SlideShare a Scribd company logo
1 of 48
MULTI PROTOCOL LABEL SWITCHING
(MPLS)
VAIBHAV MITTAL
Conventional IP Networks &
Routing
 Client networks are connected to backbone via
edge routers
 LAN, PSTN
 Data packets are routed based on IP address and
other information in the header
 Functional components
 Forwarding
 responsible for actual forwarding across a router
 consists of set of procedures to make forwarding decisions
 Control
 responsible for construction and maintenance of the
forwarding table
 consists of routing protocols such as OSPF, BGP
Cont…..
 IP Routing disadvantages:
Connectionless
e.g. no QoS
 Each router has to make independent
forwarding
decisions based on the IP-address
 Large IP Header
 At least 20 byte
 Routing takes place in Network Layer
 Slower than Switching
Contd…
 ATM
 connection oriented
Supports QoS
 fast packet switching with fixed length packets
(cells)
 integration of different traffic types
(voice,data,video)
… but there are also disadvantages
Contd…..
 ATM disadvantages
Complex
Expensive
Not widely adopted
Need for Multiprotocol Label
Switching (MPLS)
 Forwarding function of a conventional router
 a capacity demanding procedure
 constitutes a bottle neck with increase in line
speed
 MPLS simplifies forwarding function by taking
a totally different approach by introducing a
connection oriented mechanism inside the
connectionless IP networks
Label Switching
 Decomposition of network layer routing into
control and forwarding components applicable
 Label switching forwarding component
algorithm uses
 forwarding table
 label carried in the packet
 What is a Label ?
 Short fixed length entity
MPLS Basics
 A Label Switched Path (LSP) is set up for each
route
 A LSP for a particular packet P is a sequence of
routers,
<R1,R2………..Rn>
for all i, 1< i < n: Ri transmits P to R[i+1] by means
of a label
 Edge routers
 analyze the IP header to decide which LSP to use
 add a corresponding local Label Switched Path
Identifier, in the form of a label
 forward the packet to the next hop
MPLS Basics contd..
 Subsequent nodes
 just forward the packet along the LSP
 simplify the forwarding function greatly
 increase performance and scalability dramatically
 New advanced functionality for QoS,
differentiated services can be introduced in the
edge routers
 Backbone can focus on capacity and
performance
 Routing information obtained using a common
intra domain routing protocol such as OSPF
Basic Model for MPLS Network
LER
LER
LSR
LER
LSR
LSR
IP
MPLS
IP
Internet
LSR
LSR= Label Switched Router
LER= Label Edge Router
MPLS Benefits
Comparing MPLS with existing IP core and
IP/ATM technologies, MPLS has many
benefits:
 It hides the differences between different
Layer 2 protocols
 The connectivity and network services of layer
3 networks
 Improves the performance of network layer
routing
 Improved scalability
MPLS Benefits contd..
 Improves the possibilities for traffic
engineering
 Supports the delivery of services with QoS
guarantees
 Avoids need for coordination of IP and ATM
address allocation and routing information
 Label switching increases speed
MPLS Characteristics
 Mechanisms to manage traffic flows of various
types
 Is independent of Layer-2 and Layer-3
protocols
 Maps IP-addresses to fixed length labels
 Interfaces to existing routing protocols (RSVP,
OSPF)
 Supports ATM, Frame-Relay and Ethernet
MPLS Label Imposition and
Forwarding
 In order to use MPLS, network layer packets
are converted into labeled packets by adding
a LABEL
 POP: All labels are removed when packet
leaves the MPLS network.
 SWAP: LSR replaces existing label with the
new label and sends the packet to
appropriate next hop.
 PUSH: A label is added to packet when it
enters into MPLS network.
MPLS Label Imposition and
Forwarding
MPLS Label Imposition and
Forwarding
Contd…
 INGRESS LSR: Each packet enters into MPLS
network at INGRESS LSR
 EGRESS LSR: Each packet exits from into MPLS
network at EGRESS LSR
 MPLS network can forward the packets with out
knowing anything about the network protocols used
by the packets
 Only the INGRESS LSR and EGRESS LSR must
Label Switching Router
 As the packets travels in MPLS network, each
LSR swaps the incoming label with outgoing
label and continuous until last LSR, EGRESS
LSR is reached
 LSR keeps two tables which are related to
MPLS forwarding component.
 TAG INFORMATION BASE or
LABEL INFORMATION BASE.
 TAG FORWARDING INFORMATION BASE or
LABEL FORWARDING INFORMATION
LABEL SWITCHED PATH
 LSP connects the INGRESS LSR and
EGRESS LSR.
 LSP is unidirectional
 It is connection oriented scheme because
path is set up prior to any traffic flow.
 Connection set up is based on topology
information
Forward Equivalence Class
 The Forward Equivalence Class is a
representation of a group of packets that
share the
same requirements for their transport.
 The assignment of a particular packet to a
particular FEC is done just once.
 FECs are calculated on source and
destination address pair (TOS).
MPLS Label Structure:
Exp.bits: Experimental Bits, often used for Class of Service
BS: Bottom of Stack bit, is set if no label follows
TTL: Time To Leave, used in the same way like in IP
Contd…
 Label value. It is represented by 20 bits.
Range is 0 to 1048576
 EXP: Three bits for experimental use
Range is 0 to 7 used to indicate class of the
service.
 S:Bottom stack indicator.
 TTL: consists of 8 bits
Range is 0 to 255
MPLS Packet Structure
