous Work In [4], the authors proposed both and 1 : 1 link and node disjoint path protection schemes for an MPLS network.in section 3.2 we explain the method of establishing the backup paths as in [4] and provide the constraints for link disjoint and node disjoint backup. The length of the backup path is important for effective traffic engineering and this is explained in section 3.2. Path Protection schemes Path protection in the network is provided only for the QoS class of traffic. The establishment of the backup path is very similar to that of a primary path. Backup paths are established based on MCF problem P7 for different classes of QoS traffic and OD pairs depending on the kind of service requested. Path protection can be link-disjoint where, none of the links l L in the network are shared by the primary and backup paths for a given OD pair and a given class s. This is to ensure that failure of a certain link on the primary path will not affect the backup path. In node-disjoint path protection the primary and backup paths for a given OD pair and a given class s do not share a common node. This ensures that failure of a node in the primary path will not affect the traffic flow in the backup path. The 1+1 path protection requires two link-disjoint or two node-disjoint label switched paths for a single OD pair. In this scheme all classes of traffic is routed in a single stage. The 1:1 path protection scheme requires that the resources of the backup path are available to preemptible low priority traffic. In this mechanism the traffic is routed in two 55
67 different stages. In the first stage the high priority QoS traffic is routed and in the second stage the low priority Best Effort traffic is routed which uses the residual capacities. The backup path can be easily created as a new OD pair.thus there is an additional OD pair from the same source node to the same destination node. Let σ p be the OD pair for QoS traffic on the primary or the working path and σ b be the OD pair for the backup path. Since the OD pairs for both the primary and backup paths are the same, they will havethesamedemandi.ed σp =D σb.weletf σp =F σb so the bandwidth allocated on the primary and the backup paths are the same. As a result, the traffic on both the paths will be accepted or rejected simultaneously. The backup path can be link disjoint or node disjoint with the primary path. The granularity g is set to 1 to prevent splitting of traffic along multiple LSP s. Hence, there is a single LSP established for each traffic demand. The link-disjoint constraint given in [4] is given below: Y σp,l + Y σb,l D σp, l. (3.1) The constraint (3.1), ensures that the link l is utilized either by the primary path or the backup path, and not both. The node disjoint constraint for the primary path and backup path proposed in [4] is as follows. Y σp,l + Y σb,l D σp, n / T, (3.2) or l L i (n) l L o(n) Y σp,l + l L i (n) l L o(n) Y σb,l D σp, n / S. (3.3) The constraint (3.2) ensures that either the primary path OD pair σ p or the backup path OD pair σ b has the traffic entering node n. Similarly (3.3) ensures that either the OD pair σ p or the OD pair σ b has the traffic leaving node n. T is the set of all source nodes in the network and S is the set of all destination nodes in the network. The above constraints hold good only when the problem is a non-bifurcation problem. Length of the Backup Path While establishing the primary and backup paths, it is possible that the backup path established might be shorter than the primary path. This is undesirable as it prevents efficient traffic engineering. The longer working path will use more resources and cause more delay while there is a shorter available path. The hop constraint discussed earlier ensures that the primary and the backup path will have a limited hop count, but a longer path could still be chosen for the primary path. To prevent this situation, we need to distinguish between the primary and backup paths. Since the longer path uses more network resources, a parameter B σ is introduced to distinguish the utilized resources between the working path and the backup path The MCF problem with the parameter B σ as given in [4] is as follows. maximize e s,σ Fσ s ε B σ Y σ,l. (3.4) σ σ 56 l
