JNUProject
JNUProject
i
Abstract
ii
The world has emerged as a global village. Internet has brought an amazing change in the era of
modern communications. Demand for multimedia applications and an ever-increasing amount
of VoIP traffic have increased data rate and bandwidth requirements. It has become a big
challenge to provide best quality applications.
Traffic engineers are working hard over Internet Protocol (IP) and Routing Protocols (RPs) in
order to cope with this challenge. IP networks have offered these services efficiently until now,
but there are several issues with IP routing that affect the Quality of Service (QoS). Multi-
Protocol Label Switching (MPLS) has emerged as an agile technology which promises effective
security together with high speed data delivery.
MPLS networks use switching instead of conventional routing. MPLS doesn’t replace existing IP
networks, but guarantees instead better QoS in existing IP networks as well as future routing
technologies, providing thus a suitable environment for Traffic Engineering (TE). The Class of
Service (CoS) architecture provided by MPLS can easily be coordinated with IP QoS
mechanisms.
Traffic can be switched based on resource utilization and network performance instead of using
static routing techniques such as selecting a path with least cost, optimizing thus the MPLS
network for heavy application at desired quality.
Acknowledgements
iii
At first remember the Almighty Allah, since he gave us the strength to complete the project. I
would like to thanks our supervisor, Professor Dr. Uzzal Kumar Acharjee, Director, Department
of Computer Science and Engineering, Jagannath University. Without his support and guidance,
this project could not elevate up this level of development from my point of view.
And I would like to thanks all the Faculty members, Department of Computer Science and
Engineering, Jagannath University for their valuable time spend.
We would like to express our sincere and cordial gratitude to the people those who have
supported us directly, purveyed mental encouragement, evaluated and criticized our work in
several phases during the development of this internship and for preparing this paper
indirectly.
iv
Table of Contents
List of Figures.................................................................................................................................vii
List of Tables..................................................................................................................................viii
List of Abbreviations........................................................................................................................ix
Chapter-1 Introduction....................................................................................................................1
1 Introduction..................................................................................................................................2
1.1 Project Aim.............................................................................................................................2
1.2 Project Objectives...................................................................................................................2
1.3 Motivation..............................................................................................................................2
1.4 Project Structure....................................................................................................................3
1.5 Project Outcome....................................................................................................................3
Chapter-2 IP Routing........................................................................................................................4
2 Background...................................................................................................................................5
2.1 Type of Service.......................................................................................................................5
2.1.1 Connection Oriented Service...........................................................................................5
2.1.2 Connectionless Service....................................................................................................5
2.2 Types of Transmission............................................................................................................5
2.2.1 Routing.............................................................................................................................6
2.2.2 Switching..........................................................................................................................6
2.3 Types of Devices.....................................................................................................................6
2.3.1 Router...............................................................................................................................6
2.3.2 Switch/Hub/Bridge...........................................................................................................6
2.3.3 Server/Workstation..........................................................................................................6
2.3.4 Links..................................................................................................................................6
2.4 Types of Networks..................................................................................................................6
2.4.1 Local Area Network..........................................................................................................7
2.4.2 Wide Area Network..........................................................................................................7
2.4.3 Metropolitan Area Network............................................................................................7
2.5 Types of Protocols..................................................................................................................7
2.5.1 Routing Protocols.............................................................................................................7
2.5.2 Routed Protocols..............................................................................................................7
2.5.3 Messaging Protocols........................................................................................................7
2.6 Internet Protocol....................................................................................................................7
2.6.1 IP Operations....................................................................................................................8
2.6.2 IP Encapsulation...............................................................................................................8
2.6.3 IP Header..........................................................................................................................8
2.7 Routing Mechanism................................................................................................................9
2.8 Autonomous System..............................................................................................................9
2.8.1 Stub AS.............................................................................................................................9
2.8.2 Transit AS.........................................................................................................................9
2.8.3 Multi-Homed AS.............................................................................................................10
v
2.9 Routing Techniques..............................................................................................................10
2.9.1 Static Routing.................................................................................................................10
2.9.2 Distance-Vector Routing................................................................................................10
2.9.3 Link State Routing..........................................................................................................10
2.9.4 Hybridized Routing.........................................................................................................11
2.10 IP Network’s Limitations....................................................................................................11
2.10.1 Scalability.....................................................................................................................11
2.10.2 Class of Service.............................................................................................................11
2.10.3 Lack of Route Recovery................................................................................................12
2.10.4 Lack of QoS...................................................................................................................12
2.10.5 Inaccessibility of Bandwidth........................................................................................12
Chapter-3 Problem Statement......................................................................................................13
3.1 Important Issues...................................................................................................................14
3.2 Project Goal..........................................................................................................................15
Chapter-4 Multi-Protocol Label Switching....................................................................................16
4.1 Background...........................................................................................................................17
4.2 MPLS Concepts.....................................................................................................................17
4.3 MPLS Applications................................................................................................................17
4.3.1 Traffic Engineering.........................................................................................................17
4.3.2 Path Management.........................................................................................................18
4.3.3 Virtual Private Network.................................................................................................18
4.3.4 Multi-Protocol Support..................................................................................................19
4.4 MPLS Header........................................................................................................................19
4.5 MPLS Operations..................................................................................................................19
4.6 MPLS Network Architecture.................................................................................................20
4.6.1 Forwarding Component.................................................................................................20
4.6.2 Control Component.......................................................................................................20
4.6.3 Control Plane..................................................................................................................21
4.6.4 Data Plane......................................................................................................................21
4.6.5 Label Switching Router..................................................................................................21
4.6.6 Label Edge Router..........................................................................................................21
4.6.7 Label Switching Path......................................................................................................21
4.6.8 Label Distribution Protocol............................................................................................22
4.6.9 MPLS Label.....................................................................................................................22
4.6.10 Forwarding Equivalence Class......................................................................................23
4.7 MPLS Operation Modes.......................................................................................................23
4.7.1 Frame Mode...................................................................................................................23
4.7.2 Cell Mode.......................................................................................................................25
4.8 Loop Detection and Prevention........................................................................................27
4.8.1 Frame Mode...................................................................................................................28
4.8.2 Frame Mode: Control Plane Loop Prevention...................................................................28
4.8.3 Data Plane Mode............................................................................................................28
4.9 LSR Mode..............................................................................................................................29
4.9.1 Label Distribution Mode................................................................................................29
vi
4.9.2 Label Retention Mode....................................................................................................29
