How To Understand The Benefits Of An Mpls Network



Similar documents
Building Trusted VPNs with Multi-VRF

MPLS L2VPN (VLL) Technology White Paper

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Introducing Basic MPLS Concepts

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL

Introduction to MPLS-based VPNs

Multi-Provider Ethernet Service Delivery

Multi Protocol Label Switching (MPLS) is a core networking technology that

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Internetworking II: VPNs, MPLS, and Traffic Engineering

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Testing Edge Services: VPLS over MPLS

WAN and VPN Solutions:

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Addressing Inter Provider Connections With MPLS-ICI

Virtual Private Networks. Juha Heinänen Song Networks

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

November Defining the Value of MPLS VPNs

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

MPLS Concepts. Overview. Objectives

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Enterprise Network Simulation Using MPLS- BGP

How Routers Forward Packets

Innovation in Access and Metropolitan Area Networks -

For internal circulation of BSNLonly

MPLS-Enabled Network Infrastructures

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Cisco Configuring Basic MPLS Using OSPF

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

RFC 2547bis: BGP/MPLS VPN Fundamentals

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

Demonstrating the high performance and feature richness of the compact MX Series

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

MPLS in Private Networks Is It a Good Idea?

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

MPLS is the enabling technology for the New Broadband (IP) Public Network

The Keys for Campus Networking: Integration, Integration, and Integration

Virtual Private LAN Service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS and IPSec A Misunderstood Relationship

EVALUATING NETWORKING TECHNOLOGIES

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Transport for Enterprise VoIP Services

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Deploying SAP NetWeaver Infrastructure with Foundry Networks ServerIron Deployment Guide

MPLS - A Choice of Signaling Protocol

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Virtual Private LAN Service (VPLS)

Virtual Leased Lines - Martini

MPLS Multiprotocol Label Switching

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

The Essential Guide to Deploying MPLS for Enterprise Networks

MPLS Implementation MPLS VPN

RSVP- A Fault Tolerant Mechanism in MPLS Networks

- Multiprotocol Label Switching -

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

INTRODUCTION TO L2VPNS

How To Make A Network Secure

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Multiprotocol Label Switching (MPLS)

Migrating to MPLS Technology and Applications

Interconnecting Data Centers Using VPLS

SBSCET, Firozpur (Punjab), India

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

What Is a Virtual Private Network?

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

IPv6 over IPv4/MPLS Networks: The 6PE approach

Implementing Virtual Leased Lines Using MPLS

Solutions Guide. Ethernet-based Network Virtualization for the Enterprise

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Master Course Computer Networks IN2097

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

APNIC elearning: Introduction to MPLS

Network Virtualization and Data Center Networks DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013

Implementing VPN over MPLS

IP/MPLS Networks for Public Safety

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

H3C SR8800 RPR Technology White Paper

Protection Methods in Traffic Engineering MPLS Networks

Broadband Network Architecture

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Reliable Airport IP Networks

Transcription:

NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade and has extensively been used in several service provider networks world-wide. Over the last few years, the standardization of applications such as VPN technologies over MPLS has opened the door for this technology to be used in an enterprise network. This paper will explore the use of MPLS in an enterprise network and its associated benefits. Overview of MPLS MPLS was developed in the late 90s as a means for rapid switching of packets in an IP network. In contrast to the connectionless model used in IP networks, MPLS establishes a Label Switched Path (LSP) into which packets are encapsulated by an edge MPLS router after assigning a 20-bit label. Subsequent nodes (called Label Switching Routers) forward the packet by inspecting and swapping the label. Packets that are forwarded in the same manner (e.g. those with the same longest prefix match) are considered to belong to the same Forwarding Equivalence Class (FEC) and are therefore assigned the same label. Figure 1 depicts how a packet is forwarded within an MPLS network. MPLS network PE 51 82 PE Router 1 Router 3 Router 2 Label Edge Router 1 (LER 1) Label Switch Router (LSR) Label Edge Router 2 (LER 2) Router 4 A packet entering the MPLS network at LER1 are assigned a label (51). LSR in the network swaps the incoming label (51) to an outgoing label (82). At the Egress router (LER2), the packet is stripped of the MPLS label and forwarded Note: There is also a mode called Penultimate Hop Popping in which the label is popped at the penultimate MPLS node prior to the Egress LER) Note: Fields in frame are not to scale Figure 1: Forwarding of a packet in an MPLS Network To understand the operation of an MPLS router, it is useful to understand 3 building blocks: Assign the packet to a FEC. In order to do this, network reachability information is required and is propagated using a conventional routing protocol such as OSPF. 1

