MPLS Traffic Engineering in ISP Network
|
|
|
- Annabella Lucy McKenzie
- 10 years ago
- Views:
Transcription
1 MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications of MPLS technology are MPLS VPN, MPLT Traffic engineering and MPLS QoS and Any Transport over MPLS (AToM). This study addressed only MPLS Traffic engineering, which is one of the driving factors of deploying MPLS in service provider networks. This research consists of two main sections; in the first section basic concepts of MPLS have been reviewed and in the second section, implementation of the MPLS based ISP network, configuration and verification of the results are covered. Simulation results show that on large service provider networks, no other technology can engineer traffic as efficiently as MPLS does. This research aims to provide guidelines for network engineers for efficiently engineering network traffic in the service provider network. Keywords: MPLS, RSVP, CBTS, CSPF, Fast reroute. 1. IINTRODUCTION The modern networks are converged networks; they carry voice, video and normal data by using the same network resources. Since some user data traffics such as voice, video or SQL bank transactions are more important and less tolerant to delay; they are preferentially treated based on their delivery requirements such as bandwidth and maximum affordable delay [1]. Considering the increased number of internet users and different network data traffic types, internet service providers (ISP) face a challenge in the form of Traffic Engineering. MPLS Traffic Engineering [2] is one of the most exciting and powerful applications of MPLS which provides network optimization by flexibly utilizing all the available links in the network. MPLS provide an integrated approach to divert network traffic from congested parts of the network to noncongested parts [3]. In traditional IP networks [4], Links under-utilization was a big problem where one (best) route was over used for heavy network traffic and the other routes were unused or less used. Thus bandwidth was wasted. To address the problem of link under-utilization, one solution is to force load balancing [16] on the links by using routing protocols. In this method we change the metric of the link and this may potentially change the path of all the packets traversing the link [1]. This solution is not scalable in large service provider networks where it is very hard to manage load balancing on hundreds of routers. The most efficient and better way to utilize all the available links in the network is MPLS Traffic Engineering. By using MPLS TE we can very conveniently utilize the available network resources to their optimal potential [18]. MPLS TE lets us to engineer the traffic the way we wants not the way routing protocol wants. It was not possible with traditional IP networks. Traditional IP network forwards all the traffic on the shortest path calculated by SPF algorithm [5]; it doesn t consider non-shortest paths for traffic sending regardless the fact that they may be enough bandwidth links. MPLS TE lets us create LSP tunnels on the non-shortest paths that satisfy the bandwidth requirements, and then we map traffic to these LSP tunnels to avail the bandwidth. Table 1: Comparison of MPLS with Frame Relay and ATM Protocol Works at Layer Network Bandwidth Utilization MPLS 2.5 Full Utilization Frame Relay 2 Under Utilization ATM 1 Under Utilization Support for Traffic Tunneling Yes (Unidirectional Tunnels) No Support for Tunnels Yes (Bidirectional Tunnels) 2. MPLS TE KEY ELEMENTS 2.1 Constraint Based Routing In constraint based routing a shortest path is selected if it satisfies a particular set of constraints. The constraints are minimum bandwidth, link attributes and administrative weight, setup and hold priority values etc. [2] MPLS TE uses constraint shortest path first algorithm (CSPF) to build LSP tunnels. CSPF is an extension of SPF [6] and it looks not only on the cost values but also on the constraints to select the best path according to the resource requirements. 