4.9.3 Control Mode.................................................................................................................29
4.10 MPLS Packet Forwarding....................................................................................................30
Chapter-5 MPLS Traffic Engineering..............................................................................................31
5.1 Overview...............................................................................................................................32
5.1.1 Basics of TE.....................................................................................................................32
5.2 MPLS-TE................................................................................................................................33
5.2.1 Overview........................................................................................................................33
5.2.2 Load Balancing...............................................................................................................33
5.2.3 Link Congestion..............................................................................................................34
5.2.4 Link Protection...............................................................................................................35
5.3 Advantages of MPLS-TE........................................................................................................36
5.4 MPLS-TE Operations.............................................................................................................36
5.4.1 Distribution of Link Information....................................................................................36
5.4.2 Computation of Path......................................................................................................36
5.4.3 LSP Signaling...................................................................................................................37
5.5 MPLS-TE Classes...................................................................................................................37
5.5.1 Traffic Oriented..............................................................................................................37
5.5.2 Resource Oriented.........................................................................................................37
5.6 RSVP and TE..........................................................................................................................37
5.6.1 RSVP Packet Format.......................................................................................................38
5.6.2 RSVP Object Fields.........................................................................................................38
5.7 RSVP Message Types............................................................................................................39
5.7.1 RSVP Path Message........................................................................................................39
5.7.2 RSVP Path Tear Message................................................................................................39
5.7.3 RSVP Path Error Message...............................................................................................39
5.7.4 RSVP Reservation Request Message..............................................................................40
5.7.5 RSVP Reservation Confirm Message..............................................................................40
5.7.6 RSVP Reservation Tear Message....................................................................................40
5.7.7 RSVP Reservation Error Message...................................................................................40
5.8 RSVP Reservation.................................................................................................................41
5.8.1 Sender Selection............................................................................................................41
5.8.2 Session Reservation.......................................................................................................41
5.8.3 Reservation Styles..........................................................................................................41
5.9 Quality of Service..................................................................................................................42
5.10 Internet Service Models.....................................................................................................42
5.10.1 Best-Effort Service Model............................................................................................42
5.10.2 Integrated Service Model.............................................................................................43
5.10.3 Differentiated Service Model.......................................................................................44
5.10.4 Hybrid Model...............................................................................................................44
Chapter-6 Label Management.......................................................................................................45
6.1 Label Distribution Protocol...................................................................................................46
6.1.1 LDP Packet Format.........................................................................................................46
6.1.2 LDP Message Format.....................................................................................................47
vii
6.1.3 LDP Type-Length-Value Format.....................................................................................47
6.2 LDP Messages.......................................................................................................................47
6.2.1 Notification Message.....................................................................................................48
6.2.2 Hello Message................................................................................................................48
6.2.3 Initialization Message....................................................................................................48
6.2.4 KeepAlive Message........................................................................................................48
6.2.5 Address Message...........................................................................................................48
6.2.6 Address Withdraw Message..........................................................................................48
6.2.7 Label Mapping Message................................................................................................48
6.2.8 Label Request Message..................................................................................................48
6.2.9 Label Abort Request Message.......................................................................................48
6.2.10 Label Withdraw Message.............................................................................................49
6.2.11 Label Release Message................................................................................................49
6.3 Merging Labels.....................................................................................................................49
6.4 Label Distribution Modes.....................................................................................................49
6.4.1 Independent Label Distribution Control........................................................................50
6.4.2 Ordered Label Distribution Control...............................................................................50
6.5 Label Retention....................................................................................................................50
6.6 Free Labels............................................................................................................................51
6.7 Label Space...........................................................................................................................51
6.7.1 Per-Interface Label Space..............................................................................................52
6.7.2 Per-Platform Label Space...............................................................................................52
6.8 Label Stacking.......................................................................................................................52
Chapter-7 Conclusions...................................................................................................................54
7.1 Issues....................................................................................................................................55
7.1.1 Path Capacity and Multi-Class Traffic............................................................................55
7.1.2 Load Dependent Parameters and Path Capacity...........................................................55
7.1.3 Load Dependent Parameters and Non-Linear Models..................................................55
7.2 Project Conclusions..............................................................................................................56
7.3 Future Work.........................................................................................................................56
References.....................................................................................................................................57
viii
List of Figures
Figure 2. 1 IP Datagram...................................................................................................................................................8
ix
List of Tables
Table 2. 1 IP Header.....................................................................................................................................8
x
List of Abbreviations
Acronym Abbreviation
DV Distance Vector
IP Internet Protocol
xi
IPV4 Internet Protocol Version 4
xii
Public Switch Telephone Network
PPP
Point to Point Protocol
PDU
Packet Distribution Unit
TE Traffic Engineering
xiii
Chapter-1 Introduction
1
1 Introduction
Internet has grown tremendously over the years and this growth has also raised concerns for
good management and performance of the packet switched network communications.
Engineers are developing new techniques, architectures and protocols to best support these
new means of communication. Alongside this development, a continuous effort is being put on
planning future protocols or changing existing ones.
Many fascinating devices and applications have emerged with the boom of Internet. To live up
to users’ expectations, application efficiency and performance needs to be consistent. IP
networks are serving well existing user application and their demands, but there are some
elements that often cause problems for an ever-growing range of applications.
All issues relating to communication are resolved through Traffic Engineering (TE). TE is a set of
tools and techniques for managing networks data comprehensively. TE helps a lot in serving
users and their expectations. Traffic engineers working over the years have come up with a
technology known as Multi-Protocol Label Switching (MPLS). MPLS uses both new techniques
and existing IP routing techniques in order to improve performance of data communications.
1.3 Motivation
IP networks have been supporting several great applications for many years, but MPLS emerged
as a new technology that improves overall QoS. Many problems of IP networks are promised to
be solved and improved by the MPLS technology.
Many new protocols and techniques will emerge on this new communication era that supports
VPN tunneling, TE, multicasting and many more. Stock holders, i.e., Internet Service Providers
(ISPs) and enterprises with large autonomous networks need to implement MPLS in order to
continue competing in a challenging market and for efficiently serving their clients.
Development of real-time applications by leading market vendors has triggered a need for an
efficient technology which will fulfill the ever-increasing user demands. Real-time applications
like IPTV need extensive bandwidth and moreover, a quality network. Therefore, efficient
2
solutions like efficient bandwidth utilization provided by MPLS are the answer to uncertainty
and deliver a promise for quality.
Chapter 1 contains information about the project objectives, Motivation and its structure
Chapter 2 discusses IP networks. It provides a detailed overview of the routing mechanism and
different protocols used in IP routing. Chapter 3 highlights the main problems for which this
research is conducted. Chapter 4 explains the MPLS technique, its components, functions and
protocols. Chapter 5 discusses aspects involved in TE that enhance QoS in MPLS. Chapter 6
gives a comprehensive study of label management mechanism, i.e. how labels are added,
removed and managed. Finally, Chapter 7 concludes this re-search work by highlighting some of
the MPLS issues, presenting our conclusions and thoughts for future work.
IP networks’ limitations will be identified and features of MPLS which improve network
performance are elaborated in detail. Finally, a picture will be drawn to conclusively support
that MPLS is far better than IP networks in terms of efficiency, performance and quality of
network transmission. It will also help improve the theoretical background for future industrial
projects in MPLS.