 The labels are distributed using LDP (Label
Distribution Protocol) or RSVP (ReSerVation
Protocol) or BGP (Border Gateway Protocol)
and OSPF (Open shortest Path First).
Applications of MPLS
 MPLS-VPN
 TE
 QoS
Overview of MPLS/VPN
 Overview of MPLS/VPN
A VPN is a network in which customer
connectivity among multiple sites is deployed
on shared infrastructure with the same access
or security policies as a private network.
Contd…
 VPN is rather a loosely defined term to mean
a range of technologies.
 There are mainly two types of VPN
Layer 2 VPN
Layer 3 VPN in overlay technology.
Contd…
 Layer 2 VPN can be formed from X.25,
Frame Relay or ATM
 Layer 3 VPN includes tunneling such as
IPSec or GRE and uses devices such as
concentrators.
 MPLS uses Layer 2 peer to peer VPN
model.
Contd…
 Earlier computer network implemented
leased line which were secure but not
cost effective hence statistical
multiplexing schemas were introduced to
form VPN.
 Overall VPN solution has a number of
components
CPE (customer premises equipment )
which is basically a Packet Assembly and
Disassembly (PAD) device,
Contd…
 The CPE device is connected through
transmission medium (leased line or dialup
connection), the edge device is called the
Provider Edge (PE) device.
 The service provider usually has additional
equipment in the core called the P devices.
Contd…
 The service provider can charge either a flat
rate for the VPN depending on bandwidth or
usage based.
 VPDN (Virtual Private Dialup network) uses
technologies such as one-time password or
encryption and uses protocols such as L2F or
L2TP.
What is MPLS-TE ?
 Process of routing data traffic in order to
balance the traffic load on various links,
routers and switches in the network.
it plays a vital role where multiple parallel
or alternate paths are available.
Motivation:
 To increase the efficiency of bandwidth
resources.
 To ensure most appropriate path for traffic.
 Cost Saving.
 To overcome load-balancing limitations in IP
routing.
Why TE ?
 To avoid congestion in the network due to
changes in traffic patterns.
 Better utilization of bandwidth
 Re-routing time is very low – 60ms.
 Capacity planning.
Goal of TE:
 Major goal is to facilitate efficient and reliable
network operations and simultaneously
optimizing network resources and
performance.
 Cost saving.
TE with MPLS:
 It dynamically establishes and maintains an
LSP across the MPLS domain using signaling
protocols, and the two signaling mechanisms
used are:
CR-LDP& RSVP.
constraints like bandwidth, delay,
hopcount…. are taken into consideration.
Selection of LSP’s:
 The LSPs are selected according to the type
of traffic you want to move. For example, if
you need to move some special SQL traffic to
feed your main database application, you
could select a hig h-se cure , hig h-co st, lo w-
late ncy, lo w-jitte r, lo w-lo ss, sufficie ntly o ve r
pro visio ne d LSP, to forward this precious load.
On the contrary, having to move some
common load you could use one be st-e ffo rt
LSP to accomplishes this ordinary work.
 This MPLS domain connects networks Aand
B. Three LSPs are here.
GreenLSPis a high quality LSP.
BlueLSPis a medium quality LSP.
RedLSPis a low quality LSP.
QOS (Quality Of Service):
 It is the ability to choose a route for a
particular data stream so that the path
provides a desired level of service.
 Providing Quality of Service (QoS) and traffic
engineering capabilities in the Internet is very
essential, especially to support the
requirements of real-time. For this purpose,
the current Internet must be enhanced with
new technology that enables it to offer such
capabilities.
QOS and MPLS:
 Traffic is aggregated into groups called FEC
(Fo rwarding Eq uivale nce Classe s ) and these
groups are assigned to specific Labe l
Switche d Path (LSP). Then traffic e ng ine e ring
can be implemented to assign hig h-prio rity
FECs onto hig h-q uality LSPs and lo we r-
prio rity FECs onto lo we r-q uality LSPs . This
way Qo S is implemented using MPLS.
Failure Detection:
 MPLS, by its specifications, it requires 6 0 m s to
recover from a failure.
 MPLS networks have to detect a problem and
switch the traffic on the faulty path over a new
path of equal quality within 60 ms.
 Two methods are used for this Failure
Detection
they are: He artbe at de te ctio n (polling) and
Erro r m e ssag ing .
Contd…
 Heartbeat detection: This is some kind of
ke e p-alive method. With this, each device in
the network advertise to a network manager
that it is alive, every pre scribe d inte rvalo f tim e
(by using timers). If the he artbe at is m isse d,
the path, link, device or node is declared as
failed and a switchover is performed. the
he artbe at or ke e p-alive messages have to be
flooded at least every 1 0 m s.
Contd…
 Errormessaging: In this method when a
network device detects an error, it sends a
message to its neighbor to redirect traffic to a
path or router that is working.
This method is the preferred when the
switch o ve r tim e is not critical. On the contrary,
the he artbe at m e tho d is the better choice.
Conclusion:
The new emerging technology
MPLS can provide a very good solution to the
internet problems with TE and QOS by using
all the resources in the network.
(which provides congestion less networks)
References:
 www.isoc.org
 www.opalsoft.net
 www.cisco.com
 www.rad.com
 A text book on “MPLS-VPN architectures” by
CISCO
 www.answers.com
thank you….