68 B σ is used to differentiate the working path and backup path. The parameter B σ is chosen to be larger for the primary path than the backup path. Thus, in (3.4), if a working path utilize more resources than backup path, we will obtain less revenue. Since our objective is to maximize the revenue, this situation will not happen, and we can obtain a shorter working path. 3.3 Our Approach to Path Protection in MPLS VPN s The approach discussed in section(3.2) hold good for a single MPLS network. We have extended this approach to accommodate MPLS Virtual Private Networks Path Protection in MPLS VPN s Path protection is provided depending on the service requested. The technique of establishing backup paths is similar to that presented in section [3.2.1]. In the 1+1 path protection scheme, the primary and the backup path resources are reserved for the high priority QoS traffic. There is no sharing of the backup path resources. The backup path carries a second copy of the traffic on the primary path. The traffic in this method is routed in a single stage path protection can be either link disjoint or node disjoint. In 1 : 1 path protection, the traffic is routed in two separate stages. In the first stage, only the high priority QoS traffic is routed allowing it use all available link capacities. In the second stage, the low priority Best Effort traffic is routed which uses the residual capacities on all the links. In this method, there is a sharing of backup path resources path protection can be implemented as either link disjoint or node disjoint. The notations uses in our approach are given in Table 3.1. The link disjoint constraint for our approach is as follows: Y l s,σ t p + Y l s,σ t b D s,σ t p, l (3.5) The constraint (3.5) ensures that the link l is only utilized by the primary path or the backup path and not both. The node disjoint constraint for our approach is as follows: or l L i (n) l L o(n) Y l s,σ t p + Y l s,σ t p + l L i (n) l L o(n) Y l s,σ t b D s,σ t p, n / T (3.6) Y l s,σ t b D s,σ t p, n / S (3.7) (3.6) ensures that the traffic entering node n is either on the OD pair σp t or on the OD pair σb. t (3.7) ensures that the traffic leaving node n is either on the OD pair σp t or on the 57
69 Table 3.1: Notation of MCF problem for Path Protection of QoS traffic. σp t σb t C l B σ D s,σ t p D s,σ t b S QoS W QoS F s,σ t p F s,σ t b Ys,σ l p t Y l s,σb t Origin Destination pair for vpn t on the primary path Origin Destination pair for vpn t on the backup path Capacity on link l parameter for backup path Bandwidth demand for class s and OD pair σ for VPN t for the primary path Bandwidth demand for class s and OD pair σ for for VPN t the backup path The set of service classes for QoS traffic network revenue for QoS traffic Carried bandwidth for class s,od pair σ p and VPN t on the primary path Carried bandwidth for class s,od pair σ p and VPN t on the backup path Carried bandwidth for class s,od pair σ p and VPN t on the primary path Carried bandwidth for class s,od pair σ p and VPN t on the backup path OD pair σ t b. The above link and node disjoint constraints hold good only for the traffic non-bifurcation case when granularity g is set to one. To ensure that a shorter path is chosen for the primary path and to distinguish between the primary and backup paths, the objective function is modified to include the backup parameter B σ discussed in section 3.2. The objective function in the MCF problem P 1 along with the backup path parameter B σ is as follows: MCF Problem P1: Maximize W QoS = s e s,σ tf s,σ t ɛ t σ s B σ Ys,σ l (3.8) t t σ l The parameter B σ (3.8) ensures that a shorter path is chosen for the primary path than the backup path. 3.4 Experimental Results In this section we present the experimental results for and 1 : 1 link disjoint and node disjoint path protection mechanisms. The graphs verify the efficiency of the path 58
70 protection scheme for different cases including the sharing of the backup resources, the link-disjoint constraint, the node-disjoint constraint and the use of B σ. In Section 3.4.1, the networks used and the experimental configuration is described. In Section??, theresult of the experiments are illustrated and discussed Simulation Configuration The network models used are similar to that of QoS traffic in Section We have two high priority QoS classes Class A and Class B and the low priority Best Effort traffic. Backup paths are established only for the QoS classes of traffic. The bandwidth is assigned for the traffic demand between a OD pair only when both the primary path and backup path can be accommodated for that OD pair. We compare the performance of and 1 : 1 path protection scheme. In path protection, the backup resources of the QoS traffic are not shared by the traffic, the resources of the backup paths are fully occupied by another copy of the carried traffic. In the 1 : 1 path protection, the resources of the backup path are available to the traffic. There is a sharing of resources between the QoS and the traffic classes. The resource of backup