MPLS/BGP Network Simulation Techniques for Business Enterprise Networks



Similar documents
Enterprise Network Simulation Using MPLS- BGP

Introducing Basic MPLS Concepts

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

How Routers Forward Packets

Implementing VPN over MPLS

Cisco Configuring Basic MPLS Using OSPF

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

- Multiprotocol Label Switching -

For internal circulation of BSNLonly

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

RFC 2547bis: BGP/MPLS VPN Fundamentals

Kingston University London

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

MPLS Implementation MPLS VPN

Multi Protocol Label Switching (MPLS) is a core networking technology that

How To Understand The Benefits Of An Mpls Network

Campus Network Virtualization using Multiprotocol Label Switching Virtual Private Networks (MPLS-VPNs)

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Table of Contents. Cisco Configuring a Basic MPLS VPN

MPLS - A Choice of Signaling Protocol

IPv6 over IPv4/MPLS Networks: The 6PE approach

MPLS in Private Networks Is It a Good Idea?

SBSCET, Firozpur (Punjab), India

MPLS Concepts. Overview. Objectives

MPLS-Enabled Network Infrastructures

Evaluating performance on an ISP MPLS network

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Configuring a Basic MPLS VPN

Comparative Analysis of Mpls and Non -Mpls Network

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

How To Make A Network Secure

RSVP- A Fault Tolerant Mechanism in MPLS Networks

MPLS-based Layer 3 VPNs

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Sprint Global MPLS VPN IP Whitepaper

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Introduction to MPLS-based VPNs

Internetworking II: VPNs, MPLS, and Traffic Engineering

S ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

Building MPLS VPNs with QoS Routing Capability i

Table of Contents. Cisco How Does Load Balancing Work?

NAVAL POSTGRADUATE SCHOOL THESIS

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

International Civil Aviation Organization

QoS Performance Evaluation in BGP/MPLS VPN

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

HP Networking BGP and MPLS technology training

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Overlay Networks and Tunneling Reading: 4.5, 9.4

MPLS VPN Route Target Rewrite

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Implementing Cisco MPLS

l.cittadini, m.cola, g.di battista

MPLS VPNs with DiffServ A QoS Performance study

MPLS L2VPN (VLL) Technology White Paper

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Protection Methods in Traffic Engineering MPLS Networks

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

MPLS Traffic Engineering in ISP Network

Addressing Inter Provider Connections With MPLS-ICI

Quidway MPLS VPN Solution for Financial Networks

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Implementing MPLS VPNs over IP Tunnels

A Resilient Path Management for BGP/MPLS VPN

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Lesson 13: MPLS Networks

Layer 3 Multiprotocol Label Switching Virtual Private Network

End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network

Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Cisco 7600/Catalyst 6500: Scaling Up for MPLS VPN Service with 10 Gigabit Ethernet

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

Cisco IP Solution Center MPLS VPN Management 5.0

Virtual Private LAN Service

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Transcription:

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT (Very Small Aperture Terminal), a satellite communication system for data transfer. It had many drawbacks like small data transfer window, no guarantee over analog transmission, low bandwidth, no security, less cost effective, etc. Then private networks, based on Frame Relay and point-to-point circuits where used which provided network security since public did not have access. Later Frame Relay with Permanent Virtual Circuits (PVCs) were used as Virtual Private Network (VPN), where private data was transferred over public networks, since enterprises needed dedicated PVCs cost was more. So, emerging category now is Service Provider VPNs, where a service provider provides the backbone network to an enterprise. Service Providers can use MPLS/BGP approach, where MPLS (Multiprotocol Label Switching) forwards the data supporting multiple protocols and BGP (Border Gateway Protocol) controls route to construct secure network. The paper depicts simulation of MPLS/BGP network for enterprises, using GNS3 simulator. Two enterprises working on Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) having sites at different location are depicted. Virtual routing and forwarding instant, working on label switching and node failure (redundancy) for this network is discussed. How the provider network restricts access to different enterprises is shown. The performance of MPLS exceeds conventional IP routing is depicted using test cases. The results show that on node failure alternate path change takes very few seconds. Index Terms MPLS, Enterprise Network, BGP-MPLS, MPLS Performance. I. INTRODUCTION To integrate the work in an enterprise, employees share files on the networking system. Today, enterprises use applications like customer relationship management (CRM), enterprise resource planning (ERP), etc., commonly. So servers hosting these applications have to now process and deliver data at Gigabit speeds. These performance demands and increase in bandwidth must be supported by the enterprise s network infrastructure. Thus, a secure a reliable network connection is required to protect the data transferred. Multiprotocol Label Switching (MPLS) offers extremely scalable, deterministic reroute, traffic engineering, data-carrying mechanism which transfers data packets with assigned labels across the network through virtual links. Border Gateway Protocol (BGP), which acts as a core routing protocol of the Internet. It maintains a table of IP networks or prefixes and assigns network reachability to autonomous systems; as a result it is indirectly used by the Internet users. ibgp protocol is used among the routers in autonomous system to command the internal routers. label switching instead of IP switching. This has lead to popularity of MPLS. BGP/MPLS VPN supports the provision of IP connectivity by a service provider to multiple customers over a common physical IP backbone, while allowing complete logical separation of customer traffic and routing information. Interconnection of different sites belonging to the same customer is provided over the MPLS backbone. Fig. 1 shows an example of a VPN with a service provider (P) backbone network, service provider edge routers (PE), and customer edge routers (CE). The key network components of the BGP/MPLS VPN are the provider edge (PE) routers, the provider (P) routers and the customer edge (CE) routers. The PE routers are routers within the service provider backbone that connect to customer sites. In a MPLS network, a PE router also performs as an edge LSR. The P routers are routers within the service provider backbone that do not connect directly to customer sites. They are the LSRs in a MPLS network. The CE routers are routers at the customer sites that are directly connected to the service provider network. They connect directly to the PE routers. III. NETWORK SIMULATION II. LITERATURE REVIEW Network Structure for Simulation is depicted in Fig. 1. There are two Provider routers P1 and P2, four Provider Edge routers PE1, Multiprotocol Label Switching is a popular networking PE2, PE3 and PE4 and two Customer Edge routers CE1A and technology that uses labels attached to packets to forward them CE1B. Customer IBM-A site is connected to CE1A with and through the network. Before MPLS, the most popular WAN customer IBM-B site is connected to CE1B with. OSPF 1 area 0 is protocols were ATM and Frame Relay, then, with popularity of given to all P and PE routers while OSPF 10 area 1 is given to the Internet, IP became the most popular. The MPLS labels are CE1A and CE1B routers. Since MPLS supports different advertised between routers so they can build a label-to-label protocols, simulation is extended to Customer APL. Customer mapping. These labels are attached to the IP packets, enabling Edge routers CE2A and CE2B are extended to PE2 and PE3 the routers to forward the traffic by looking at the label and not respectively, and run EIGRP the destination IP address. Thus, the packets are forwarded by