2.2 RSVP Signaling RSVP [7] is a resource reservation protocol; it allocates bandwidth along the LSP for tunnels to establish. RSVP messages are sent by headend router for resource reservations. A headend router is the starting point of the tunnel whereas tailend is the ending point of it [8]. The actual available bandwidth is configured on the physical interfaces, which is announced by RSVP. The desired bandwidth for the establishment of tunnels is configured on the tunnel interfaces. So before establishing a tunnel desired bandwidth of the tunnel and the available bandwidth announced by RSVP are compared. If there is enough bandwidth available to accommodate the tunnel, the tunnel will establish along the LSP. 2.3 Class Based Tunnel Selection Class Based Tunnel Selection (CBTS) is a way of forwarding traffic based on Class of Service (CoS) values [9]. We can create many tunnels on the same headend and tailend devices and assign different data traffic based on CoS values (Head end is the device where tunnel starts and tail end is where tunnel ends). Each tunnel is configured to look for a specific CoS value on the incoming traffic. Traffic is forwarded on a 23
2 particular tunnel if the CoS of the traffic matches the value configured on tunnel. There are only three 3 bits specified in EXP field of MPLS label which are used for QoS purposes [10]. Therefore there can be a maximum of 8 different tunnels between same head end and tail end devices. 2.4 Fast Reroute Fast Reroute (FRR) [11] is very important factor of MPLS TE. If a link or a node fails in LSP of MPLS network, FRR automatically reroutes traffic [11] i.e. switches traffic to the secondary path. For FRR, there are two paths; Primary path and Secondary or Backup path [17]. Primary path is the main tunnel used to carry traffic. Secondary path is used to carry traffic if a node or a link fails in primary tunnel. FRR reduces the packet loss and restores the tunnel electric fast [12]. The purpose of FRR is to reduce the packet loss and reroute the traffic as soon as possible. Though routing algorithm such is SPF algorithm can also recalculate new paths after the occurrence of a node or a link failure but this process is slow. It takes time for routing protocols to propagate link or node failure information across the network. Important traffic such as voice and video can t wait for longer. They need a good QoS if not to drop packets.frr provides protection against two types of failures [13]. 1) Link Failure 2) Node Failure Rerouting of traffic after link failure is illustrated in the figure 1(a). failure, it diverts traffic to secondary tunnel i.e. to PE1->P3- >P4->PE2. Figure 1(b) shows the rerouting of traffic after a node failure Figure 1(b): FRR with Node Protection When node P2 fails, P1 quickly switches traffic to P4 through detour path which is PE1->P1->P4->PE2. P2 make a notice of node P2 failure to head end router i.e. PE1 and traffic is then diverted to secondary path which is PE1->P3->P4->PE2. 3. NETWORK IMPLEMENTATION 3.1 Primary Tunnels Implementation We used dynagen simulator to create an MPLS based ISP network used in this research work. Figure 2 shows the logical topology of the ISP network which we used to work on MPLS TE and fast rerouting. Figure 2: Topology of MPLS based ISP Network Figure 1(a): FRR with Link Protection If link between P2 and PE2 fails somehow, P2 will quickly switch the traffic to the P4 through detour i.e. through PE1- >P1->P2->P4->PE2. P2 will also signal PE1 about link P2- PE2 failure. As soon as PE1 knows about link P2-PE2 link There are 7 Label Switch Routers (LSRs) all together in the MPLS backbone. Two of them (PE1 and PE2) are provider edge LSRs and five of them (P1, P2, P3, P4 and P5) are provider LSRs and they make the core of the MPLS network. PE routers can provide connectivity to the customers whereas P routers know only to forward packets based on the values contained in the labels; they know nothing about the end customers. 24