3
Chapter-2 IP Routing
4
2 Background
Computer systems were “standalone” at times and data was manually shared between them. In
turn, this prompted for a need of inter-networking between these systems in order to ensure
automatic and easy data exchange. Emergence of huge networks has compelled computers to
communicate through various protocols. A protocol is said to form a set of rules that govern
data communication.
These protocols provide services to either a wired or a wireless medium over a physical or
logical channel. Several techniques and devices have been developed to support efficient
networking services.
A large range of applications have been developed that efficiently share information and pro-
vide services both to officials (business-to-business, resource sharing, data storage, print and
scan utilities, conferencing, etc.) and to home users (fun and multimedia, live video streaming,
SMS and interactive chat services). These applications work regardless of media and location,
i.e., the wireless and wired medium supports these services and even mobile devices that
continuously change their location.
5
2.2.1 Routing
It is a process of finding the path and move data from a source to a destination in computer
networks. It is performed in two or several networks, e.g. telephone network, electronic data
networks (the Internet) and transportation networks
2.2.2 Switching
It is a process of moving packets between devices within the same network. Sender and
receiver are physically connected via a central device which performs switching. This device
must know the physical address of the devices; this address is also known as the Media Access
Control (MAC) address
2.3.1 Router
A router is a device which transmits data over two or more networks. It uses destination ad-
dresses and some special service information to forward data to a specific path. It directly or
indirectly connects to devices belonging to different networks. In general terms, the router is
the device that performs the routing
2.3.2 Switch/Hub/Bridge
It is a category of devices which transmit data between two or more directly connected devices.
The switch/hub/bridge needs to know the physical address of the connected devices. Switches
use a communication technique known as switching
2.3.3 Server/Workstation
A server is a computing device that provides services to other computers. The computers using
services from the server are known as workstations or clients.
2.3.4 Links
Links are the actual physical connections between internetworking devices. These links may be
wired (guided, i.e., Twisted-Pair Cable, Coaxial Cable, Fiber-Optic Cable) or wireless (unguided,
i.e., Radio Waves, Microwaves, Infrared)
6
2.4 Types of Networks
Depending on the territory and physical layout of a network, a network can be one of the fol-
lowing:
7
These are the type of protocols that perform error reporting. If a host or server is unreachable or a ser-
vice is unavailable these protocols are used by the operating system of the communicating device to
inform the other connected devices about the situation. These are Internet Control Message Protocol
(ICMP, ICMPV6) and Internet Group Management Protocol (IGMP)
IP has two versions; however, we will only discuss version 4, which is most dominant of the two.
• IPv4
• IPv6
2.6.1 IP Operations
An IP header is placed on the data, which includes information about the destination host and the
ser-vice for which this data is transported. Along with this information, checksum information,
segment number and protocol type is added in the header
When reaching the destination, the reverse operation is performed on the datagram by the
receiving machine in order to retrieve information about checksum (ensures data reliability) and
segmentation (to reorder data).
2.6.2 IP Encapsulation
Figure 2.1 shows how IP encapsulates segments from the upper layers.
Figure 2. 1 IP Datagram
Figure 2.1 shows the data for IP header is actually the segment from Transport Layer which itself
includes the TCP/User Datagram Protocol (UDP) header and application data.
8
2.6.3 IP Header
Table 2.1 illustrates the fields contained in an IP header
4-bit IP 4-bit 8-bit 16-bit 16-bit Three 13-bit 8-bit 8-bit 16-Bit 32-bit 32-bit Padding
Version Header type of Total Packet 1-bit Fragment Time- Protocol Checksum Source Destination
Number Length Service Length Identifier Flag offset to- Identifier IP IP Address
Flags Field Field Live Field Address
Field
Table 2. 1 IP Header
• Protocol Identifier Field: 8-bit, used to identify the upper layer protocol, e.g., TCP or UDP
• Checksum: 16-bit, used for error-checking and to inform the destination about size of incoming
traffic. At reaching its destination, the packet is checked against this value and the result is
matched with attached checksum; if the result is the same it means that the datagram has
survived any damage or loss
• Source IP Address: IP address of the sender/source host
• Destination IP Address: IP address of the receiver/destination host
• Padding: IP header should be a multiple of 32-bit, if it is less than 32-bit, extra zeros are attached
9
Router reads the destination IP Address from the header of incoming packets and checks it to find out
the destination network address. Then it looks into its routing table and finds an IP address which is the
address of a directly connected device and forwards the incoming packet to that route. This directly
connected device has the information about destination host If the destination IP address is not found in
router’s routing table, then the packet is routed to a default route. Default route is a routing table entry
used to forward packets for which a next hop is not explicitly listed in the routing table.
2.8.1 Stub AS
The Stub AS is a system which has only a single route, i.e., default route available for data transmission.
This default route is directly connected with another AS. Computers within this AS communicate with
themselves and if traffic is intended to or from outside the stub AS, the default route is used
2.8.2 Transit AS
It is an AS which passes transit traffic between two or several AS. The traffic is not originated nor
terminated in the transit AS. An ISP network is an example of a transit AS. Traffic is not intended for the
ISP; instead it is forwarded to other networks
2.8.3 Multi-Homed AS
It is an AS which has multiple links with one or more ASs. Information is transmitted through only one
link (shortest) and information received through that link is never forwarded back to the same link
Static routing is often inapplicable, because organizations tend to have huge networks these days. In
case of link failures, it is the network administrator’s job to specify alternate routes.
10
Therefore, dynamic routing is used instead in order to help routers maintain their own routing tables
and to share routing information with other routers in the network.
The process takes a certain amount of time depending on the number of participating devices. There-
fore, in case of a link failure, network traffic may suffer. Often used for big networks, this technique it is
not recommended to be employed in smaller networks because the routing information passed by the
routers may actually have a higher volume than the actual user traffic. The routers are unaware of the
physical topology of the network in distance-vector routing
An example of routing protocol designed to use hybridized routing is the Enhanced Interior Gateway
Routing Protocol (EIGRP).
11
2.10 IP Network’s Limitations
IP networks have been serving well until the identification of several key limitations, which prompted
the implementation of MPLS networks. These limitations are:
2.10.1 Scalability
IP networks use two functions, i.e., determination of the route and forwarding of data to that
particular route Forwarding of data directly depends on proper determination of the route. These
days, routers have huge routing tables and these tables increase with every addition of physical
segments to the network.
Consequently, the processing time required for the routing protocols to determine the accurate
route also increases, which makes it harder for the routing protocols to efficiently and quickly find
routes. The larger the size of the routing table, the higher becomes the delay in transmission, i.e.,
poor QoS. Therefore, conventional IP routing doesn’t easily support scalability. There is a need to
either change the routing model or introduce another efficient technique, which, by using existing
IP routing features, provides better QoS.
Unfortunately, the concept of Class of Service (CoS) is not a widely available feature in current IP
routing and therefore cannot be used. Consequently, this situation prompted for the
implementation of MPLS in order to overcome traffic priority issues.
Recovery of an IP route depends on the time it takes to detect the failure, propagating information
to all routers in the network about the occurred failure and the calculation time of new routing
tables Routing protocols are unaware of the exact location of the failed route; they just have
information about the failure and the way they should recover the route.