paths are considered as the residual capacities available for the traffic. B σ has to be chosen carefully to make sure it does not affect the use of ε. B σ is intended to reduce the importance of resources reserved for backup path comparing to the resources allocated for the primary path. Therefore, B σ is assigned a smaller value in the backup path than in the primary path. In our experiments, we set B σ = 1 for the working path and B σ =.1 for the backup paths and 1:1Path Protection In this section, we show the experimental results and performance of each of the backup schemes. We also show the effect of the parameter B σ in1+1and1:1pathprotection mechanism. We explain the results for the path protection mechanism and 1 : 1 path protection mechanism in the sections that follow. The results for both link and node disjoint path protection mechanisms is shown. 1+1 Link Disjoint Path Protection In Figures we show the results of link-disjoint path protection scheme with B σ for network 1.In Figures we show the results of link-disjoint path 59
71 protection scheme with B σ for network 2. In Figures we show the results of link-disjoint path protection scheme with B σ for network 3. The percentage of carried traffic, average hop number and backup average hop number are plotted vs the percentage of demand. The percentage of carried traffic for each class of each VPN is also shown. The results are shown both for LP and LP-to-INT. The LPI solution shows the round off effect with the increase in demand. As the traffic demand increases, the percentage of traffic carried drops. The difference from the QoS traffic experiment using two stage routing is that all classes of traffic drops early because of the demand of the backup path.the traffic is dropped first due to its lower priority followed by the other QoS classes. early because of the backup provided to class A and class B. It is seen that the average backup hop number is larger compared the average hop number of working path. This shows that a longer path is selected for the backup path.it is also seen that as the demand increases the average hop number also drops. This is done to conserve resources as a longer path would utilize more resources. We also show the link-disjoint path protection scheme without differentiation between the working path and backup path i.e without the parameter B σ in 3.3, 3.7 and 3.11 for networks 1,2 and 3. We observe from the graphs that the average backup hop number is smaller compared to the average hop number of working path showing the effect of B σ. 1+1 Node Disjoint Path Protection In Figures we show the results of node-disjoint path protection scheme with B σ for network 1. In Figures we show the results of node-disjoint path protection scheme with B σ for network 2. In Figures we show the results of 1+1 node-disjoint path protection scheme with B σ for network 3.The percentage of carried traffic, average hop number and backup average hop number are plotted vs the percentage of demand. The results are shown both for LP and LP-to-INT. The results are similar to link disjoint backup scheme except that the QoS traffic of each VPN is dropped earlier. This is because it is difficult to establish a node disjoint backup path when compared to a link disjoint backup path. We see that the average hop number also drops as the demand increases as in the link protection scheme. The effect of the parameter B σ is also seen. In Figures 3.14, 3.18 and 3.22 we show the node-disjoint path protection scheme without differentiation between the working path and backup path i.e without the parameter B σ. We observe from the graphs that the average backup hop number is smaller compared the average hop number of working path showing the effect of B σ that a shorter path is chosen for the backup path in the absence of B σ. The percentage of carried traffic drops as the demand increases and is faster than the drop in case of the link disjoint backup. 6
72 Carried traffic per VPN Carried traffic per class VPN1 2 VPN2 VPN3 Average Hop CLASS B Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B Figure 3.1: 1+1 link disjoint path protection with B σ for Network 1 61
73 Carried traffic for VPN 1 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP Figure 3.2: 1+1 link disjoint path protection with B σ for Network 1 62
74 Carried traffic per VPN Carried traffic per class VPN1 2 VPN2 VPN3 Average Hop CLASS B Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B Figure 3.3: 1+1 link disjoint path protection without B σ for Network 1 63
75 Carried traffic per VPN 4 VPN1 VPN2 2 VPN3 VPN Carried traffic per class 4 2 CLASS B Carried traffic for VPN CLASS B Figure 3.4: 1+1 link disjoint path protection with B σ for Network 2 64