3 Table 2: IP addressing scheme on ISP network PE1 PE2 P1 P2 Serial1/ /24 Serial 1/ /24 Seral1/ /24 Loopback /32 Loopback /32 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Loopback /32 Loopback /32 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Loopback /32 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Loopback /32 P3 P4 P5 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Loopback /32 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 loopback /32 Serial 1/ /24 Serial 1/ /24 Serial 1/ /24 Loopback /32 Four separate primary tunnels are configured on PE1 to take traffic of voice, video conferencing, mission critical data and best effort data to PE2. These tunnels treat the incoming traffic on preferential basis and take it to PE2 along different LSPs. Since tunnels are unidirectional, four more tunnels need to be configured on PE2 to take the traffic back to PE1. As the figure 3 shows, all these primary tunnels start from PE1 and end at PE2. Tunnel 1, tunnel 2 and tunnel 3 are configured with explicit path i.e. the path for them is configured manually whereas tunnel 4 is configured with dynamic option and it chooses a path using CSPF algorithm. Figure 3: Tunnels with explicit path from PE1 to PE2 Table 3: primary tunnels configured in the MPLS backbone network running from PE1 to PE2 PE1 Destination Tunnel EXP Setup-Hold priority Path option Master tunnel (PE 2) Tunnel 1 (voice) explicit Tunnel 2 (video conferencing) explicit Tunnel 3 (critical Data) 3,2 5-5 explicit Tunnel 4 (best Effort) dynamic 3.2 Tunnel 1 Tunnel 1 is created to take voice traffic from PE1 to PE2. It is created along the path PE1>P1>P2>P3>PE2. Since voice data can t afford much delay or jitter, we have allocated sufficient bandwidth to tunnel 1 to avoid any delay for voice. EXP value 5 instructs Tunnel 1 to look for the incoming traffic with EXP value 5 to accept. The traffic with EXP value other than 5 is not accepted by the tunnel 1. So using this value tunnel 1 will take only voice data. Setup priority and hold priority [14] are two important values. They simply tell how important the tunnel is. The lower these values are, the more important the tunnel is going to be. The lower setup priority value will make the tunnel to pre-empt other tunnels and the lower holding value will stop other competing tunnels to pre-empt this tunnel. So tunnel 1 is the most important tunnel in our network, it can pre-empt any other tunnel in the network and no other tunnel can pre-empt it. The path option specifies the LSP on which the tunnel is to be established. More than one path options can be configured and each of them can be given a preference number. Lower the number given to the path higher will be its preference. Tunnels can be created either 25
4 dynamically or explicitly. Dynamic option makes use of CSPF to calculate best path for the tunnel. Explicit option doesn t use CSPF to choose the path for the tunnel; instead we manually configure the path to be taken by tunnel. We configure a hop-by-hop path to the tail end. Only tunnel 4 in our network is configured with dynamic path option. 3.3 Tunnel 2 Tunnel 2 is created to carry video conferencing data from PE1 to PE2. It is explicitly established along the LSP PE1>P1>P4>P3>PE2. Tunnel 2 looks for EXP value of 4 in the MPLS label to take traffic of video conferencing. Its setup and priority values are 4-4, so it can pre-empt all the tunnels in the network except tunnel 1 and it can t be pre-empted by any tunnel except tunnel Tunnel 3 It carries traffic mission critical data such as important SQL bank transactions. It is also explicitly configured and it is established on the LSP PE1>P1>P5>P3>PE2. Tunnel 3 takes traffic only with EXP value of 3 and 2 in its label. It can preempt only tunnel 4 in the network and it can be pre-empted by tunnel 1 and 2 because they are more important than tunnel 3 and they carry important voice and video conferencing data. Table 4: Backup tunnels on P1 to protect primary tunnel 1 International Journal of Computer Applications ( ) 3.5 Tunnel 4 Tunnel 4 is best effort tunnel. It takes normal data. It is configured with dynamic option so it can take any LSP to carry data from PE1 to PE2. No path is explicitly configured for it. It can t pre-empt any of the tunnels in the network, and it can be pre-empted by any of them because their setup and hold priority values are lower than tunnel 4. Since no path is explicitly configured for dynamic tunnel 4, no FRR mechanism can be configured for it. 3.6 Master Tunnel 10 Master tunnel [15] contains a group of tunnels having the