12
2.10.4 Lack of QoS
IP routing uses a best effort routing mechanism. It uses the best available resources to provide an
“as good as possible” service, but there is no assurance that this effort will meet the expectations of
the clients.
It doesn’t provide QoS even with high bandwidth available and using expensive network equipment.
Therefore, the introduction of a new routing paradigm, as provided by the MPLS technique, be-
comes unavoidable.
13
Chapter-3 Problem Statement
14
Internet has become an essential aspect in everyday life and its resource consumption has in-
creased at a tremendous rate. Engineers around the globe are putting great effort into living up
to consumer’s expectations by developing new applications and algorithms. The increase in
available applications has made Internet into a 24/7 “application” addiction for most of its users
but has also created a negative effect due to high bandwidth requirements which often results
in network congestion.
Internet, since it contains so many networks within itself, has to deal with the increased
sensitivity of its essential components.
Consumers are generally connected through smaller public networks. These networks are often
sensitive to congestion, due to enormous information sharing. Users using applications for
entertainment purposes have to suffer because these applications are usually very sensitive to
packet delays and data loss.
Small networks interact with each other through core networks (i.e., network backbones). The
core networks are highly sensitive to connectivity issues, because unlike smaller networks these
networks have to support large data transfers along large distances; therefore, is the
performance of core networks critical to Internet’s overall performance.
IP networks have generally packet losses and delay. Engineers’ efforts through TE have reduced
these problems to some extent. Engineers’ job is not only to overcome IP network’s drawbacks.
They have to consider issues which highly affect TE and in turn, make the engineer’s job even
more challenging.
This project is an effort to draw an image that illustrates existing problems in IP routing and
their solution by using MPLS. The following issues were taken into consideration during project
implementation:
• User’s expectations for reliable, secure and performance-oriented services and systems.
• Emerging different network services with respect to service type, network performance
and targeted user groups.
• Integration of newer and older networks in order to better utilize existing services.
15
3.2 Project Goal
Main goal of the project is to highlight operations of MPLS that enables it to provide better ser-
vices than conventional IP networks. A pre-study of IP routing helped us to understand its main
drawbacks; MPLS features are explained in order to better understand which one technology is
better with respect to network performance, security and robustness. To achieve this goal
smaller objectives were set, as follows:
The resulting analysis obtained after the performing the comparison of IP and MPLS networks
will serve as a broad knowledge base in order to prove that MPLS is better in serving
heterogeneous, underlying networks. Students interested in both these technologies may use
this project report for a better understanding of the basics of these network types and identify
their advantages and drawbacks.
16
Chapter-4 Multi-Protocol Label Switching
17
4.1 Background
MPLS is based on the label switching paradigm; on each data packet, a special and independent
label is attached and then with the help of this label packet is switched and routed through the
network. The label is basically a short hand version of a packet header containing information
which helps network nodes processing the label by dispersing and redirecting traffic. X.25,
Asynchronous Transfer Mode (ATM) and Frame Relay (FR) are some examples of existing label
switching technologies within the data communication industry that have been using this
concept for many years.
During the 1990s, many label switching technologies concepts have been merged in order to
improve the performance and QoS of software-based IP routers. Internet Engineering Task
Force (IETF) was charted in early 1997 to harmonize the label switching technologies. Through
these efforts, MPLS emerged as another label switching technology that came into sight with
the main advantage of using the same route and addressing scheme as existing IP protocols.
Basically, MPLS is a contemporary technique which accelerates the transfer of data networks. In
MPLS packets are utilized for accelerating data transfers; first these packets are encapsulated
by assigning labels at MPLS network ingress points and then the packets are quickly transferred
through the network on so-called label switched paths
18
MPLS employs the residual bandwidth more efficiently by allowing packets to be routed along
unambiguous routes and with definite bandwidth guarantees; this is in contrast with rather
adding more bandwidth to handle the high traffic as is the case with conventional IP routing.
Label Switched Paths (LSPs) connections can be optimized and preempted through MPLS TE.
Characteristically MPLS TE is organized at the core of the MPLS network, whereas QoS is used at
its edges; this approach ensure that high precedence packets are routed first while TE suitably
manages the available bandwidth resources and avoids network congestion. The need of TE
originates from the necessity of identifying required routes in a dynamic manner, due to the
random nature of Internet
19
locations without any operational cost incurred by dedicated lines. MPLS permits VPNs through
a connection-oriented framework, allowing carriers to organize VPNs over IP infrastructure
VPN is an elegant substitute of Frame Relay Permanent Virtual Circuits (FRPVCs) which is
sustained by MPLS. The main advantage of MPLS VPNs model over FRPVCs is that VPNs are
highly scalable. From an end user point of view, another advantage of MPLS VPNs is that
simplified routing is possible when compared to the FRPVC model since MPLS VPNs can use the
default route as service provider while managing routing PVCs oblige topologically composite
back-bones. VPNs also convey the QoS to their consumer through emerging Differentiated
Services (DiffServ) techniques.
According to such QoS requirements, the traffic that flows with DiffServ through the network
backbone is split into different traffic classes. The traffic belonging to the-se classes is
differentiated through specific header bits and different labels. On the basis of the bits set in
the header and the label types, routers take forwarding and queuing decisions in or-der to
sustain the particular QoS.
20
4.5 MPLS Operations
MPLS operations are executed on Label Switch Routers (LSRs) and Label Edge Routers (LERs). A
LER, also called ingress router, works as the main interface between the MPLS network and
existing layer 2 technology. This router works at the boundary of an MPLS network whereas its
interfaces are associated to other networking technologies. LER sends packets by attaching la-
bels at the MPLS ingress, when it receives packets from outer networks
• Forwarding Component
21
• Control Component
• Control Plane
• Data Plane
When LSR receives a packet, it reads packet header and uses the included label to determine
the next hop. It removes the old label from the packet header, attaches a new label and routes
the packet
22
The Label Edge Router (LER) is positioned at the edge of an MPLS network. At the ingress, it
receives IP datagrams, determines appropriate labels to be affixed, labels the packets and then
forwards the labeled packets to next hop in the MPLS network. If a packet is destined to exit
the MPLS network, LER strips off the labels and forwards packets using conventional IP routing
techniques
Figure 4.4 illustrates the flow from ingress LSR, the LSP tracked by three transitional LSRs and
egress LSR.
23
Figure 4. 4 LSP through a MPLs Network
0 1 2 3 4 5 6 7
Label
CoS S
TTL
24
when the packet enters the MPLS network. The packets that have the same FEC are
redirected on the same path, in the same manner. Before redirection, the specific packet FEC
is encoded within the label and inserted into the packet.