76 Carried traffic for VPN 2 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 3.5: 1+1 link disjoint path protection with B σ for Network 2 65
77 Average hop number Average Hop.5 CLASS B Average backup hop number Average Backup Hop.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.6: 1+1 link disjoint path protection with B σ for Network 2 66
78 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.7: 1+1 link disjoint path protection without B σ for Network 2 67
79 Carried traffic per VPN VPN1 VPN2 VPN3 VPN4 VPN Carried traffic per class CLASS B 2 2 Carried traffic for VPN CLASS B 2 Figure 3.8: 1+1 link disjoint path protection with B σ for Network 3 68
80 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B Carried traffic for VPN 3 2 CLASS B Carried traffic for VPN CLASS B Figure 3.9: 1+1 link disjoint path protection with B σ for Network 3 69
81 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop 1 CLASS B Comparison of LP and LPtoINT LPtoINT LP Figure 3.1: 1+1 link disjoint path protection with B σ for Network 3 7
82 Average Hop Average Backup Hop 4 3 Average hop number CLASS B Average backup hop CLASS B Comparison of LP and LPtoINT LPtoINT LP Figure 3.11: 1+1 link disjoint path protection without B σ for Network 3 71
83 12 Carried traffic per VPN 12 Carried traffic per class Average hop number VPN1 2 VPN2 VPN Average Hop.5 CLASS B Average backup hop number CLASS B Average Backup Hop.5 CLASS B Figure 3.12: 1+1 node disjoint path protection with B σ for Network 1 72
84 12 Carried traffic for VPN 1 12 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN 3 12 Comparison of LP and LPtoINT CLASS B LPtoINT LP Figure 3.13: 1+1 node disjoint path protection with B σ for Network 1 73
85 12 Carried traffic per VPN 12 Carried traffic per class VPN1 2 VPN2 VPN CLASS B 3.5 Average Hop Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B Figure 3.14: 1+1 node disjoint path protection without B σ for Network 1 74
86 12 Carried traffic per VPN 12 Carried traffic per class VPN1 VPN2 2 VPN3 VPN CLASS B Carried traffic for VPN CLASS B Figure 3.15: 1+1 node disjoint path protection with B σ for Network 2 75
87 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B Figure 3.16: 1+1 node disjoint path protection with B σ for Network 2 76
88 Average Hop 3.5 Average Backup Hop Average hop number CLASS B Average backup hop CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.17: 1+1 node disjoint path protection with B σ for Network 2 77
89 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.18: 1+1 node disjoint path protection without B σ for Network 2 78
90 12 Carried traffic per VPN 12 Carried traffic per class VPN1 4 VPN2 VPN3 2 VPN4 VPN CLASS B Carried traffic for VPN CLASS B Figure 3.19: 1+1 node disjoint path protection with B σ for Network 3 79
91 Carried traffic for VPN CLASS B Carried traffic for VPN Carried traffic for VPN 3 2 CLASS B Carried traffic for VPN CLASS B CLASS B Figure 3.2: 1+1 node disjoint path protection with B σ for Network 3 8
92 Average hop number Average Hop.5 CLASS B Average backup hop number Average Backup Hop 1 CLASS B Comparison of LP and LPtoINT LPtoINT LP Figure 3.21: 1+1 node disjoint path protection with B σ for Network 3 81
93 Average hop number Average Hop 1.5 CLASS B Comparison of LP and LPtoINT Average backup hop number Average Backup Hop.5 CLASS B LPtoINT LP Figure 3.22: 1+1 node disjoint path protection without B σ for Network 3 82
94 1:1Link Disjoint Path Protection In Figures we show the results of 1 : 1 link-disjoint path protection scheme with B σ for network 1. In Figures we show the results of 1 : 1 link-disjoint path protection scheme with B σ for network 2. In Figures we show the results of 1 : 1 link-disjoint path protection scheme with B σ for network 3. The percentage of carried traffic, average hop number and backup average hop number are plotted vs the percentage of demand.the results are shown both for LP and LP-to-INT. T As the traffic demand increases, the percentage of traffic carried drops. The percentage of traffic carried for the QoS classes of traffic is the same as in the path protection scheme. But, the traffic has a higher percentage of carried traffic. This is because the resources of the backup path are available to the traffic. It is seen that the average backup hop number is larger compared to the average hop number of working path. This shows that a longer path is selected for the backup path.it is also seen that as the demand increases the average hop number also drops. This is done to conserve resources as a longer path would utilize more resources. In