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks process 10. Customer APL-A site is connected to CE2B and customer APL-B site is connected to CE2A. packet with label 27 would remove the label and perform an IP lookup on the destination IP address. MPLS network on ingress LSR (PE1), where it is imposed with the label 21 and switched towards the next LSR. Second LSR (P1) swaps incoming label 21 to outgoing label 27 and forwards to next LSR (PE4). The egress LSR receiving a Fig. 1 Network Structure. A. Virtual Routing and Forwarding Instant How an IP packet traverses the MPLS VPN backbone from one customer site to another? MP-BGP running between the PE routers distributes the vpnv4 routes and their associated VPN label. Between all PE and CE routers, the routing protocol puts the customer routes into the VRF routing table on the PE routers. Fig. 2 shows path taken by the packet from CE1A, where IBM site A is located, to CE1B, where IBM site B is located. The packet routes through CE1A(1.1.10.1) - PE1(1.1.10.1) P1(172.16.9.5) - PE4(10.10.10.1) CE1B (10.10.10.1). Fig. 3 Label Switching on routing path C. Node Failover (Redundancy) The MPLS network designed is such that redundancy exists. There are multiple paths to reach destination address. When a link fails, automatically other path is taken to reach the destination address. Fig. 4a and fig. 4b shows alternate path taken to reach IBM-B site. When P1 fails P2 (172.16.9.33) is chosen to complete the route. Figure 3.6.2 shows that packet destined for 10.1.7.1 entering the MPLS network on ingress LSR (PE1), where it is imposed with the label 24 and switched towards the next LSR. Second LSR (P1) swaps incoming label 24 to outgoing label 27 and forwards to next LSR (PE4). The egress LSR receiving a packet with label 27 would remove the label and perform an IP lookup on the destination IP address. Fig. 2 Path from IBM-A site to IBM-B site. B. Working of Label Switching Fig. 3 shows that packet destined for 10.1.7.1 entering the Fig. 4a Alternate route to IBM-B site.

IV. TEST CASES AND RESULTS A. Restricts others in Enterprise VPN One of the MPLS traffic engineering is to restrict admission to other Enterprise VPN s. Thus if APL site tries to contact IBM site, MPLS will restrict its admission. Fig. 5 shows that APL-A site tries to contact IBM-A site or IBM-B, it fails to so. Similarly, IBM site is restricted to access APL VPN s. Fig. 6 shows that IBM-A site is not allowed to contact APL sites. Fig. 5 Restriction to APL site on contacting IBM site. All traffic to same IP address is treated similar. It becomes difficult to perform traffic engineering. For highly interactive application, flow of packets should have low delay and less packet loss threshold. Routing in conventional IP networks take excess time due to look up tables. Also re route on node failure is difficult in conventional IP routing. MPLS allows fast re route capability due to label switching. To check the performance of MPLS network on node failure was performed with following test cases. Time taken to re-route is calculated using time out for packet to reach destination with number of dropped packets before new route is selected. Six test cases were used to find average time taken to re-route on node failure in the network. Test case 1 and test case 2 were taken for packet flow from IBM-A site to IBM-B site, where packets take route from provider P1. When P1 fails, packets drop until MPLS re-routes packet from P2. The scenarios are shown in fig. 7 and fig. 8. In test case 1, 13 packets are dropped before re-route and in test case 2, 12 packets are dropped before re-route. Fig. 6 Restriction to APL site on contacting IBM site. B. Performance test In IP routing, conventionally, each router has to independently decide route for each incoming packets. The router consults the routing table, which is build using IP routing protocols like BGP, OSPF, IS-IS, etc., to find the next hop for that packet based on destination address. Each router in the network performs all of these steps. The main Fig. 7 Test case 1 (re-route from IBM-A site to IBM-B site). Fig. 4b Alternate route to IBM-B site. issue with conventional routing protocols is that they do not take capacity constraints and traffic characteristics into account when routing decisions are made. There are many limitations in conventional IP routing. Limited capability to deal with addressing information. Fig. 8 Test case 2 (re-route from IBM-A site to IBM-B site).