As long as the packet remains in the same MPLS domain, there will be no extra processing of
that packet. But, in order to decide the next hop, the LSR uses the label and recognizes the
FEC index in its table. When the packet is redirected to the next hop the old label is removed
and a new label is dispatched on that packet, because in some cases packets belonging to
same FEC may not be bound to the same label and may have different labels
25
Figure 4. 6 Frame Mode MPLS Label Assignment and Distribution
According to the information available in Figure 4.6, edge LSRs R1 and R4 are connected with
LSR R2 and R3. LSR allocates a local label (172.16.10.0/24) and then broadcasts this label on the
upstream path, after LDP neighbor formation and IGRP convergence. Consequently, the FIB, LIB
and LFIB (the control and data structures) are populated with proper values.
Edge LSR R1 broadcasts the same upstream path information to LSR R2 after assigning the local
label (implicit null). Similarly, LSR R2 and LSR R3 broadcast the upstream path to the network
destination after assigning the local labels L2 and L3, respectively. The label distribution can
either be spontaneous downstream or on demand downstream.
The illustration of data packets sent to the destination network (172.16.10.0/24) through the
MPLS domain is depicted in Figure 4.7 shows that the edge LSR R4 broadcasts the labeled pack-
et to the downstream LSR R3 after imposing the label L3. Here LSR R3 exchanges the ingress
label L3 for the egress label L2. On LSR R2 ingress label L2 plots on the implicit null label.
Therefore, LSR R2 forwards the IP packet to the Edge LSR R1 as shown in Figure 4.7
26
Figure 4. 7 Frame Mode MPLS Forwarding
By using protocol/type field in the frame header the routers can determine the payload type of
a received frame. For example, in case of Ethernet IEEE 802.3, the 13th and 14th octets of the
packet consist of IEEE 802.3 Length field or IEEE 802.3 Type. The values in these octets help
routers to determine the frame as either a conventional IP packet or a labeled IP packet
According to Figure 4.8, the cell mode MPLS network consists of an egress edge ATM LSR, in-
gress edge ATM LSR and core ATM LSRs. In the MPLS domain, the LSR interface carry pure ATM
cells, called Label Switching Controlled ATM interfaces (LC-ATM). In the implementation of in-
tegrated ATM LSR, LC-ATM carries both control plane and data plane packets.
27
.
For the Interior Gateway Protocol (IGP) and LDP packet exchange, control plane adjacency is
essential among neighboring switches as illustrated in Figure in 4.9. IP adjacency is formed by
an ATM Edge LSRs and ATM LSRs which ensures (through an ATM switch) suitable forwarding of
the IP routing information. On all ATM switches the MPLS control VC is available by default.
The top label in the label stack is encoded as a virtual circuit of VPIs and VCIs in order to permit
MPLS forwarding in the ATM domain. The top label in the label stack is interleaved among the
IP and the ATM header. Data plane packets are redirected by using this mechanism whereas
control plane packets are replaced on VC.
28
Figure 4. 10 Cell Mode MPLS Label Allocation and Distribution
Figure 4.10 illustrates this concept. Edge LSR R1 is directly connected to the 172.16.10.0/24
network where R1 and R2 are Edge ATM LSRs, and where A1 and A2 are ATM LSRs. In Cell
Mode MPLS operation, the process of label allocation and distribution is similar to the one in
Frame Mode MPLS operation. Downstream Router R1 broadcasts the same upstream path by
allocating a label to destination network 172.16.10.0/24. On ATM LSR A1 and A2, this process is
repeated.
The only difference between Cell Mode MPLS and Frame Mode MPLS is that Cell Mode MPLS
uses interface level label space whereas the Frame Mode MPLS uses both interface level and
router level label space
MPLS packets forwarded on ATM labels have no such type of loop prevention methods since
ATM cell does not contain the TTL field. As long as the switched path exists, the ATM traffic re-
mains in a routing loop which will severely impact the performance of the network.
29
Prevention and Detection are two methods used for handling the routing loops in an MPLS
network. In Prevention, different methods are used to stop the routing loop from ever being
formed on the LSP. In the Detection method, the routing loops may initiate but the MPLS map-
ping distribution message will ignore or stop forwarding to that LSP by examining the loop [7,
12].
In frame mode, the LSRs use the same Interior Routing protocols for populating and building up
the routing tables as those used in conventional IP networks. Frame mode lets the LSRs to share
the routing table information and consequently the prevention of routing loops becomes
possible
30
Figure 4. 11 Loop Detection Processes
31
4.9.3 Control Mode
Structured and self-governing FEC are performed in Control Mode. LSR creates the FEC local
binding according to FEC without involving other LSRs. FEC is bound to a structured LSP unless
egress LSR identifies the FEC or label binding from an approaching hop
1. Push, Pop and Swap are three major operations performed in MPLS label forwarding.
When label packet is received at LSR either top label should be swap, pop or push and is
determines by LSR according to LFIP information. These three operations are as follows:
• Swap: The label is swapped by a new label and the path associated with new la-
bel is used for packet forwarding.
• Push: A new label is pushed on top of the existing label. It helps encapsulating
the packet in another layer of MPLS. This operation is used in MPLS VPNs.
• Pop: The label is stripped off the packet. It may result in decapsulation of an in-
ner label. At this point, the packet may be leaving the MPLS network.
32
Chapter-5 MPLS Traffic Engineering
33
5.1 Overview
Internet community is facing big challenges with the rapidly growing usage of real time
applications. Most service providers are facing several problems in their networks such as data
congestion, packet delay and loss. Consequently, they need special tools and techniques in
order to make their networks more efficient with such an unpredictable traffic flow.
TE has the ability avoid traffic flow congestion and to dynamically define network routes. When
data traffic gets congested at nodes, MPLS TE manages the data traffic between the congested
nodes. MPLS helps TE to find the shortest path and also helps in utilizing unused paths. MPLS TE
is not only aware of the flow of each data packet but also takes the responsibility of properly
redirecting the traffic flow and fulfills the traffic QoS requirements.
5.1.1 Basics of TE
During data transmissions there is a possibility of losing data packets. TE has the basic function
of avoiding this loss by efficiently using the available bandwidth through effective techniques
and to maintain traffic flows.
34
Figure 5.1 illustrates this concept. In this simple example, the network topology contains links
with the same cost. Assume R5 as destination and R1 as source. In this case, there are two poss-
ible ways of transferring data from the source to the destination, i.e., R1 to R5. The first path is
R1 to R2 and then R5. The second path between R1 and R5 is from R1 to R3 followed by R4 and
finally R5. As we mentioned, all the links have the same cost; from a cost point of view, the
second path: R1 -> R3 -> R4 -> R5 is more expensive. Consequently, in order to use the available
bandwidth more effective, a static route may be employed for R1 -> R2 -> R5
5.2 MPLS-TE
In MPLS TE, source-based traffic routing is introduced since conventional IP routing may incur
routing inefficiencies due to its mechanism of destination-based routing. If we examine most
networks using destination-based routing, we will observe that we will be unable to utilize the
full benefits of this type of causal deployed resources. In MPLS, TE overcomes these types of
deficiencies by efficiently utilizing the available bandwidth and link capacity. Still we need to
solve the congestion issues but in the case of MPLS TE we have access to the best solutions to-
wards congestion avoidance problems at the network nodes.