same head ends and tail ends. Since all 4 tunnels in our network heads from PE1 and ends at PE2, we group them in master tunnel Fast Reroute Implementation Two backup tunnels are configured on primary tunnel 1 for link and node protection as shown in the table 3. Primary Tunnels Backup tunnels protection Path option Path Destination Primary tunnel 1 Tunnel 1 Link P1-P2 explicit P1>P>P Tunnel 2 Node P2 explicit P1>P5>P Backup Tunnel 1 This tunnel is configured on P1 along primary tunnel 1 to provide protection at link between P1 and P2. It is explicitly configured along the path P1>P4>P2. It starts from P1 and ends at P2. In case of link P1-P2 failure, It will divert traffic to LSP P1>P4>P Backup Tunnel 2 This tunnel is also configured on P1 and provides protection against node P2 failure along primary tunnel 1. In case of failure of node P2, backup tunnel 2 will skip node P2 and divert traffic to LSP P1>P5>P3. RSVP sends hello messages to the neighbor routers to check the link or node failure. RSVP checks node-to-node failure detection, if a node doesn t receive acknowledgment from its neighbor node for a given number of times, it announces it down and hence the primary tunnel is announced down. Now the interfaces facing the protected link or node must have to be configured to switch the traffic to backup tunnels in case of link or node failure along the primary tunnels. 4. CONFIGURATION OF MPLS TE & FRR Table 4 shows the configuration of MPLS TE and FRR entered on the PE and P devices with the omission of the routing protocols and other basic configurations because we are focused only on MPLS traffic engineering. 26
5 Table 5: MPLS TE and FRR configuration on ISP Network 27
6 28
7 5. EXPERIMENT RESULTS 5.1 Verification of Primary Tunnels The results obtained from the implemented network verify that 4 primary tunnels are successfully created to take voice, video conferencing and mission critical data on preferential basis and to avoid delay which could distort data traffic. Figure 4: Primary Tunnels on MPLS ISP Network Figure 4 shows all the primary tunnels configured in the network are up. The top 5 tunnels are configured on PE1, and are destined to PE2. So PE1 serves as the headend and PE2 as tailend. The last 4 tunnels are configured on PE2 and are destined to PE1. Thus PE2 is their headend and PE1 is the tailend. 29
8 establish to carry data traffic of different CoS. The following figure shows the details of the RSVP sender. Figure 5: Master tunnel 10 Tunnel 10 is the master tunnel configured on PE1. It consists of 4 primary tunnels. Since destination is (PE2), all these four tunnels start at PE1 and end at PE2. Tunnel 1 contains EXP value of 5, which means that it will carry voice data. Tunnel 2 has an EXP value of 4, so it will carry video data, tunnel 3 will carry critical data such as important bank transactions because it has EXP values of 2 and 3. Tunnel 4 will carry best effort data since it doesn t have any EXP value. Tunnel 4 makes use of CSPF algorithm for its establishment. Tunnel 4 can be established on any LSP in the network as indicated by CSPF algorithm. Figure 6 shows that the status of tunnel 1 is up, it follows the explicit path LSP1 to the destination PE2 ( ). The required bandwidth to establish the Figure 7: RSVP signals sent by PE routers Figure 7 shows the RSVP signals sent by PE1 to PE2 and also from PE2 to PE1. Since 4 primary tunnels have been configured on PE1, it sends 4 RSVP signals to PE2. The first three tunnels requested a bandwidth of 2000kb and the fourth tunnel, which carries best effort traffic, requested only 100kb. Pro, DPort and SPort denotes Protocol code, Destination port and Source port. Prev Hop field shows t The previous hop and I/F field shows the interface connecting to the previous hop. Similarly PE2 also sent 4 RSVP signals to PE1 and the previous hop address and interfaces are also shown. Figure 8 shows the RSVP reservations information on the RSVP router P1 Figure 8: RSVP reservations on P1 The To and the From fields in the show command shows the source and the destination IP addresses of the RSVP reservation. Pro field denotes the protocol code. The SPort and the DPort denotes the source and the destination ports. The Next Hop field shows the IP address of the next hop. I/F field contain the interface connecting to the next hop. 5.2 Verification of Fast Reroute FRR provides quick recovery from link or node failure. Figure 9 shows that 2 backup tunnels have been configured on P1 router. Figure 6: Primary tunnel 1 with full details Tunnel is 2000 kb/s and the setup and hold priority values are set to 3. The explicit path to be followed by the tunnel 1 is also given. RSVP signaling is another pivotal feature of MPLS TE. It signals to reserve the bandwidth for the MPLS tunnels to Figure 9: Backup tunnels on P1 30
