Enterprise Network Simulation Using MPLS- BGP



Similar documents
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

Introducing Basic MPLS Concepts

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

How Routers Forward Packets

Implementing VPN over MPLS

Cisco Configuring Basic MPLS Using OSPF

RFC 2547bis: BGP/MPLS VPN Fundamentals

How To Make A Network Secure

For internal circulation of BSNLonly

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

- Multiprotocol Label Switching -

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Multi Protocol Label Switching (MPLS) is a core networking technology that

Kingston University London

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

MPLS Implementation MPLS VPN

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS Concepts. Overview. Objectives

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

MPLS VPNs with DiffServ A QoS Performance study

Overlay Networks and Tunneling Reading: 4.5, 9.4

IPv6 over IPv4/MPLS Networks: The 6PE approach

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Sprint Global MPLS VPN IP Whitepaper

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Introduction to MPLS-based VPNs

MPLS - A Choice of Signaling Protocol

SBSCET, Firozpur (Punjab), India

MPLS in Private Networks Is It a Good Idea?

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Table of Contents. Cisco Configuring a Basic MPLS VPN

Layer 3 Multiprotocol Label Switching Virtual Private Network

MPLS L2VPN (VLL) Technology White Paper

MPLS-based Layer 3 VPNs

l.cittadini, m.cola, g.di battista

Campus Network Virtualization using Multiprotocol Label Switching Virtual Private Networks (MPLS-VPNs)

Comparative Analysis of Mpls and Non -Mpls Network

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Protection Methods in Traffic Engineering MPLS Networks

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

MPLS VPN Route Target Rewrite

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

A Simulation Analysis of Latency and Packet Loss on Virtual Private Network through Multi Virtual Routing and Forwarding

Junos MPLS and VPNs (JMV)

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Master Course Computer Networks IN2097

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

How To Understand The Benefits Of An Mpls Network

MPLS-Enabled Network Infrastructures

QoS Performance Evaluation in BGP/MPLS VPN

Addressing Inter Provider Connections With MPLS-ICI

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

MPLS Architecture for evaluating end-to-end delivery

Evaluating performance on an ISP MPLS network

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Internetworking II: VPNs, MPLS, and Traffic Engineering

HP Networking BGP and MPLS technology training

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

S ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

RSVP- A Fault Tolerant Mechanism in MPLS Networks

MPLS Concepts. MPLS Concepts

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Quidway MPLS VPN Solution for Financial Networks

Configuring a Basic MPLS VPN

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

NAVAL POSTGRADUATE SCHOOL THESIS

Implementing Cisco MPLS

Demonstrating the high performance and feature richness of the compact MX Series

Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission

Design of Virtual Private Networks with MPLS

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

MPLS is the enabling technology for the New Broadband (IP) Public Network

Designing and Developing Scalable IP Networks

Frame Mode MPLS Implementation

Lesson 13: MPLS Networks

Approach to build MPLS VPN using QoS capabilities

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Project Report on Traffic Engineering and QoS with MPLS and its applications

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru

Introduction Inter-AS L3VPN

Implementing MPLS VPNs over IP Tunnels

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

Transcription:

Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy, VESIT, Chembur, Mumbai-71, India smita.jangale@ves.ac.in ABSTRACT Till business communication came over Internet, a clear distinction between private and public networks was present. Private networks based on technologies like Frame Relay and point-to-point circuits inherently provided security. Private data now is transferred over a public network using another type of VPN. For an enterprise to achieve its business goals, an enterprise campus must be highly scalable. This can achieved by having MPLS/BGP network in which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. The paper presents simulation of MPLS/BGP VPN using GNS3 simulator. Further virtual routing and forwarding instant, working on label switching and link failure (redundancy) is discussed. Keywords: Multiprotocol Label Switching, MPLS/BGP, MPLS VPN. INTRODUCTION In an enterprise employees share files using networking system, which helps them integrate their work. Applications like customer relationship management (CRM) and enterprise resource planning (ERP) have become commonplace in most enterprises today. Servers hosting these applications can now process and deliver data at Gigabit speeds. The network infrastructure must support these increased bandwidth and performance demands. So a secure a reliable network connection is required to protect the data transferred [3]. Multiprotocol Label Switching (MPLS) offers extremely scalable, deterministic re-route, traffic engineering, data-carrying mechanism which transfers data packets with assigned labels across the network through virtual links. Border Gateway Protocol (BGP), path vector protocol which acts as a core routing protocol of the Internet. It maintains a table of IP networks or prefixes and assigns network reachability to autonomous systems; as a result it is indirectly used by the Internet users. ibgp protocol is used among the routers in autonomous system to command the internal routers. DIFFERENT TECHNOLOGIES USED FOR FORWARDING DATA Many enterprises used VSAT (Very Small Aperture Terminal). It is a satellite communication system, which serves business users. A VSAT end user needs a box that interfaces between the user's computers in addition, an outside antenna with a transceiver. The transceiver receives or sends a signal to a satellite transponder in the sky. The satellite sends and receives signals from an earth station computer that acts as a hub for the system. Each end user is interconnected with the hub station via the satellite in a star topology. For one end user to communicate with another, each transmission has to first go to the hub station, which retransmits it via the satellite to the other end user's VSAT. VSAT handles data, voice, and video signals. It has many drawbacks like data transfer window is 2 to 10 minutes, there is no guarantee for data transfer over analog voice lines, low bandwidth less than 28.8 Kbps, no security, cannot cost-effectively increase bandwidth, hard to manage, Cannot multicast with the analog modem. Private networks based on technologies like Frame Relay and point-to-point circuits inherently provided network security because the public did not have access to a particular customer s data. Frame Relay, although not commonly thought of in this manner, can be considered a type of Virtual Private Network (VPN) because of the nature in which the Permanent Virtual Circuits (PVCs) connect locations together through a provider s network. Private data is now transferred over a public network using another type of VPN. In this model, the virtual nature of the network comes

into play because a company does not have dedicated paths or dedicated PVCs for data; instead, all traffic is routed over the Internet from one location to another. Service Provider VPNs, is an emerging category of service provided by carriers to create a network that combines the best aspects of both traditional access and CPE-based VPNs. Service Providers can use MPLS/BGP approach to combine MPLS for forwarding the data and BGP for controlling the routes in order to construct secure network. PROPOSED SYSTEM For an enterprise to achieve its business goals, an enterprise campus must be highly scalable. This can achieved by having MPLS/BGP network in which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes [1],[2]. Open Shortest Path First (OSPF) is used as Interior Gateway Protocol (IGP) [5][6]. This method will be simulated using GNS3, which is a graphical network simulator that allows designing complex network topologies. NETWORK STRUCTURE The P (provider) routers are ISP core routers which don't connect to customer routers and typically run only MPLS. PE (provider edge) routers connect to customer sites and form the edge of a VPN. CE (customer edge) routers exist at the edge of a customer site; they have no VPN awareness. An Label Distribution Protocol (LDP) running among all P and PE routers is used to support BGP adjacencies within the provider network. Multiprotocol BGP (MP-BGP) is run only among PE routers. An IGP is run between each CE router and its upstream PE router [5]. Steps for configuration. 1. Give IP addresses to all routers (P and PE). 2. Configure OSPF area for all routers (P and PE). 3. Configure ibgp on PE routers. 4. Configure MPLS on all routers (P and PE). 5. Create VRF (Virtual routing/forwarding) on PE routers connected to CE. 6. Create OSPF area process for customer. 7. Give IP addresses to Customer Edges. 8. Redistribute customer routes.