More Related Content

What's hot

Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)Netwax Lab
 
Mpls basics introduction
Mpls basics introductionMpls basics introduction
Mpls basics introductionPhilip Agu Bah
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switchingseanraz
 
MPLS + BGP Presentation
MPLS + BGP PresentationMPLS + BGP Presentation
MPLS + BGP PresentationGino McCarty
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMulugetaTsehay1
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhuCU
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming TechniquesAPNIC
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2Febrian ‎
 

What's hot (20)

Spannig tree
Spannig treeSpannig tree
Spannig tree
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Mpls
MplsMpls
Mpls
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
Mpls basics introduction
Mpls basics introductionMpls basics introduction
Mpls basics introduction
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
MPLS + BGP Presentation
MPLS + BGP PresentationMPLS + BGP Presentation
MPLS + BGP Presentation
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdf
 
Mpls technology
Mpls technologyMpls technology
Mpls technology
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 

Viewers also liked

Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetrjain51
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Sumit Pathak
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label SwitchingJay Patel
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsShawn Zandi
 
Web Access Log Management
Web Access Log ManagementWeb Access Log Management
Web Access Log ManagementJay Patel
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)NetProtocol Xpert
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsVishal Sharma, Ph.D.
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet StrategyDNN
 

Viewers also liked (20)

Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching Mpls-Multi Protocol label Switching
Mpls-Multi Protocol label Switching
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
An introduction to MPLS networks and applications
An introduction to MPLS networks and applicationsAn introduction to MPLS networks and applications
An introduction to MPLS networks and applications
 
