Operational Cost Factor Consideration of Path Management Method for MPLS Networks
|
|
|
- Kristian Bennett
- 10 years ago
- Views:
Transcription
1 Operational Cost Factor Consideration of Path Management Method for MPLS Networks Motoi Iwashita, and Masayuki Tsujino Abstract The recent improvements in broadband networks are enabling network carriers and providers to provide multiprotocol label switching (MPLS)- based dedicated services for enterprise customers. These dedicated services will be widely introduced in interconnected networks to meet the demand of enterprise customers. Since end-to-end connection will be more complicated in interconnecting networks, path (end-to-end route) management will be important to enable quick reaction to failures to ensure customer satisfaction. We propose a path management method in MPLS networks, which is combined with the following two methods. A method in which a link stores an adjacent link identifier, and the edge node identifier is stored at an edge link A method in which all links store edge node identifiers The proposed method is evaluated in terms of operational cost factors for the ability to search for users whose service has failed and the ease of changing managed objects in interconnected networks. Keywords: OSS (Operation Support system), path management, management system architecture, MPLS 1 Introduction Recent improvements in broadband networks are enabling network carriers and providers to provide a variety of new services. Dedicated services, such as widearea Ethernet and IP-VPN, have become popular, especially among enterprise customers [1, 2, 3]. Such services introduce multiprotocol label switching (MPLS) [4] and virtual private network (VPN) techniques over a layer 2/layer 3 path to achieve the desired quality of service and to maintain security. These services will be widely introduced in several interconnected networks through an open interface in the next-generation network (NGN) era to meet the demands of enterprise customers. This is because enterprise customers are eager to use more attractive services at a low cost to communicate with their NTT Service Integration Laboratories, Tokyo JAPAN , Tel/Fax: / [email protected], [email protected] affiliate/alliance companies or branch offices efficiently, and they select suitable networks depending on their locations. Therefore, path (end-to-end route) connection will become complicated, and path management is the key factor for enabling quick reactions to failures to ensure customer satisfaction. MPLS is an effective technique for providing dedicated services for enterprise customers. Since the management (operation, administration, and maintenance) cost is far greater than initial (system development) cost, an effective and economic management method is required. Therefore, path management with low operational cost needs to be established in these conditions. Uno and Kokubun give an overview of resource management architectures for access networks [5]. Matsuura et al. proposed the architecture of resource management in multilayer networks such as the cable, path, and circuit layers [6]. Kimura et al. [7], Ejiri and Iseda [8], and Fujii [9] discussed guidelines for the relationship between resources and service management functions. However, no papers have discussed the path management method from the operational point of view. We present a method for path management in MPLS networks where several networks are interconnected. 2 Feature of network and technology 2.1 Network assumptions Network carriers provide IP-based dedicated services, such as IP-VPN and VLAN, for enterprise customers. We assume that each enterprise customer is provided the service on each network, that is, Network A and Network B provide services to Customer A and Customer B, respectively, as shown in the upper part of Fig. 1. To integrate both services and make them useful for enterprise customers in the NGN era, both networks are interconnected through the network interface, and the services are offered in a wider area, as shown in the lower part of Fig. 1. The networks frequently change the path accommodating the user in that situation. Therefore, the number of managed paths increases and their management becomes complicated.
2 3 Basic methods of path management in networks 3.1 Requirements for path management Quick failure diagnosis and confirmation of affected customers are the most important tasks from the viewpoint of restoring network operation after a failure. Moreover, the effect on customers caused by changing managed facilities should also be considered. The following two conditions are requirements for path management. 1)Confirm that the network accommodates the specified terminal information. Figure 1: Service integration for enterprise use in NGN era. 2)Confirm that terminals are accommodated by the specified network facility. 3.2 Representation In this section, key items for managing the path are described. First, a graph is described for preparation. For any N (node set) and L (link set), there is a graph such that G = (N, L), where n i N (i = 1, 2,, N ), l j (j = 1, 2,, L ). L Figure 2: MPLS label stacking. 