9 Figure 9 shows the backup tunnels, tunnel 1 and tunnel 2 which provide protection against link P1-P2 and node P2 respectively. These tunnels are configured on P1 for backup on primary tunnel 1. Details of each tunnel such as head end, tail end, protected interfaces, LSPs and bandwidth are displayed and also it is shown that both of these tunnels are up. Figure 10 shows that the backup tunnels configured on the P1 are in ready state which means that the backup tunnels are available and will become active if link P1-P2 or Node P2 failure occurs. Figure 10: Backup tunnels on P1 are in ready state When we disconnect the link P1-P2 (as in figure 11), the backup tunnel 1becomes active and take traffic to the destination. Figure 11: Failure of link P1-P2 activates backup tunnel 1 on P1 Figure 12: Backup tunnel 1 is activated once link P1-P2 goes down Figure 12 shows that tunnel 1 come to active state when link P1-P2 goes down. Also it is showing that tunnel 2 is still in ready state because it is configured to provide backup path in case of node P2 failure. It will become active in case of node P2 failure only. All this will happen very fast and a minimum number of packets may be lost. Both of these backup tunnels are configured with explicit option so path for them is manually configured and CSPF will not be used to establish backup tunnels. 6. CONCLUTIONS AND RECOMMENDATIONS On large service provider networks, no other technology can engineer traffic as efficiently as MPLS does. We can share the load on the links by changing the metrics used by the routing protocols such as OSPF, EIGRP, IS-IS etc. but that method is not practical in large ISP environments. MPLS TE very conveniently uses the under-utilized links for carrying traffic and using existing network resources. MPLS TE creates tunnels to carry traffic and path of these tunnels can be explicitly assigned. MPLS facilitates important user s data traffic such as voice, video and bank transactions with dedicated tunnels for them to avoid any unnecessary delay. In case of a link or node failure along the primary tunnel s path, backup tunnels created by FRR can make a recovery from the failure very quickly. To further explore the exciting MPLS technology, it is recommended that the same network be implemented and investigated with IPv6 because IPv6 is inevitable and it will ultimately replace IPv4 in the near future. GMPLS, which makes the use of dense wavelength-division multiplexing (DWDM) for traffic engineering, also, needs to be researched. Similarly, Any Transport over MPLS (AToM), MPLS QoS with traffic policing and shaping to limit the user data traffic according to the service level agreement (SLA) and MPLS VPN with encryption algorithm on customer sites also need to be investigated. 31
10 7. ACKNOWLEDGMENT Special thanks to my friend Mr Shehzad Qamar, who guided and motivated me in this whole research work. Without his support I would have not finished this work. I also appreciate Birmingham City University for supporting this research work and providing me all needful resources. 