Assign a label to packets that map to the same FEC and propagate it to other nodes in the network. Label propagation is done using an MPLS signaling protocol such as LDP (Label Distribution Protocol) or RSVP (Resource Reservation Protocol). To get the best benefits of MPLS, traffic engineering extensions to the routing protocol are used to propagate information on available bandwidth and administrative constraints to all nodes in the MPLS network. The first 2 steps are mandatory in an MPLS network. The use of traffic engineering is optional. Over time, MPLS technology has evolved to support tunneling mechanisms, including the ability to establish Virtual Private Networks (VPNs). Because forwarding is done based on labels within an MPLS network, the use of multiple nested labels provides a method to tunnel traffic from multiple instances within a common outer label. Benefits of MPLS There are several benefits that MPLS offers: - Its ability to efficiently label switch packets allows multiple services to be easily supported on a converged infrastructure. Unlike ATM or Frame Relay, MPLS is tightly integrated with IP the assignment of the MPLS label is based on the FEC as described above. This leads to a better integration with IP networks. - MPLS connection-oriented model and rich support for traffic engineering, allows specific preferred paths to be taken for certain types of traffic, resulting in very high QoS being delivered. - The ability to offer sub-50 millisecond protection in the event of failure using a method called Fast Re- Route allows rapid convergence to be achieved, allowing quick re-routing around a failure. This is particularly useful when carrying VoIP or mission-critical traffic in an enterprise network. - With the standardization of VPN technologies over MPLS, large Layer 2 domains can be created without the traditional disadvantages of a Layer 2 design. - The technology also allows Layer 3 VPNs to be created, with multiple administrative domains based on Layer 3 MPLS VPNs. The last 2 capabilities are of particular interest because multiple types of VPN technologies can be delivered concurrently over an MPLS network. By combining this with an Ethernet-based infrastructure, a highperformance network can be easily created and managed. Layer 2 Service without the Drawbacks of a Layer 2 Network Enterprise networks have traditionally been built with a switched architecture at the edge interconnected using a core routing infrastructure. Nevertheless, there are situations when it is necessary to have a large Layer 2 span. For example, it is common to have different departments or administrative groups segregated by VLANs within an enterprise. When users who belong to these departments are not in close geographical proximity, it may require VLANs to span across a large section of the enterprise network and in some cases, even across the core of a network. IT administrators often despise running large Layer 2 sections across the core of a network and therefore typically set aside separate switches to provide such connectivity. Figure 2(a) depicts an example of such a network. 2007-2008 Foundry Networks, Inc. Page 2 of 5

MPLS In The Enterprise An example application in an enterprise network that provides VLAN connectivity across users distributed in different buildings. To protect the network core from broadcast storms, a separate switching infrastructure is used (shown by the red dashed lines) Figure 2 (a): Separate network used for VLAN connectivity among users in different buildings By moving to an MPLS infrastructure in the core, the same application can be accomplished over a common, converged network without any risk of impacting stability of the core network. Figure 2 (b): Use of an MPLS network provides resiliency and a way to interconnect users at Layer 2 without any risk of impacting stability of the network core A second example is when multiple branch offices of a large corporation need to be interconnected. Historically, geographically separated networks such as branch offices of a large corporation have been connected by leased T1 lines, Frame Relay or ATM connections. With the progress in Carrier-Grade Ethernet, such connectivity can well be accomplished using an Ethernet service. The standardization of VPN technologies over MPLS allows such applications to be easily delivered using MPLS. Three types of VPNs can be built over an MPLS network: A point-to-point Ethernet service provides connectivity between any 2 nodes in an Ethernet network and is commonly called Virtual Leased Line (VLL) or Virtual Private Wire Service (VPWS) A multipoint Ethernet service offers connectivity among multiple sites using a method called Virtual Private LAN Service (VPLS). Thus, a VPLS emulates the behavior of a traditional IEEE 802.1D bridge over an MPLS network. A Layer 3 VPN service that allows multiple virtual domains to be set up using a method called BGP/MPLS VPNs. This technology uses a combination of BGP and MPLS for creating multiple Layer 3 VPNs. 2007-2008 Foundry Networks, Inc. Page 3 of 5