5.2.1 Overview
To efficiently use the available bandwidth in the MPLS networks, TE implies configuring,
computing and calculating the networks paths. MPLS TE is capable of using the bandwidth more
efficiently of the existing networks path. MPLS TE can be used as a tool for achieving and
implementing the most cost valued, automated and differentiated services in a network.
35
Figure 5. 2 Shortest Path Computations
In Figure 5.2 data between A and E can be equally transferred crosswise, from top and bottom
paths, but this does not catch the different link sizes between [B-D] and [C-D] as shown in the
figure. In the top path, the available bandwidth between A and B is 10Mbps and between B and
D is 60Mbps, which is different to bottom path where bandwidth between A and C is 10Mbps
and between C and D is 40Mbps. The need in this case is to utilize both these paths efficiently
so that there is no wastage of network resources
36
Figure 5. 3 Over-Utilized Links
Figure 5.3 illustrates this mechanism. The link F-E-D-B is not used for forwarding traffic from G
to A. From this figure, we notice that the traffic follows the shortest path to reach the
destination via F-C-B due to shorter number of hops. Meantime, by adding more bandwidth,
IGP can be determined to take a path with more hops for the Shortest Path First (SPF)
calculation. Nevertheless, this computation is considered to be difficult since it has no concept
of traffic congestion
37
Figure 5. 4 Primary Path Failures
Such scenario is illustrated in Figure 5.4. If there are any traffic issues in the direct link from A to
D, before traffic can cross C, the routing protocol must recompute the route. In this scenario,
the problems described in Figure 5.2 are easily resolved through MPLS TE. TE builds a tunnel
(the LSP) all the way through the MPLS core.
Any packet entering at the beginning of the tunnel follows the same path throughout the
tunnel until it exits at the other end. Two protocols are used in such cases: Constraint Based
Routing (CBR) and RSVP. Both these protocols are used for label distribution within the MPLS
domain.
1. Continuous support for definite paths and allowing the network to identify correctly the
exact path that an LSP takes across the MPLS network.
3. CBR gives the ability to join LSPs together and meeting thus specific traffic requirements.
4. Solutions provided by MPLS to ATM networks can be easily adapted to run on packet
switched networks.
5. ISPs can balance the traffic in their networks allowing thus for a better utilization of their
hardware resources such as routers and switches. Thus, all the network components can
provide better services.
7. TE allows the available bandwidth to be used very efficiently. Even in case of network con-
gestion, the network resources are allowed to get the best performance.
38
5.4.1 Distribution of Link Information
It extends the IP link state topology information distributed by the LSR compared with
restrictions-based routing. It allows a growing list of links with known attributes and constraints
in order to perform the path selection algorithm. OSPF and IS-IS are examples of two
fundamental routing protocols that can be employed for the distribution of link attributes for
the LSR TE database development. MPLS TE bandwidth attributes are divided into eight priority
interval levels sets for the LSP TE. TE metric attributes are used to link the same paths in the IGP
metric in order to optimize the administrative group maintenance, including various special
rules.
5. SESSION ATTRIBUTE: defines the requirements of LSP attributes such as protection, priority.
39
• Minimizing packet loss ratio
• Minimizing the delay
• Maximizing the throughput
RSVP also provides information about the QoS requirements. It can be used in concert with
other IP routing protocols in order to reserve resources which results in enhanced network
performance.
4 4 8 16 16 8 8 32 15 1 16
Version Flags Type Checksum Length ReservedSent Message Reserved MF Fragment
TTL ID Offset
Table 5. 1 RSVP Packet Format
• Version: a 4-bit field which indicates protocol’s version number (current version is 1).
• Flags: a 4-bit field (currently no flags have been defined).
• Type: an 8-bit field which contains one of the 6 following and possible (integer)
values shown in Table 5.2
• Checksum: a 16-bit field which represents the standard TCP/UDP checksum covering
the contents of the RSVP message.
40
• Length: a 16-bit field which represents the length of the RSVP packet in bytes,
including header and the variable-length payload that follows. If the More Fragment
(MF) flag is set or the fragment offset field is non-zero, this is the length of the
current fragment be-longing to a larger message.
• Send TTL: an 8-bit field which indicates the IP TTL value for the message.
• Message ID: a 32-bit field used when fragmenting a larger message.
• More Fragments (MF) Flag: Low-order bit of a 1-byte word with the other 7 high-
order bits specified as reserved. MF is set for all but the last fragment of a message.
• Fragment Offset: a 24 bit field which represents the message fragments as a byte
offset.
16 8 8 Variable in Length
Length Class-Num C-Type Object Contents
41
5.7 RSVP Message Types
In order to remove the reservation information, to give confirmation reports, error messages or
to maintain various data flows, RSVP uses different types of messages, as follows.
42
Figure 5. 5 Path Message and Path Error Message
Figure 5.5 illustrates the mechanism of how the path message is transmitted and the feedback
received in case of path errors.
43
Figure 5. 6 Reservation Request Message and Reservation Error Message
Figure 5.6 illustrates the reservation request message sent from the receiver in case of resource
reservation problems. The flow also describes how the reservation error message is transmitted
by the receiver of application data.
• Explicit Sender: a list of the nodes intending to start data transmission is explicitly
created.
• Wildcard Sender: all network nodes are marked as senders. The device wanting to act as
sender can later on confirms itself as sender.
• Fixed Filter (FF): In this reservation type, distinct reservations are made between a
sender and a receiver. These reservations are not shared between others possible
participants. Video applications and applications using unicast communication are
typical examples of this style of reservation.
44
• Wildcard Filter (WF): In this reservation type, all wildcard senders share a single
reservation regardless of the number of senders sharing it. However, at any given time
instance only a few senders are allowed to transmit.
• Shared Explicit (SE): In this reservation type, a receiver allows explicit senders to share a
single resource reservation. A given bandwidth share is set for a group of senders to be
used during transmission.
The QoS is said to be satisfactory to a service if it meets the terms stated in the Service Level
Agreement (SLA) with a direct result of customer satisfaction in the received service. The aim of
QoS is to ensure highest possible throughput, reduce the packet loss, jitter and delay and allow
for enough capacity for the network traffic.
The link “cost” is also an issue in QoS, since it is needed to ensure minimum usage of the avail-
able resources without reducing the quality of the offered services. In traditional IP routing, two
fields in the IP header allow for limited provisioning of QoS in IP: Type of Service (ToS) and Class
of Service (CoS). These fields allow for a rough classification of the network traffic flow.
45
offer the best service it can and is using the cheapest paths. As there is no resource allocation in
this model, this type of traffic has no guarantees on data delivery status, i.e., no information if
the packet is corrupted, delivered or lost.
Routers use a first-in-first-out (FIFO) mechanism when forwarding the best-effort packets.