8. REFERENCES [1]. V. Alwayn, 2002, Advanced MPLS Design & Implementation, pp Publishers: Cisco Press Indianapolis, IN USA [2]. Eric Osborne, Ajay Simha, 2002,Traffic Engineering with MPLS,pp , Publishers: Cisco Press Indianapolis, USA [3]. Cisco Systems, Inc, 2002, MPLS Traffic Engineering Technology, [Online]. Available: [Date Accessed: 10 August 2012 [4]. Ravi Ganesh V, M. V. Ramana Murthy, 2012, MPLS Traffic Engineering (An Implementation Framework) [Online]. Available: TE.pdf [Date Accessed: 10 August 2012 [5]. Cisco IOS Release 12.0(5)S, Multiprotocol Label Switching (MPLS) Traffic Engineering, [Online]. Available: [Date Accessed: 10 August 2012 [6]. Juniper Networks, Inc, Constrained-Path LSP Computation [Online]. Available: mation-products/topic-collections/config-guide-mplsapplications/mpls-lsp-constrained-path-computation.html [Accessed: 10 August 2012] [7]. Juniper Networks, Inc, Understanding the RSVP Signaling Protocol. [Online]. Available: [Accessed: 17 August 2012] [8]. Lancy Lobo, Umesh Lakshman, RSVP with TE Extensions: Signaling. [Online]. Available: [Accessed: 24 August 2012] [9]. Cisco Systems, Inc, class based tunnel selection. [Online].Available: e/gscbts.html [Accessed: 24 August 2012] [10]. J. Reagan, 2002, CCIP MPLS Study Guide, pp 7, Publishers: SYBEX Inc, Alameda, CA USA Press [11]. Cisco Systems, Inc, MPLS Traffic Engineering (TE) Fast Reroute (FRR) Link and Node Protection [Online].Available: e/gslnh29.html#wp [Accessed: 29 August 2012] [12]. Genie, 2012, MPLS TE with Fast-Reroute (FRR) - Link Protection, [online]. Available: [Accessed : 30 August 2012] [13]. y zismail, 2008, Traffic Engineering Fast Reroute [online]. Available: [Accessed : 30 August 2012] [14]. Agilent Technologies, 2001, MPLS LSP tunnel preemption, 2001 Rev A EN [15]. Cisco Systems, Inc., 2007, MPLS Traffic Engineering (TE): Class-based Tunnel Selection [Online]. Available: e/gscbts.html [Date Accessed: 10 August 2012 [16]. Cisco systems,inc, 2009, how does unequal cost path load balancing (variance) work in IGRP and EIGRP? [online] available: h_note09186a d.shtml [Date Accessed: 16 Aug 2012] [17]. Cisco systems,inc, 2011, information about MPLS traffic engineering (TE): Path Protection [Online]. Available: /guide/mp_te_path_prot.html#wp [Date Accessed: 25 August 2012] [18]. Cariden technologies, inc. 2012, IP/MPLS Traffic Engineering IGP Metrics, Constraint Based Path Computation and RSVP, sunny vale, CA
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
MPLS TE Technology Overview
C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter
Traffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
Ativando MPLS Traffic Engineering
19 São Paulo 3-5 Julho, 2005 Ativando MPLS Traffic Engineering Alexandre Longo [email protected] Cisco Systems 19 1 Some Assumptions You understand basic IP routing You understand MPLS concepts and operation
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Real-Time Traffic Engineering Management With Route Analytics
Real-Time Traffic Engineering Management With Route Analytics Executive Summary Increasing numbers of service providers and mobile operators are using RSVP-TE based traffic engineering to provide bandwidth
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
Testing Multi-Protocol Label Switching (MPLS) enabled Networks
Technical Paper Testing Multi-Protocol Label Switching (MPLS) enabled Networks Kevin Boyne, COO of UUNet mentioned at a recent talk at an MPLS conference at Virginia, USA that today s opportunity is moving
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
Traffic Engineering & Network Planning Tool for MPLS Networks
Traffic Engineering & Network Planning Tool for MPLS Networks Dr. Associate Professor, Department of Electrical Engineering Indian Institute of Technology Bombay, Powai, Mumbai 76 Founder & Director, Vegayan
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
Traffic Engineering. Traffic Engineering
MPLS Traffic Engineering George Swallow [email protected] Traffic Engineering 1999, Cisco Systems, Inc. 1 What is Traffic Engineering Taking control of how traffic flows in your network in order to - Improve
OPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Chapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]
Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS A PERFORMANCE ANALYSIS OF BGP/MPLS VPN FAILOVER FUNCTIONALITY by Guan Chye Tan December 2006 Thesis Advisor: Second Reader: Geoffrey Xie John Gibson
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
MPLS Network Design & Monitoring
Slide 1 MPLS Network Design & Monitoring Slide 2 What Is MPLS Traffic Engineering? Traffic Control -Unexpected Incidences -Fiber Cut -Delay Network Optimization Efficient Use of Network Resources Topology