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Fig. 11 Test case 5 (re-route from IBM-B site to IBM-A site). Fig. 9 Test case 3 (re-route from APL-B site to APL-A site). Test case 3 and test case 4 were taken for packet flow from APL-B site to APL-A site, where packets take route from provider P2. When P2 fails, packets drop until MPLS reroutes packet from P1. The scenarios are shown in fig. 9 and fig. 10. In test case 3, 9 packets are dropped before re-route and in test case 4, 11 packets are dropped before re-route. Test case 6 was taken for packet flow from APL-A site to APL-B site, where packets take route from provider P2. When P2 fails, packets drop until MPLS re-routes packet from P1. The scenario is shown in fig. 12. In test case 6, 10 packets are dropped before re-route. Based on test cases following data is computed. Re-route time = No. of dropped packets X time out. Table 1 gives average re-route time on node failure. Figure 14 shows bar graph for test cases depicting re-route time. Thus, from above given data we conclude that average reroute time on node failure in 21.67 seconds, which is very less than time taken to re-route in IP routing using fast reroute techniques. V. CONCLUSION Fig. 10 Test case 4 (re-route from APL-B site to APL-A site. Test case 5 was taken for packet flow from IBM-B site to IBM-A site, where packets take route from provider P2. When P2 fails, packets drop until MPLS re-routes packet from P1. The scenario is shown in fig. 11. In test case 5, 10 packets are dropped before re-route. In traditional IP routing, there are many limitations. Like limited capability to deal with addressing information. Re route mechanism not available instantly. All traffic to same IP address is treated similar. Routing packets in a network with two same IP addresses of different customers cannot be handled. Highly interactive applications in enterprise cannot run smoothly with such routing of packets. In conventional IP routing using fast re-routing techniques, time taken to reroute requires recalculating routes, which may go up to thousands of seconds. In BGP-MPLS VPN, time taken to re-route on single node failure is just few seconds. Handling route for same IP address for different customer is not an issue since routing is done using labels and not IP addresses. Customers are not aware of MPLS and how packet route to destination. Different customers are restricted access of each other s data, thus privacy is maintained. Since MPLS is supporting multiple protocols, OSPF and EIGRP VPN s could

successfully utilize same network to route packet, thus reducing cost to enterprise. Table 1. Average time taken to re-route on Node failure. Test Case Test Case (packets send Actual Path taken No. of Time taken New Path taken No. from to customer sites) dropped to re-route packets (seconds) 1 IBM-A to IBM-B CE1A-PE1-P1-PE4-CE1B 13 26 CE1A-PE1-P2-PE4-CE 1B 2 IBM-A to IBM-B CE1A-PE1-P1-PE4-CE1B 12 24 CE1A-PE1-P2-PE4-CE 1B 3 APL-B to APL-A CE2A-PE2-P2-PE3-CE2B 9 18 CE2A-PE2-P1-PE3-CE 2B 4 APL-B to APL-A CE2A-PE2-P2-PE3-CE2B 11 22 CE2A-PE2-P1-PE3-CE 2B 5 IBM-B to IBM-A CE1B-PE4-P2-PE1-CE1A 10 20 CE1B-PE4-P1-PE1-CE 1A 6 APL-A to APL-B CE2B-PE2-P2-PE3-CE2A 10 20 CE2B-PE2-P1-PE3-CE 2A Average 10.83 21.67 REFERENCES [1]E. Rosen, Y. Rekhter, BGP/MPLS IP Virtual Private Networks (VPNs) RFC 4364, February 2006. [2] Tina Satra, Smita Jangale, Enterprise Network Simulation Using MPLSBGP, March 2014. [3]E. Rosen, Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs) RFC 4365, February 2006. [4]Alcatel, Lucent, MPLS-Enabled Network Infrastructures 2007. [5] ADTRAN, Inc. Private IP Service BGP/MPLS VPN Networks 2005. [6] De Ghein, MPLS Fundamentals. Indianapolis IN: Cisco Press, 2007. [7] Juniper Networks, Network scaling with BGP labeled unicast, 2010. [8] Kang Xi, H. Jonathan Chao, IP Fast Rerouting for Single Link/Node Failure Recovery 2006.