2.2 Features of MPLS in terms of path management This paper focuses on MPLS for IP-based dedicated services. MPLS is a label-switching technique with an MPLS node for a label switching path (LSP) [4]. Label stacking is an efficient, hierarchical technique of MPLS, as shown in Fig. 2. An ingress node (node #1 in Fig. 2) Algorithm 1 (A1) adds a label (label #2 in Fig. 2) and forwards packets to an adjacent node (node #2 in Fig. 2). Node #2 swaps label #2 for label #3 and relays the packets to node #3. Node #3 swaps label #3 for #6 and adds (pops) label #4 to make a label stack. After the packets arrive at node #5, the stack label is removed (pushed). Node #6 swaps label #6 for label #7, and the packet reaches node #7 at the final step. In network resource management, the relationship between packet labels and label stack links should be maintained in addition to basic management of the relationship between nodes and links. A path is defined as the route from node #1 to node #7 in Fig. 2. Define n i N (i = 1, 2,, N ), where N N when a pair of nodes (n i, n j ) is selected and the suffixes of nodes between them are reordered. We assume that there is only one route between two end nodes. 3.3 Following link identifier (FLID) method As a basic rule, a terminal stores the identifier of the edge node to which it is connected, and an edge node stores the identifiers of all the terminals connected to it. Nodes and links store the identifiers of their corresponding links and nodes. We present a method of storing adjacent link identifiers on each link in which path management requirements are met, as shown in the following steps and in Fig. 3. #1: Store terminal identifiers u 1 and u N in node identifiers n 1 and n N, respectively #2: Node identifier n i stores adjacent link identifiers l i 1 and l i (i = 1, 2,, N) where l 0 and l N = {φ} #3: l i stores adjacent node identifiers n i and n i+1 (i = 1, 2,, N 1) #4: l i stores adjacent link identifier l i 1 and l i+1 (i = 1, 2,, N 1) where l 0 and l N = {φ}
3 Figure 3: FLID. Figure 4: FNID. #5: In using the label stack technique, the link stores the corresponding link identifier. That is, when the route between l h and l k introduces label stacks, l h 1 and l k+1 store the identifiers of l k+1 and l h 1, respectively. The number of stored link identifiers increases at a link using label stacking when the number of stacks increases. The route between terminals and the terminals contained in a link can be calculated using this path management method. 3.4 Following node identifier (FNID) method As a basic rule, the terminal stores the identifier of the connected edge node and vice versa. Nodes and links store each other s corresponding links and nodes. A method where all links store edge node identifiers is presented to meet the requirements of path management, as shown in the following steps and in Fig. 4. Algorithm 2 (A2) #1: Store terminal identifiers u 1 and u N in node identifiers n 1 and n N, respectively #2: Node identifier n i stores adjacent link identifiers l i 1 and l i (i = 1, 2,, N), where l 0 and l N = {φ} #3: l i stores adjacent node identifiers n i and n i+1 (i = 1, 2,, N 1) #4: For any l i (i = 1, 2,, N), store identifier of a pair of {n 1, n N } The number of stored terminal identifiers increases at a link when the number of terminals increases. This path management method can be used to calculate the route between terminals and the terminals contained in a link. Figure 5: Layered ring network. 4 Application to interconnected networks 4.1 Layered ring networks A telecommunication transport network generally consists of access and core networks. An access network is the lowest layer network, while a core network contains several layer networks depending on transmitted traffic volume and area coverage. Furthermore, to assure high reliability with a redundant route, the dedicated services are provided by the network based on a ring topology. Therefore, we assume that a network consists of a layered ring network, as shown in Fig. 5. We apply the label stack technique when the two edge nodes connect through the upper-layer networks, as indicated by label stack arrow #1 in Fig New management methods Generally speaking, the layered ring network has the following features. The lower the layer, the more links and nodes there are. Therefore, lower-layer networks accommodate many customers.
4 Changes in managed object accommodation seldom occur in upper-layer networks, whereas the frequency of changing managed objects is high in lower-layer networks. A method for shortening the searching time is effective for a lower layer, while a method for reducing the number of changes is effective for an upper-layer one. We present the following method, which is based on the two previously described methods. Proposed algorithm Combination Method (CM): Let C define the boundary layer between upper and lower layers. We apply the following algorithms for a given i. 1. If i C, then apply FNID. 2. If i > C, then apply FLID. Identifiers stored at the link represent edge nodes in i = C. 3. Manage i = C and C + 1 as follows. In the case of a network with i = C +1, the adjacent boundary link in a C network should be stored at the boundary link. In the case of an i = C network, both boundary edge nodes in a C + 1 network should be stored at all corresponding links in the C network. Let us consider the case of interconnected networks. If we assume C 1, the number of links to search for affected customers is very large. This is because the number of rings in lower-layer networks is much larger than that in upper-layer networks. Therefore, much time will be needed to search for affected customers. Therefore, C = 1 is suitable in interconnected networks to reduce the management work. 4.3 Network model assumptions Let us make the following assumptions for constructing and evaluating our proposed method by referencing real networks. For M as the highest layer, the maximum number of rings in layer i is given by 4 M i. 1 N 4 for any i where 2 i M, that is a ring in Layer 2 or the upper-layer networks has a connection with 4 lower-layer rings. 