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
Highlighting a Direction
IP QoS Architecture Highlighting a Direction Rodrigo Linhares - [email protected] Consulting Systems Engineer 1 Agenda Objective IntServ Architecture DiffServ Architecture Some additional tools Conclusion
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Offline path computation
Uni Innsbruck Informatik - Uni Innsbruck Informatik - 4 Internet Technology The inner network view, part 2 (C): MPLS Michael Welzl http://www.welzl.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
Juniper Networks NorthStar Controller
Juniper Networks NorthStar Controller Functionality Test Report Introduction IP/MPLS has been the technology of choice for service providers for the better part of a decade and a half. Backbone network
Evaluating performance on an ISP MPLS network
Evaluating performance on an ISP MPLS network Dilmohan Narula, Mauricio Rojasmartinez, Venkatachalapati Rayipati [email protected], [email protected], [email protected]
Multi-Protocol Label Switching To Support Quality of Service Needs
Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
A Performance Study of IP and MPLS Traffic Engineering Techniques under Traffic Variations
A Performance Study of IP and MPLS Traffic Engineering Techniques under Traffic Variations Sukrit Dasgupta Department of ECE Drexel University Philadelphia, PA, USA [email protected] Jaudelice C. de
IP/MPLS Network Planning, Design, Simulation, Audit and Management. Dave Wang, WANDL
IP/MPLS Network Planning, Design, Simulation, Audit and Management Dave Wang, WANDL WANDL Overview Founded in 1986 Headquarters in Piscataway, New Jersey Products: NPAT, IP/MPLSView,VPNView Locations Domestic
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
MPLS Part II - Recovery
MPLS Part II - Recovery Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
MPLS: Key Factors to Consider When Selecting Your MPLS Provider
White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com
Performance Analysis of MPLS TE Queues for QoS Routing
Performance Analysis of MPLS TE Queues for QoS Routing Yihan Li, Shivendra Panwar Electrical and Computer Engineering Department, Polytechnic University, Brooklyn, NY C.J. (Charlie) Liu AT&T Laboratories,
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)
A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN) Adeyinka A. Adewale, Samuel N. John, and Charles Ndujiuba 1 Department of Electrical and Information Engineering, Covenant
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Quality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing
WHITE PAPER Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing www.ixiacom.com 915-1838-01 Rev. C, January 2014 2 Table of Contents Abstract... 4 Introduction... 4 What is MPLS?...
PERFORMANCE ANALYSIS OF VOICE LOAD BALANCING CONFIGURATION FOR MPLS NETWORK AND IP NETWORK WITH MUTATION TESTING
PERFORMANCE ANALYSIS OF VOICE LOAD BALANCING CONFIGURATION FOR MPLS NETWORK AND IP NETWORK WITH MUTATION TESTING 1 Navneet Arora, 2 Simarpreet Kaur 1 M.Tech, ECE, 2 Assistant Professor, BBSBEC, Fatehgarh
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
Cisco IOS MPLS configuration
Introduction Cisco IOS MPLS configuration MPLS can be configured over different platforms It can be implemented on a purely router-based Internet backbone over an ATM switchednetwork -MPLS enables an ATM
MPLS VPNs with DiffServ A QoS Performance study
Technical report, IDE1104, February 2011 MPLS VPNs with DiffServ A QoS Performance study Master s Thesis in Computer Network Engineering Azhar Shabbir Khan Bilal Afzal School of Information Science, Computer
Industry s First QoS- Enhanced MPLS TE Solution
Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, [email protected] Contact Info: Kim Gibbons, [email protected],, 408-525 525-4909 1 Agenda MPLS Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
MPLS. A Tutorial. Paresh Khatri. [email protected]
MPLS A Tutorial Paresh Khatri [email protected] Agenda 1. MPLS overview and LSP types 2. Distribution Protocol (LDP) 3. Questions Introduction Paresh Khatri ([email protected])
Link-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