Figures 3.25, 3.29 and 3.33 we show the 1 : 1 link-disjoint path protection scheme without differentiation between the working path and backup path i.e without the parameter B σ. We observe from the graphs that the average backup hop number is smaller compared the average hop number of working path showing the effect of B σ. 1:1Node Disjoint Path Protection In Figures we show the results of 1 : 1 node-disjoint path protection scheme with B σ for network 1. In Figures we show the results of 1 : 1 node-disjoint path protection scheme with B σ for network 2. In Figures we show the results of 1 : 1 node-disjoint path protection scheme with B σ for network 3. The percentage of carried traffic, average hop number and backup average hop number vs the percentage of the demand is plotted. The results are shown both for LP and LPto-INT. The results are similar to link disjoint backup scheme except that the QoS traffic of each VPN is dropped earlier. This is because it is difficult to establish a node disjoint backup path. We see that the average hop number also drops as the demand increases as in the link protection scheme. The effect of the parameter B σ is also seen. In Figures 3.36, 3.4 and 3.44 we show the 1 : 1 node-disjoint path protection scheme without differentiation between the working path and backup path i.e without the parameter B σ. We observe from the graphs that the average backup hop number is smaller compared the average hop number of working path showing the effect of B σ. 83
95 Carried traffic per VPN Carried traffic per class Average hop number VPN1 2 VPN2 VPN Average Hop.5 CLASS B Average backup hop number CLASS B Average Backup Hop.5 CLASS B Figure 3.23: 1:1 link disjoint path protection with B σ for Network 1 84
96 Carried traffic for VPN 1 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B CLASS B Comparison of LP and LPtoINT 2 LPtoINT LP Figure 3.24: 1:1 link disjoint path protection with B σ for Network 1 85
97 Carried traffic per VPN Carried traffic per class VPN1 2 VPN2 VPN CLASS B 3.5 Average Hop Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B Figure 3.25: 1:1 link disjoint path protection without B σ for Network 1 86
98 Carried traffic per VPN 4 VPN1 VPN2 2 VPN3 VPN Carried traffic per class 4 2 CLASS B Carried traffic for VPN CLASS B Figure 3.26: 1:1 link disjoint path protection with B σ for Network 2 87
99 Carried traffic for VPN 2 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 3.27: 1:1 link disjoint path protection with B σ for Network 2 88
100 Average Hop Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.28: 1:1 link disjoint path protection with B σ for Network 2 89
101 Average Hop Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.29: 1:1 link disjoint path protection without B σ for Network 2 9
102 Carried traffic per VPN VPN1 VPN2 VPN3 VPN4 VPN Carried traffic per class CLASS B 2 2 Carried traffic for VPN CLASS B 2 Figure 3.3: 1:1 link disjoint path protection with B σ for Network 3 91
103 Carried traffic for VPN CLASS B Carried traffic for VPN CLASS B Carried traffic for VPN 3 2 CLASS B Carried traffic for VPN CLASS B Figure 3.31: 1:1 link disjoint path protection with B σ for Network 3 92
104 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop 1 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.32: 1:1 link disjoint path protection with B σ for Network 3 93
105 Average Hop Average Backup Hop 4 3 Average hop number CLASS B Average backup hop CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.33: 1:1 link disjoint path protection without B σ for Network 3 94
106 Average hop number Carried traffic per VPN VPN1 2 VPN2 VPN Average Hop.5 CLASS B Average backup hop number Carried traffic per class 4 2 CLASS B Average Backup Hop.5 CLASS B Figure 3.34: 1:1 node disjoint path protection with B σ for Network 1 95
107 12 Carried traffic for VPN 1 12 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN 3 12 Comparison of LP and LPtoINT CLASS B LPtoINT LP Figure 3.35: 1:1 node disjoint path protection with B σ for Network 1 96
108 Carried traffic per VPN VPN1 2 VPN2 VPN3 Average Hop Carried traffic per class 4 2 CLASS B Average Backup Hop Average hop number CLASS B Average backup hop number CLASS B Figure 3.36: 1:1 node disjoint path protection without B σ for Network 1 97
109 Carried traffic per VPN 4 VPN1 VPN2 2 VPN3 VPN Carried traffic per class 4 2 CLASS B Carried traffic for VPN CLASS B Figure 3.37: 1:1 node disjoint path protection with B σ for Network 2 98
110 Carried traffic for VPN 2 Carried traffic for VPN CLASS B CLASS B Carried traffic for VPN CLASS B Figure 3.38: 1:1 node disjoint path protection with B σ for Network 2 99