1 N 10 for i = 1; that is, a ring has 10 edge nodes at most. M 4, which corresponds to 4 layers like the Japanese PSTN. 4.4 Evaluation of ability to search for affected customers Let us compare CM with FLID and FNID quantitatively. The following assumptions are made for this evaluation. The failure rate for the section (the route among two adjacent nodes including the bundle of links) is constant independent of the layer and area. We consider one section failure; multiple failures do not occur. Let the failure rate of the section be represented by P f. Then the failure rate has the following relationship. Σ(P f ) 1 Let us define the number of searched links for affected customers when a section failure occurs as H F LID(l), H F NID(l), and H CM(l). (1) Total number of searched links for FLID: H F LID = Σ(P f H F LID(l) ) (2) Total number of searched links for FNID: H F NID = Σ(P f ) (3) Total number of searched links for CM: H CM = Σ l (P f ) + Σ l (P f H F LID(l) ) The results are compared in Fig. 6. The Hs of all methods increase as M increases. Since H is the number of searched links for affected customers during the observing period, it is necessary that H < 1. H F NID is the smallest, while H F LID is very large because of the large number of layer-1 rings. H F LID > 1 as M increases, so it is impossible to use it in this situation. Since H CM applies to FNID for layer-1, H < 1 is achieved even in the case of M = Evaluation by ease of changing managed objects CM is quantitatively compared with FLID and FNID in terms of how easy it is to change managed objects. The following assumptions were made for this evaluation. Although it is impossible to know the number of occurrences of each case during a year, all cases are assumed to have occurred during a year. An end-toend path was installed in advance among all nodes in layer-1 rings. Customers provided with point-to-point service were considered in the evaluation.
5 Figure 6: Comparison of number of searched links for affected customers. The total number of links changed is defined as the link count. Let us define the total number of links changed as K F LID, K F NID, K CM, respectively. Total number of changed links for FLID: K F LID = Σ M i=1 N i(n i 1)/2 4 M i Total number of changed links for FNID: K F NID =N 1 (N 1 1)/2 4 M 1 +N 1 (N 1 1) Π M i=2 N i(n i 1)/2 Total number of changed links for CM: K CM = K F LID The results are compared in Fig. 7. The Ks of all methods increased as M increased. K F LID and K CM where the smallest, while K F NID was very large because of the large number of links changed. Since the numbers of links changed for K F LID and K CM were much smaller than that of K F NID, the probability of miss-operation for FLID and CM is small. Considering both results, CM is far superior to FLID and FNID. 5 Interconnecting procedures Let us consider interconnecting networks. There are three patterns: (1) both networks are managed by FLID, (2) both networks are managed by FNID and (3) one network is managed by FLID and the other is managed by FNID. The application of each pattern depends on which layers are interconnected. Figure 8 shows the methods in these three cases. 1. Managed with FLID Figure 7: Comparison of number of changed links. Figure 8(a) shows both Networks A and B managed with FLID. In this case, each boundary link in each network stores adjacent boundary link identifiers. The link in a lower layer of the label stack stores the corresponding link identifier if the connected link is in a higher layer of the label stack. 2. Managed with FNID Figure 8(b) shows both Networks A and B managed with FNID. In this situation, all links in both networks between two edge nodes should store both edge node identifiers. 3. Managed with both algorithms Figure 8(c) shows Network A managed with FLID while Network B managed with FNID. In the case of Network A, the adjacent boundary link in another network should be stored at the boundary link. Moreover, the link in a lower layer of the label stack should store the corresponding link identifier, if the connected link is in the higher layer of the label stack. In the case of Network B, all links in Network B should store another edge node identifier as additional input. 6 Conclusions Dedicated services based on MPLS networks will be widely introduced in interconnected networks to meet the demand of enterprise customers. Since end-to-end connection will be more complicated in interconnecting networks, path management will be important to enable quick reaction to failures to ensure customer satisfaction. The specification of key items was firstly described with the following methods for path management.