Web Access Log Management
Web Access Log ManagementWeb Access Log Management
Web Access Log Management
 
Voice over MPLS
Voice over MPLSVoice over MPLS
Voice over MPLS
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Csma
CsmaCsma
Csma
 
Mpls
MplsMpls
Mpls
 
MPLS (Multi-Protocol Label Switching)
MPLS  (Multi-Protocol Label Switching)MPLS  (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
MPLS
MPLSMPLS
MPLS
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
MPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label SwitchingMPLS: Multiprotocol Label Switching
MPLS: Multiprotocol Label Switching
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet Strategy
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 

Similar to Mpls

Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering pptNitin Gehlot
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paperslahiri00
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12RAJAN ST
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network PresentationMuhammad Faisal
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
 

Similar to Mpls (20)

QOS of MPLS
QOS of MPLSQOS of MPLS
QOS of MPLS
 
J010136172
J010136172J010136172
J010136172
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
 
MPLS-extra.ppt
MPLS-extra.pptMPLS-extra.ppt
MPLS-extra.ppt
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
MPLS
MPLSMPLS
MPLS
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paper
 
I41026670
I41026670I41026670
I41026670
 
MPLS
MPLSMPLS
MPLS
 
Admission Control Mechanism For Mpls Ds Te
Admission Control Mechanism For Mpls Ds TeAdmission Control Mechanism For Mpls Ds Te
Admission Control Mechanism For Mpls Ds Te
 
V25112115
V25112115V25112115
V25112115
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
 
Digital network lecturer3
Digital network  lecturer3Digital network  lecturer3
Digital network lecturer3
 
Broadband Network Presentation
Broadband Network PresentationBroadband Network Presentation
Broadband Network Presentation
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Mpls