Of these, VPLS and VLL are particularly interesting to enterprises because they provide effective alternatives to IT administrators averse to deploying loop-mitigating protocols such as RSTP or MSTP across large Layer 2 domains. These mechanisms work by establishing a pseudo-wire between participating routers and using a second label for carrying traffic within the VPLS or VLL. For VPLS, a full-mesh of pseudo-wires is established between participating MPLS routers to allow the Ethernet frame to be forwarded to the right destination. When processing broadcast or unknown unicast frames, VPLS uses a split-horizon method to prevent loops within the network. There is therefore no need for a loop-mitigating protocol (such as RSTP or MSTP) within the domain of the MPLS network. 1 Applicability of MPLS in an Enterprise Network There are several examples where MPLS is applicable in an enterprise network: Enterprises seeking to provide connectivity among several sites and who either own or have the ability to affordably lease fiber to connect these sites (e.g. a school district, utility provider, City Government, an enterprise that own multi-mode fiber connecting their different buildings) An enterprise network that has many VLANs spanning a large portion of their network Enterprises looking to migrate from FDDI/ATM networks installed in the 1990s An enterprise seeking to install a converged network Administration of an MPLS Network Administration of an MPLS network is surprisingly simple, particularly in an enterprise network. Because an MPLS network is built on top of an IP network, administration is very intuitive and there are well established tools for managing and monitoring an MPLS network. A Deployment Example Washington School District (WSD), a school district in Eastern Missouri, US, recently implemented a successful transition to an MPLS network. The District initially had an assortment of frame relay circuits to provide connectivity across the school district in addition to several switches and routers in their network. In addition to fast convergence and the ability to create TLS (Transparent LAN Service) tunnels across the MPLS network, 2 other factors were crucial in their choice of an MPLS network: Addition of new TLS service instances needs to be done only at the edge of the network without requiring any changes in the network core. In contrast, running VLANs across the network core would require making changes to the network core for every new service added. In the past, WSD had broadcast storms that affected the entire network by impacting the CPU load on the original L2/L3 backbone switches. With the use of VPLS, traffic is transparently sent to the members of the VPLS, without affecting the core of the network. Dale Loesing, Network Administrator at Washington School District says, We moved to an MPLS backbone utilizing FRR to achieve faster (50 ms) convergence for our VoIP traffic across our entire school district. What we got was a simpler, easier to manage network that I don t have to touch as much anymore. Using VLL and VPLS tunnels has eased the management overhead and improved our backbone stability by eliminating configuration changes each time I need to extend a VLAN across the network. A large multi-site hospital in Canada similarly migrated to an MPLS network recently with enormous success. 1 For a more detailed explanation of VPLS and VLL, refer to the white paper Offering Scalable Layer 2 Services With VPLS and VLL at http://www.foundrynet.com/pdf/an-offering-scalable-l2-services-vpls-vll.pdf 2007-2008 Foundry Networks, Inc. Page 4 of 5

Conclusions Enterprises seeking to build a large converged network that supports multiple services could benefit by considering the use of MPLS within their network. It is a proven technology that has been implemented in networks both large and small on a global scale. Author: Ananda Rajagopal Document version 1.0 Foundry Networks, Inc. Headquarters 4980 Great America Parkway Santa Clara, CA 95054-1200 U.S. and Canada Toll-free: (888) TURBOLAN Direct telephone: +1 408.207.1700 Email: info@foundrynet.com Web: http://www.foundrynet.com Foundry Networks, AccessIron, BigIron, EdgeIron, FastIron, IronPoint, IronView, IronWare, JetCore, NetIron, ServerIron, Terathon, TurboIron, and the Iron family of marks are trademarks or registered trademarks of Foundry Networks, Inc. in United States and other countries. All other trademarks are the properties of their respective owners. Although Foundry has attempted to provide accurate information in these materials, Foundry assumes no legal responsibility for the accuracy or completeness of the information. More specific information is available on request from Foundry. Please note that Foundry's product information does not constitute or contain any guarantee, warranty or legally binding representation, unless expressly identified as such in a duly signed writing. 2007-2008 Foundry Networks, Inc. All Rights Reserved 2007-2008 Foundry Networks, Inc. Page 5 of 5