6 [6] Matsuura, M., Tago, M., Minato, K., Yata, K., A Management Methodology Consideration in Multi- Layer Networks, Technical Report of IEICE, TM99-75, pp.51-56, 2000 [7] Kimura, T., Ohyama, T., Miyoshi, Y., Iwasaki, A., A Study on OSS Architecture with Multi-Layers and Multi-Vendor Support, Technical Report of IE- ICE, TM , pp.13-18, 2000 [8] Ejiri, M., Iseda, K., Telecommunication Management [I]: Telecommunication Management Concept and Information Model, Journal of IEICE, Vol. 83, No. 8, pp , 2000 Figure 8: Interconnecting procedures. [9] Fujii, N., Telecommunication Management [II]: TMN Integrated Management and OSI Systems Management, Journal of IEICE, Vol. 83, No. 9, pp , The method in which a link stores an adjacent link identifier and the edge node identifier is stored at an edge link (FLID), 2. The method in which all links store edge node identifiers (FNID). We assume that the interconnected networks consist of a layered ring network, and a new method applies FNID in lower-layer networks and FLID in upper-layer networks (CM). CM was evaluated quantitatively in terms of operational cost factors for the ability to search for users whose service has failed and the ease of changing managed objects in interconnected networks. A consideration of partial failure of links for these mechanisms is a topic for further study. References [1] White paper on telecommunications, pp. 89, [2] Ono, K., Vision of e-vlan as a wide-area LAN service, NTT Technical Journal, Vol. 15, No. 1, pp [3] Ohsaki, K., Maeda, Y., Moriya, H., Shimokawa, M., Constructing technique of IP router networks, NTT Docomo Technical Journal, Vol. 12, No. 1, pp , 2004 [4] Rosen, E., Viswanathan, A., Callon, R., Multiprotocol Label Switching Architecture, 3031, 2001 [5] Uno, H., Kokubun, T., A New OSS Architecture to Meet Business Process Changing, Trans. on IEICE, Vol. J84-B, No. 3, pp , 2001
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
Research and Development of IP and Optical Networking
: The Future of IP and Optical Networking Research and Development of IP and Optical Networking Kohei Shiomoto, Ichiro Inoue, Ryuichi Matsuzaki, and Eiji Oki Abstract This article presents the targets,
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
IP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected]
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania [email protected] Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
Simwood Carrier Ethernet
Simwood Carrier Ethernet Simwood Carrier Ethernet is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use a number of technologies on top of our own
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
GR2000: a Gigabit Router for a Guaranteed Network
Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate
Multi Protocol Label Switching with Quality of Service in High Speed Computer Network
Multi Protocol Label Switching with Quality of Service in High Speed Computer Network Jitendra Joshi, Sonali Gupta, Priti Gupta, Nisha Singh, Manjari Kumari Department of Computer Science and Engineering
EVALUATING NETWORKING TECHNOLOGIES
WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
How To Manage A Network Management System (Hitachi)
Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
Product Presentation L2 MPLS Services. Aircel Business Solutions
Product Presentation L2 MPLS Services Aircel Business Solutions Aircel Business Solutions o GSM Service provider with license to operate in 23 telecom circles of India o 20Million+ subscribers in India
Terms VON. VoIP LAN WAN CODEC
VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
ICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
Datawire Secure Transport Value Proposition
Transport Value Proposition Contents: What is Transport? Transport is a patented connectivity service Datawire Defined that transports financial transactions securely and reliably over Datawire Value Proposition
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
Unifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,
Service Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
Zarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Bandwidth Management in MPLS Networks
Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory e mail: dragoss, dragosr,
How To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
International Civil Aviation Organization
ATNICG/8 WP/09 Agenda Item 04 18/03/13 International Civil Aviation Organization THE EIGHTH MEETING OF AERONAUTICAL TELECOMMUNICATION NETWORK (ATN) IMPLEMENTATION CO-ORDINATION GROUP OF APANPIRG (ATNICG/8)
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
IP/MPLS Networks for Public Safety
APPLICATION NOTE IP/MPLS Networks for Public Safety Highly reliable mission-critical communications infrastructures Abstract Alcatel-Lucent delivers a converged IP/MPLS-based network for public safety
An End-to-End QoS Architecture with the MPLS-Based Core
An End-to-End QoS Architecture with the MPLS-Based Core Victoria Fineberg, PE, Consultant, [email protected] Cheng Chen, PhD, NEC, [email protected] XiPeng Xiao, PhD, Redback, [email protected]
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham
WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include
How To Get More Bandwidth From Your Business Network
Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Construction of High-speed and High-reliability Optical Networks for Social Infrastructure
Hitachi Review Vol. 59 (Feb. 2010) 1 Construction of High-speed and High-reliability Optical Networks for Social Infrastructure Ryosuke Nishino Hideaki Tsushima, Dr. Eng. Eisuke Sato Shinsuke Tanaka OVERVIEW:
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Internet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
IP Core Transport Network
UDC 635.14:621.391 IP Core Transport Network VAkira Hakata VMasafumi Katoh VHaruo Yamashita VSatoshi Nojima (Manuscript received February 28, 2001) This paper proposes a next-generation IP core transport
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
CARRIER MPLS VPN September 2014
CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking
Multi-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
John Ragan Director of Product Management. Billy Wise Communications Specialist
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
MPLS VPN basics. E-Guide
E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission Majid Ashraf Derwesh Department of Electronics and Communication
SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration
SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN
ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:
How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