Figure 1 Network Structure Design. Network Structure for Simulation is depicted in above Figure 1. There are two Provider routers P1 and P2, four Provider Edge routers PE1, PE2, PE3 and PE4 and two Customer Edge routers CE1 and CE2. Customer IBM-A site is connected to IP address 171.1.1.1. and customer IBM-B site is connected to IP address 10.1.7.1. OSPF 1 area 0 is given to all P and PE routers while OSPF 10 area 1 is given to CE routers. Figure 2 shows MPLS forwarding table for PE1. Figure 2 MPLS forwarding table for PE1. 4.1 Virtual Routing and Forwarding Instant We look how an IP packet traverses the MPLS VPN backbone from one customer site to another. MP-BGP running between the PE routers distributes the vpnv4 routes and their associated VPN label. Between all PE and CE routers, the routing protocol puts the customer routes into the VRF routing table on the PE routers [5]. Figure 3. shows path and

Fig. 4. Shows the route taken by the packet from CE2, where IBM site B is located, to CE1, where IBM site A is located. The packet routes through CE2(10.10.10.2) PE4(10.10.10.1) - P2(172.16.9.25) PE1(1.1.10.1) CE (1.1.10.1). Figure 3 Path from IBM-B site to IBM-A site. Figure 4 Packet Route from IBM-B (CE2) to IBM-A (CE1). 4.2 Working of Label Switching Label switching indicates that the packets are no longer IPv4 packets, IPv6 packets or even Layer frames when switched, but they are labels. One MPLS label is a field of 32 bits where first 20 bits are label value, bits 20 to 22 are EXP bits for QoS, bit 23 is bottom of stack (BoS) and bits 24 to 31 used fir Time To Live (TTL). A label switched path (LSP) is a sequence of Label Switch Routers (LSRs) that switch a labeled packet through MPLS network. The first LSR

of the LSP is the ingress LSR, last LSR is the egress LSR and all LSR s in between are intermediate LSR [1][2][5]. Fig. 3. shows that packet destined for 171.1.1.1 entering the MPLS network on ingress LSR (PE4), where it is imposed with the label 24 and switched towards the next LSR. Second LSR (P2) swaps incoming label 24 to outgoing label 28 and forwards to next LSR (PE1). The egress LSR receiving a packet with label 28 would remove the label and perform an IP lookup on the destination IP address. 4.3 Link Failover (Redundancy) Figure 5 Alternate Path from IBM-B site to IBM-A site. Figure 6 Alternate Route on Link Failure. The MPLS network designed is such that redundancy exists. There are multiple paths to reach destination address. When a link fails, automatically other path is taken to reach the destination address. Figure 5 shows alternate path taken to reach CE1 (1.1.10.1). When P2 fails P1 (172.16.9.13) is chosen to complete the route. Figure 6 shows that packet destined for 171.1.1.1 entering the MPLS network on ingress LSR (PE4), where it is imposed with the label 21 and switched towards the next LSR. Second LSR (P1) swaps incoming label 21 to outgoing label 28 and forwards to

next LSR (PE1). The egress LSR receiving a packet with label 28 would remove the label and perform an IP lookup on the destination IP address. FUTURE SCOPE Above network design is done with one protocol OSPF, which can be extended to different protocols since we use MPLS - Multiprotocol label switching. CONCLUSION In this paper, we have seen configuration of MPLS/BGP VPN, with virtual routing and forwarding, working of label switching, and link failure (redundancy). MPLS/BGP VPN offers many benefits over more traditional methods of connectivity. The benefits include lower monthly cost, easier management and configuration of routers at the customer premise. Additional benefits include the ability to connect any site together with any other site just by changing routing information on the service provider s PE router. This reduces cost to the customer and network complexity. REFERENCES [1] E. Rosen, Y. Rekhter, BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4364, February 2006. [2] E. Rosen, Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs), RFC 4365, February 2006. [3] Alcatel, Lucent, 2007 MPLS-Enabled Network Infrastructures. [4] ADTRAN, Inc., 2005 Private IP Service BGP/MPLS VPN Networks. [5] De Ghein, 2007 MPLS Fundamentals. Indianapolis. IN: Cisco Press. [6] Juniper Networks, 2010 Network scaling with BGP labeled unicast.