There are no promises of QoS while the main focus in this model is on the delivery and not on
the time instance. Real time applications such as video and voice streaming use this service
model, because data delivery is more important for these applications than the time of deli-
very. By analyzing the performance of the best-effort model it can be concluded that this ser-
vice model is not suitable for applications requiring precise QoS levels.
There are also known scalability problems in this model since the routers need to uphold state
information at each hop. Large heterogeneous networks such as Internet cannot easily provide
the required QoS for this model.
Components
1. Best Effort: This class is used for text-based application. It is, as the name implies, just
best effort which also means that there is no QoS guarantees on the traffic flow.
2. Guaranteed: This class is used for real time applications. It allows for precise levels of
bandwidth, delay and maximum jitter required for a certain traffic flow.
3. Controlled Load: This CoS provides a constant traffic flow level but with no guarantees
for QoS.
46
Control Mechanism
There are traffic classes on which the traffic is divided into flows and in each class all types of
traffic can be combined. For each class, suitable control mechanisms are used. Several
important control mechanisms are used in IntServ:
1. Token Bucket Filter (TBF): In order to guarantee the necessary QoS, TBF uses queue
allocation and the available bandwidth such that the highest jitter limit, delay
constraints and required bandwidth can be met.
2. Resource Reservation Protocol (RSVP): It is used to reserve buffer space and bandwidth
for each traffic flow.
3. Random Early Detection (RED): When the buffers of routers become full RED assists in
reducing in a fair way the queued packets.
4. Weighted Fair Queuing (WFQ): Another mechanism employed for buffer management in
routers.
It is quite obvious that voice applications should have dedicated circuits in order to ensure the
required QoS since in this case there would be no noticeable delays. In this case the question
arises why we use QoS? A simple answer is to provide good services, but it is a complicated task
which has many issues to be taken into consideration.
47
Chapter-6 Label Management
48
MPLS is highly dependent on efficient label binding. In order for MPLS to work efficiently, the
label distribution mechanism must be both efficient and reliable. LSRs are responsible for
routing the traffic with the help of these labels. Labels are usually exchanged between LSRs
through the use of already existing routing protocols (piggyback). For instance, IGRP is an
example of such a routing protocol.
MPLS supports multiple methods for label creation and binding, i.e., how to map layer 3 to
layer 2 information, and thus establishing LSPs. MPLS employs mainly three methods:
LDP performs distribution of labels between directly connected LSRs (peers). For label
assignment, it is very important that one LSR inform its adjacent LSR about amendments
performed to the label. This must be done in order for all LSRs to know what needs to be done
with the labels such as to ensure an accurate selection of LSPs.
LDP delivers not only stream mapping information but also distributes the labels across the
MPLS network. LDP uses piggybacking as label distribution mechanism. LDP does not perform
well when using ERP but it works under BGP. This is mainly due to the fact that BGP is a multi-
protocol and more competent than ERP. BGP carries labels with ease. An LSR is key device in
49
LDP since every time new traffic comes to an LSR; the LSR first forwards the label information
and then forwards corresponding traffic.
Table 6.1 illustrates the LDP packet format. In LDP packet format
• Version: 2 bytes long, indicates the current version number of the LDP protocol
• PDU Length: 2 bytes long, indicates the total packet length of LDP message
• LDP Identifier: 6 bytes in length, used for packet detection by LSR. The first four bytes in
the LDP identifier field are used to encode the IP address of the LSR whereas the last
two bytes are used for LSR labeling.
• LDP Message: defines the type and length of the LDP message.
• U: denotes unknown message. Receiver will discard the message if the bit is set.
• Message Type: denotes the type of message.
• Message Length: denotes length of message ID in octets. Mandatory and optional LDP
parameters are controlled by this field.
• Message ID: represents a unique message ID of 32 bits.
• Parameters: contains Type-Length-Format. Mandatory and optional LDP parameters are
also determined by this field.
50
6.1.3 LDP Type-Length-Value Format
The Type-Length-Value (TLV) format of LDP is presented in Table 6.3.
U F Type Length
Value
TLV Format
Overall, the LDP is responsible for explicit signaling, management, advertisement and
withdrawal of labels in the MPLS networking architecture.
• Discovery Messages: used to inform about and maintain the presence of an LSR in the
network.
• Session Messages: used to establish, maintain and terminate sessions between LDP
peers.
• Advertisement Messages: used to create, change, and delete FEC label mappings.
• Notification Messages: used to provide advisory information and to signal error
information.
• Fatal error
• Processing outcome on an LDP message
• LDP Session state
51
6.2.2 Hello Message
During the Discovery mechanism, Hello messages are sent to let others know about LSR
presence.
52
depend on the label and CoS field. If multiple labels have same the FEC, these can be easily
merged.
The MPLS architecture allows LSRs to precisely request for specific FEC from its next hop. This is
mechanism is known as Downstream on Demand label distribution, i.e., when an LSR
specifically asks for a label binding. Figure 6.1 illustrates this procedure.
In addition, the MPLS architecture enables LSRs to distribute label binding to other LSRs that
have not requested them. This process is known as Unsolicited Downstream label distribution
mode. It is the responsibility of the downstream LSR to advertise a label mapping to its
upstream LSRs. Figure 6.2 demonstrates the unsolicited downstream label advertisement
mechanism.
53
Figure 6. 2 Unsolicited Downstream Label Advertisements
As a result of the independent label distribution mode, a label can be advertised before
receiving downstream label information.
If there is no FEC next hop mapping or LSR is not egress, the LSR have to wait to receive
downstream label mappings and then map the FEC before transmitting it to its upstream LSR.
In the liberal retention mode, every label binding is obtained from a label distribution peer. LSR
decides whether the LSR is the next hop for the label binding. The LSR that preserved and
maintrained the received labels is an example of unsolicited downstream label advertisement
mode.
This mechanism is illustrated in Figure 6.3.
54
Figure 6. 3 Liberal Label Retention Modes
The main advantage of this mode is that LSRs already have spare labels in their LIBs, which in
turn, results in faster responses to routing changes. Maintaining and distributing excessive large
label information is the main disadvantage of the liberal label retention mode.
At LSR initialization, all labels are kept in a pool. In order to determine supported label bindings,
the size of the pool is measured. If a new binding needs to be created, the LSR takes one label
from the pool of free labels and binds it with an outgoing packet. If a binding needs to be
disassociated, the LSR unbinds the label from the packet and returns it to the free label pool.
LSR is responsible for informing other LSRs of such events, i.e., whether a new binding is
created or an old one is removed. This mechanism is called remote label binding knowledge.
• A FR interface that depends on Data Link Connection Identifiers (DLCIs) for assigning
labels.
55
• Label controlled ATM interfaces depend on Virtual Channel Identifiers (VCIs) for label
assignment.
It is important to understand that when there are direct connections between LDP peers, the
per interface label space may be used. Consequently, these labels will only be used for traffic
transmitted through that interface.