111 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop 1.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.39: 1:1 node disjoint path protection with B σ for Network 2 1
112 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.4: 1:1 node disjoint path protection without B σ for Network 2 11
113 12 Carried traffic per VPN 12 Carried traffic per class VPN1 4 VPN2 VPN3 2 VPN4 VPN CLASS B Carried traffic for VPN CLASS B Figure 3.41: 1:1 node disjoint path protection with B σ for Network 3 12
114 Carried traffic for VPN CLASS B Carried traffic for VPN Carried traffic for VPN 3 2 CLASS B Carried traffic for VPN CLASS B CLASS B Figure 3.42: 1:1 node disjoint path protection with B σ for Network 3 13
115 Average hop number Average Hop 1.5 CLASS B Average backup hop number Average Backup Hop 1 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.43: 1:1 node disjoint path protection with B σ for Network 3 14
116 Average hop number Average Hop 1 CLASS B Average backup hop number Average Backup Hop.5 CLASS B 12 Comparison of LP and LPtoINT LPtoINT LP Figure 3.44: 1:1 node disjoint path protection without B σ for Network 3 15
117 Chapter 4 Conclusion In this thesis, we proposed several approaches to offline constraint-based routing algorithms for MPLS VPNs. We reviewed several algorithms from literature on MPLS network to extend the approach to VPNs. We implemented the route based and link based routing techniques for QoS and traffic. We modified the route based routing technique to accommodate MPLS VPN s. Thus, it is possible to specify certain admissible route sets for each OD pair and each class of traffic for each of the VPN s in the MPLS network. We modified the objective function to accommodate MPLS VPN s and also to account for utilization of network resources. We also modified the link based routing algorithm discussed in the literature to accommodate routing of QoS and traffic in MPLS VPN s. We also studied the effect of parameters such as epsilon, granularity and earning rate on traffic routed in the network. We implemented onestage and twostage routing of QoS and traffic to show the effect of different earning rates and priorities in the network. We also studied the effect of hop count on routing under light and heavy load conditions. Our algorithms also supported various path protection schemes such as and 1 : 1 link disjoint and node disjoint for link based routing of QoS traffic. Our approach is scalable and can be employed to large number of VPNs as inferred from the results. The algorithms were simulated on three networks (US abstract network and two hierarchical synthetic networks). In order to overcome the computational complexity of solving MIP problems, we used the LP -to-integer approach discussed in [4]. We also studied the comparison of the results obtained from the LP and LP-to-Integer approach.the approximation provides an optimal result as seen from the graphs. 16
118 Bibliography [1] D.Mitra and K.G. Ramakrishnan, A case study of multiservice multipriority traffic engineering design for data networks, IEEE GLOCOM, 1999, pp [2] Xipeng Xiao, Alan Hannan, Brook Bailey and Lionel Ni, Traffic engineering with MPLS in the Internet, IEEE Network Magazine, pp.28-33,march 2. [3] D.Awduche, J.Malcolm, J.Agogbus, M.O Dell and J.McManus, Requirements for Traffic Engineering over MPLS, RFC 271, Sept [4] Chung-Yu Wei, Traffic Engineering in MPLS Networks, Master s Thesis, December 23 [5] Chung Tung Chou, Traffic Engineering for MPLS based Virtual Private Networks, hhtp:// Oct 23 [6] David Applegate,Mikel Thorrup, Load optimal MPLS Routing with N + M Labels, IEEE INFOCOM, 22 [7] Mort Naraghi-Pour and Manju V. Hedge, Path Protection in MPLS Networks, Celox Networks, Inc, November, 21. [8] M.K. Girish, Z. Bei, and J. Hu, Formulation of the Traffic Engineering Problems in MPLS based IP Networks, INFOCOM, 2. [9] Manju Hegde, Mort Naraghi-Pour, Engineering traffic in MPLS networks, [1] Y Wang,Z Wang, Explicit Routing Algorithms for Internet Traffic Engineering, ICCCN,1999. [11] Youngseok Lee, Yongho Seok, Yanghee Choi and Changhoon Kim, A Constrained Multipath Traffic Engineering Scheme for MPLS Networks, IEEE, 22, pp [12] E. W. Zegura, GT-ITM: Georgia tech internetwork topology models (software),
119 [13] ILOG CPLEX, [14] Mort Naraghi-Pour and Manju V. Hedge, Path Protection in MPLS Networks, Celox Networks, Inc, November, 21. [15] M.K. Girish, Z. Bei, and J. Hu, Formulation of the Traffic Engineering Problems in MPLS based IP Networks, INFOCOM, 2. [16] Changcheng Huang, Vishal Sharma, Ken Owens and Srnivas, Building Reliable MPLS Networks Using a Path Protection Mechanism, IEEE Communications Magazine, March 22. [17] Teunis Ott, Tony Bogovic, Tami Carpenter, K.R. Krishnan, and David Shallcross, Algorithm for Flow Allocation for Multi Protocol Label Switching, Telcordia Technologies, Inc, Auguest. 2. [18] E. Rosen, A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture, RFC 331, 21. [19] E. Rosen, Y. Rekhter BGP/MPLS VPN s, RFC 2547, [2] 18