  • 1. MULTI PROTOCOL LABEL SWITCHING (MPLS) VAIBHAV MITTAL
  • 2. Conventional IP Networks & Routing  Client networks are connected to backbone via edge routers  LAN, PSTN  Data packets are routed based on IP address and other information in the header  Functional components  Forwarding  responsible for actual forwarding across a router  consists of set of procedures to make forwarding decisions  Control  responsible for construction and maintenance of the forwarding table  consists of routing protocols such as OSPF, BGP
  • 3. Cont…..  IP Routing disadvantages: Connectionless e.g. no QoS  Each router has to make independent forwarding decisions based on the IP-address  Large IP Header  At least 20 byte  Routing takes place in Network Layer  Slower than Switching
  • 4. Contd…  ATM  connection oriented Supports QoS  fast packet switching with fixed length packets (cells)  integration of different traffic types (voice,data,video) … but there are also disadvantages
  • 6. Need for Multiprotocol Label Switching (MPLS)  Forwarding function of a conventional router  a capacity demanding procedure  constitutes a bottle neck with increase in line speed  MPLS simplifies forwarding function by taking a totally different approach by introducing a connection oriented mechanism inside the connectionless IP networks
  • 7. Label Switching  Decomposition of network layer routing into control and forwarding components applicable  Label switching forwarding component algorithm uses  forwarding table  label carried in the packet  What is a Label ?  Short fixed length entity
  • 8. MPLS Basics  A Label Switched Path (LSP) is set up for each route  A LSP for a particular packet P is a sequence of routers, <R1,R2………..Rn> for all i, 1< i < n: Ri transmits P to R[i+1] by means of a label  Edge routers  analyze the IP header to decide which LSP to use  add a corresponding local Label Switched Path Identifier, in the form of a label  forward the packet to the next hop
  • 9. MPLS Basics contd..  Subsequent nodes  just forward the packet along the LSP  simplify the forwarding function greatly  increase performance and scalability dramatically  New advanced functionality for QoS, differentiated services can be introduced in the edge routers  Backbone can focus on capacity and performance  Routing information obtained using a common intra domain routing protocol such as OSPF
  • 10. Basic Model for MPLS Network LER LER LSR LER LSR LSR IP MPLS IP Internet LSR LSR= Label Switched Router LER= Label Edge Router
  • 11. MPLS Benefits Comparing MPLS with existing IP core and IP/ATM technologies, MPLS has many benefits:  It hides the differences between different Layer 2 protocols  The connectivity and network services of layer 3 networks  Improves the performance of network layer routing  Improved scalability
  • 12. MPLS Benefits contd..  Improves the possibilities for traffic engineering  Supports the delivery of services with QoS guarantees  Avoids need for coordination of IP and ATM address allocation and routing information  Label switching increases speed
  • 13. MPLS Characteristics  Mechanisms to manage traffic flows of various types  Is independent of Layer-2 and Layer-3 protocols  Maps IP-addresses to fixed length labels  Interfaces to existing routing protocols (RSVP, OSPF)  Supports ATM, Frame-Relay and Ethernet
  • 14. MPLS Label Imposition and Forwarding  In order to use MPLS, network layer packets are converted into labeled packets by adding a LABEL  POP: All labels are removed when packet leaves the MPLS network.  SWAP: LSR replaces existing label with the new label and sends the packet to appropriate next hop.  PUSH: A label is added to packet when it enters into MPLS network.
  • 15. MPLS Label Imposition and Forwarding
  • 16. MPLS Label Imposition and Forwarding
  • 17. Contd…  INGRESS LSR: Each packet enters into MPLS network at INGRESS LSR  EGRESS LSR: Each packet exits from into MPLS network at EGRESS LSR  MPLS network can forward the packets with out knowing anything about the network protocols used by the packets  Only the INGRESS LSR and EGRESS LSR must
  • 18. Label Switching Router  As the packets travels in MPLS network, each LSR swaps the incoming label with outgoing label and continuous until last LSR, EGRESS LSR is reached  LSR keeps two tables which are related to MPLS forwarding component.  TAG INFORMATION BASE or LABEL INFORMATION BASE.  TAG FORWARDING INFORMATION BASE or LABEL FORWARDING INFORMATION
  • 19. LABEL SWITCHED PATH  LSP connects the INGRESS LSR and EGRESS LSR.  LSP is unidirectional  It is connection oriented scheme because path is set up prior to any traffic flow.  Connection set up is based on topology information
  • 20. Forward Equivalence Class  The Forward Equivalence Class is a representation of a group of packets that share the same requirements for their transport.  The assignment of a particular packet to a particular FEC is done just once.  FECs are calculated on source and destination address pair (TOS).
  • 21. MPLS Label Structure: Exp.bits: Experimental Bits, often used for Class of Service BS: Bottom of Stack bit, is set if no label follows TTL: Time To Leave, used in the same way like in IP
  • 22. Contd…  Label value. It is represented by 20 bits. Range is 0 to 1048576  EXP: Three bits for experimental use Range is 0 to 7 used to indicate class of the service.  S:Bottom stack indicator.  TTL: consists of 8 bits Range is 0 to 255