When a packet enters an MPLS network, a PUSH operation associates a label with the packet. If
the label needs to be removed, the label is removed through a POP operation. Many different
LSPs can be aggregated into a single LSP with the help of label stacking.
56
Figure 6. 4 Push and Pop Operations
57
Chapter-7 Conclusions
7.1 Issues
MPLS is continuously expanding in backbone networks and is fulfilling an ever-growing range of
user demands and application requirements. There are nevertheless a few issues that impact
on the MPLS performance. These are discussed in the following sections.
58
Multi-Class traffic is highly influenced by real time applications QoS constraints, due to high
demands for available network resources. Such traffic has an impact on all the links in a
domain, because the traffic from real time applications concerns its delivery through any means
and utilizes every network resource regardless of dimensions. It is globally recognized that a
network has more physical paths than total links in it, which means the resources are not being
efficiently utilized.
It is recommended that there should be more links then paths, to increase the capacity of a
network. If, path capacity is enhanced it will result in improved network performance.
equation G=(N,L)
In the above equation, G denotes Network as a graph, N denotes nodes i.e. routers/switches
and L denotes all the links in that particular network. This graph helps in analyzing the net-
work’s capacity or path capacity.
The relationship between nodes and links is vital for an MPLS network. A network with more
nodes and links doesn’t guarantee performance efficiency, unless it is managed well according
to traffic load and demands. A network segment must not be over or under-utilized.
A linear model is independent of load parameters such as link length or per unit flow cost.
Whereas, a nonlinear model is dependent of load parameters such as variance or mean of
delay.
Segments of IP network are usually linear network models and therefore nonlinear network
models have no role to offer. However, MPLS can take benefit of these nonlinear models.
59
The project Multi-protocol Label Switching Traffic Engineering with QoS confirmed the fact that
it is absolutely necessary to setup point-to-point LSPs in order to forward IP traffic through an
MPLS network. In this project report we concentrated on MPLS issues, QoS and TE in MPLS.
During our research, we examined the MPLS architecture and found out that MPLS is a
competent technique because it provides well-organized packet transmission, QoS, load
balancing, scalability, consistency, and end-to-end connectivity. MPLS is mainly a connection-
oriented architecture which easily integrates in existing IP networks.
In this report we used a hypothetical approach to MPLS TE and described every MPLS
component and concepts such as: LSR, LSP, LER, RSVP-T, RSVP, CR-LDP and labels. We have also
discussed the necessity and main advantages of using MPLS and TE and described how this is
implemented in MPLS. In order to analyze the performance of an MPLS network we provided
de-tails on this mechanism.
Finally, we concluded that the MPLS architecture can help reducing network congestion
together with an amazing possibility for added TE. This also provides an efficient way to utilize
all available network resources.
Applications such as VPN, VoIP, ERP, CRM, video conferencing and streaming need high QoS
requirements and these types of services are being well served in an MPLS environment.
Nevertheless, a progressive research work is required in order to make sure MPLS meets all
such requirements and fulfills these high demands.
60
References
rd
[1] B. A. Forouzan and S. C. Fegan, Data Communications and Networking, 3 Ed. New York,
United States: McGraw-Hill Higher Education, 2003.
th
[2] B. A. Forouzan and S. C. Fegan, Data Communications and Networking, 4 Ed. New York,
United States: McGraw-Hill Higher Education, 2006.
th
[3] A. S. Tanenbaum, Computer Networks, 4 Ed. New Jersey, United States: Prentice Hall, 2000.
th
[4] W. Stallings, Data and Computer Communications, 5 Ed. New Jersey, United States: Pren-
tice Hall, 2000.
[5] M. Sportack, IP Routing Fundamentals, United States: Cisco Press Publications, 1997.
th
[6] D. E. Comer, Internetworking with TCP/IP Principals, Protocols, and Architectures, 4 Ed. Vol.
1, New Jersey, United States: Prentice Hall, 2000.
[7] M. N. Aslam, Y. Aziz, Traffic Engineering with Multi-Protocol Label Switching, Blekinge
Institute of Technology, August 2008.
[8] International Engineering Consortium, White Papers: Multiprotocol Label Switching (MPLS),
International Engineering Consortium IEC, 2007 [Online, last accessed: April 17, 2010]:
http://www.iec.org/online/tutorials/mpls/index.html
[9] I. Ikram, Traffic Engineering with MPLS and QoS, Blekinge Institute of Technology, August
2009.
[10] G. H. Sabri, QoS in MPLS and IP Networks, Blekinge Institute of Technology, November,
2009.
[11] L. Lobo, MPLS Configuration on Cisco ISO Software, Cisco Press, ISBN 1-58705-199-0, Octo-
ber 21, 2005.
[14] Daniel O. Awduche, MPLS and Traffic Engineering in IP Networks, UUNET (MCI Worldcom)
61
[15] I. Hussain, Overview of MPLS Technology and Traffic Engineering Application, Internet
Technologies Division, Cisco Systems Inc. USA
[16] X. Xiao, A. Hannan, B. Bailey and L. M. Ni, Traffic Engineering with MPLS in the Internet,
GlobalCenter Inc., A Global Crossing Company, 141 Caspian Court, Sunnyvale, CA, Department
of Computer Science, 3115 Engineering Building, Michigan State University, East Lansing
[17] Juniper Networks, Technical Documentation: JUNOS 5.3 Internet Software Configuration
Guide: MPLS Applications, Juniper Networks Inc, 1999-2009. [Online, last accessed: May 12,
2010]:
http://www.juniper.net/techpubs/software/junos/junos53/swconfig53-mpls-apps/html/
[18] K. Kowalik and M. Collier, QoS Routing as a Tool of MPLS Traffic Engineering, Research In-
stitute for Networks and Communications Engineering (RINCE), Dublin City University, Ireland
[19] S. Gonzalez-Valenzuela and V. C. M. Leung, QoS Routing for MPLS Networks Employing
Mobile Agents, The University of British Columbia
[20] D. Caswell and S. Ramanathan, Using Service Models for Management of Internet Services,
IEEE Journal on Selected Areas in Communications, Vol. 18, No. 5, May 2000
[21] Internetworking Technology Handbook, Cisco Systems, Inc. [Online, last accessed: May 20,
2010]:
http://www.cisco.com/en/US/docs/internetworking/technology/handbook/QoS.html#wp1020
620
[22] L. Andersson, I. Minei, B. Thomas, LDP Specification, Network Working Group, RFC 5036,
Cisco Systesm, Inc. October 2007
[23] L. Fang, A. Atlas, F. Chiussi, K. Kompella, G. Swallow, LDP Failure Detection and Recovery,
AT&T, Avici Systems, Invento Networks, Juniper Networks, Cisco Systems, IEEE Communications
Magazine, October 2004
[24] A. Popescu, IP QoS: The Challenge of Building Efficient Networks, Blekinge Institute of
Technology. [Online, last accessed: June 16, 2010]:
https://bth.itslearning.com/Main.aspx?CourseID=1016
62
63