120 Vita Pooja S Aniker is from Bangalore which is in the Southern part of India. She received her Bachelor of Engineering degree in Electronics and Communication from M.S. Ramaiah Institute of Technology,Bangalore University, Bangalore in 21. She enrolled in the Department of Electrical and Computer Engineering at Louisiana State University, Baton Rouge, Louisiana, USA in the Fall of 22 and will receive her Master of Science in Electrical Engineering degree majoring in communication in Spring
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
OPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
IP, Ethernet and MPLS
IP, Ethernet and MPLS Networks Resource and Fault Management Andre Perez ISTE WILEY Table of Contents Preface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.1.1. Layered structure 1 1.1.2. LANs
All Rights Reserved - Library of University of Jordan - Center of Thesis Deposit
iii DEDICATION To my parents, my wife, my brothers and sisters, and my son for their encouragement, and help during this thesis. iv ACKNOWLEDGEMENT I would like to thank my supervisor prof. Jameel Ayoub
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
QoS Performance Evaluation in BGP/MPLS VPN
1 QoS Performance Evaluation in BGP/MPLS VPN M. C. Castro, N. A. Nassif and W. C. Borelli 1 Abstract-- The recent exponential growth of the Internet has encouraged more applications, users and services
MPLS Multiprotocol Label Switching
MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Overview. QoS, Traffic Engineering and Control- Plane Signaling in the Internet. Telematics group University of Göttingen, Germany. Dr.
Vorlesung Telematik (Computer Networks) WS2004/05 Overview QoS, Traffic Engineering and Control- Plane Signaling in the Internet Dr. Xiaoming Fu Recent trends in network traffic and capacity QoS principles:
WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing
WHITE PAPER Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing www.ixiacom.com 915-1838-01 Rev. C, January 2014 2 Table of Contents Abstract... 4 Introduction... 4 What is MPLS?...
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
Overlay Networks and Tunneling Reading: 4.5, 9.4
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30 2:50 in COS 105) Mike Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos461/
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Figure 1: Network Topology
Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,
Multi-Protocol Label Switching To Support Quality of Service Needs
Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD
IP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
MPLS. Packet switching vs. circuit switching Virtual circuits
MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE
CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Industry s First QoS- Enhanced MPLS TE Solution
Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, [email protected] Contact Info: Kim Gibbons, [email protected],, 408-525 525-4909 1 Agenda MPLS Traffic Engineering
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
Internet traffic engineering using multi-protocol label switching (MPLS)
Computer Networks 40 (2002) 111 129 Invited Paper Internet traffic engineering using multi-protocol label switching (MPLS) Daniel O. Awduche a, Bijan Jabbari b, * a Movaz Networks, One Technology Parkway
Evolution of QoS routing in the Internet
Evolution of QoS routing in the Internet Olivier Bonaventure Dept. Computing Science and Engineering Université catholique de Louvain http://www.info.ucl.ac.be/people/obo June 4th, 2004 Page 1 Agenda Routing
Using OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson
MPLS VPNs with DiffServ A QoS Performance study
Technical report, IDE1104, February 2011 MPLS VPNs with DiffServ A QoS Performance study Master s Thesis in Computer Network Engineering Azhar Shabbir Khan Bilal Afzal School of Information Science, Computer
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK
ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA [email protected]
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
MPLS Part II - Recovery
MPLS Part II - Recovery Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Network management and QoS provisioning - QoS in the Internet
QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