  • 24.  The labels are distributed using LDP (Label Distribution Protocol) or RSVP (ReSerVation Protocol) or BGP (Border Gateway Protocol) and OSPF (Open shortest Path First).
  • 25. Applications of MPLS  MPLS-VPN  TE  QoS
  • 26. Overview of MPLS/VPN  Overview of MPLS/VPN A VPN is a network in which customer connectivity among multiple sites is deployed on shared infrastructure with the same access or security policies as a private network.
  • 27. Contd…  VPN is rather a loosely defined term to mean a range of technologies.  There are mainly two types of VPN Layer 2 VPN Layer 3 VPN in overlay technology.
  • 28. Contd…  Layer 2 VPN can be formed from X.25, Frame Relay or ATM  Layer 3 VPN includes tunneling such as IPSec or GRE and uses devices such as concentrators.  MPLS uses Layer 2 peer to peer VPN model.
  • 29. Contd…  Earlier computer network implemented leased line which were secure but not cost effective hence statistical multiplexing schemas were introduced to form VPN.  Overall VPN solution has a number of components CPE (customer premises equipment ) which is basically a Packet Assembly and Disassembly (PAD) device,
  • 30. Contd…  The CPE device is connected through transmission medium (leased line or dialup connection), the edge device is called the Provider Edge (PE) device.  The service provider usually has additional equipment in the core called the P devices.
  • 31. Contd…  The service provider can charge either a flat rate for the VPN depending on bandwidth or usage based.  VPDN (Virtual Private Dialup network) uses technologies such as one-time password or encryption and uses protocols such as L2F or L2TP.
  • 32. What is MPLS-TE ?  Process of routing data traffic in order to balance the traffic load on various links, routers and switches in the network. it plays a vital role where multiple parallel or alternate paths are available.
  • 33.
  • 34. Motivation:  To increase the efficiency of bandwidth resources.  To ensure most appropriate path for traffic.  Cost Saving.  To overcome load-balancing limitations in IP routing.
  • 35. Why TE ?  To avoid congestion in the network due to changes in traffic patterns.  Better utilization of bandwidth  Re-routing time is very low – 60ms.  Capacity planning.
  • 36. Goal of TE:  Major goal is to facilitate efficient and reliable network operations and simultaneously optimizing network resources and performance.  Cost saving.
  • 37. TE with MPLS:  It dynamically establishes and maintains an LSP across the MPLS domain using signaling protocols, and the two signaling mechanisms used are: CR-LDP& RSVP. constraints like bandwidth, delay, hopcount…. are taken into consideration.
  • 38.
  • 39. Selection of LSP’s:  The LSPs are selected according to the type of traffic you want to move. For example, if you need to move some special SQL traffic to feed your main database application, you could select a hig h-se cure , hig h-co st, lo w- late ncy, lo w-jitte r, lo w-lo ss, sufficie ntly o ve r pro visio ne d LSP, to forward this precious load. On the contrary, having to move some common load you could use one be st-e ffo rt LSP to accomplishes this ordinary work.
  • 40.  This MPLS domain connects networks Aand B. Three LSPs are here. GreenLSPis a high quality LSP. BlueLSPis a medium quality LSP. RedLSPis a low quality LSP.
  • 41. QOS (Quality Of Service):  It is the ability to choose a route for a particular data stream so that the path provides a desired level of service.  Providing Quality of Service (QoS) and traffic engineering capabilities in the Internet is very essential, especially to support the requirements of real-time. For this purpose, the current Internet must be enhanced with new technology that enables it to offer such capabilities.
  • 42. QOS and MPLS:  Traffic is aggregated into groups called FEC (Fo rwarding Eq uivale nce Classe s ) and these groups are assigned to specific Labe l Switche d Path (LSP). Then traffic e ng ine e ring can be implemented to assign hig h-prio rity FECs onto hig h-q uality LSPs and lo we r- prio rity FECs onto lo we r-q uality LSPs . This way Qo S is implemented using MPLS.
  • 43. Failure Detection:  MPLS, by its specifications, it requires 6 0 m s to recover from a failure.  MPLS networks have to detect a problem and switch the traffic on the faulty path over a new path of equal quality within 60 ms.  Two methods are used for this Failure Detection they are: He artbe at de te ctio n (polling) and Erro r m e ssag ing .
  • 44. Contd…  Heartbeat detection: This is some kind of ke e p-alive method. With this, each device in the network advertise to a network manager that it is alive, every pre scribe d inte rvalo f tim e (by using timers). If the he artbe at is m isse d, the path, link, device or node is declared as failed and a switchover is performed. the he artbe at or ke e p-alive messages have to be flooded at least every 1 0 m s.
  • 45. Contd…  Errormessaging: In this method when a network device detects an error, it sends a message to its neighbor to redirect traffic to a path or router that is working. This method is the preferred when the switch o ve r tim e is not critical. On the contrary, the he artbe at m e tho d is the better choice.
  • 46. Conclusion: The new emerging technology MPLS can provide a very good solution to the internet problems with TE and QOS by using all the resources in the network. (which provides congestion less networks)
  • 47. References:  www.isoc.org  www.opalsoft.net  www.cisco.com  www.rad.com  A text book on “MPLS-VPN architectures” by CISCO  www.answers.com

Editor's Notes

  1. Sanjay