SlideShare a Scribd company logo
1 of 6
Download to read offline
Abstract-Traditionally, customers that preferred
transparent Ethernet segment connection between their
sites achieved it through bridging their geographically
dispersed sites using Ethernet of Internet Protocol
(EoIP) tunnels. However this presented the inefficient
usage of the service providers’ (SP) bandwidth due to the
IP header overheads. Virtual Private LAN Service
(VPLS) networks offer more efficient usage of
bandwidth as a network resource by using the frame
encapsulation techniques offered by the Multiprotocol
Label Switching (MPLS) protocol. For the SP and the
client to benefit from protocols such as MPLS, for
efficient bandwidth utilization, there has to be signaling
and discovery protocols namely Border Gateway
Protocol (BGP) and Label Distribution Protocol (LDP)
within the network. In this paper the mentioned
discovery and signaling protocols are used to establish a
multicast aware VPLS network. The VPLS network uses
MPLS traffic engineered (MPLS-TE) to control the
utilization of the available bandwidth through the use of
the auto-bandwidth management mechanism.
Index Terms - VPLS, MPLS, BGP, LDP, MPLS-TE.
I. INTRODUCTION
Virtual Private LAN Service (VPLS) is a Layer 2 Virtual
Private Network technology that uses Multiprotocol Label
Switching (MPLS) as its transport protocol to deliver
Ethernet services over a Service Provider network [1]. The
VPLS service is offered over an MPLS network, thereby
enabling clients/customers multipoint access/connectivity
over geographically dispersed areas. The multipoint nature
of VPLS implies that associated clients can directly connect
to each other in contrast to point-to-point where they’d be
connected over a hub, thus reducing transmission delay [2].
VPLS also known as Transparent LAN Service (TLS)
emulates a multipoint-to-multipoint (MP2MP) Local Area
Network (LAN) connection over dispersed areas by bridging
its domains over an MPLS network [3]. Customer sites’
remote LAN segments behave as a single LAN via VPLS
MP2MP interconnectivity [4].
VPLS offers Service Providers (SPs) and clients a wide
range of amenities utilizing the functionality of Ethernet
services and the flexibility of an MPLS core [3]. For
example, Ethernet offers throughput of up to 900GB, thus
high bandwidth throughput.
Multicast services are available to clients [5] and this is a
significant advantage to the SP in that the network is not
flooded with traffic packets to unknown destinations thereby
improving bandwidth utilization within the network.
MPLS advantages such as its reliability, flexibility, fast
re-routing and traffic engineering services are enjoyed by
VPLS users (SPs and customers). MPLS traffic engineering,
(MPLS-TE) tunnels can support reliable Quality-of-Service
(QoS) end-to-end [5], to facilitate efficient use of network
resources. Therefore the cost-effective advantage of the
Ethernet combined with the scalability, reliability and traffic
engineering of the Multiprotocol Label Switching (MPLS)
protocol offer VPLS customers better service delivery [6].
VPLS offers architectural simplicity to the service
provider (SP). The SP provides Layer 2 resource
connectivity to the enterprise clients who will themselves
govern the design of their IP and routing protocols [6].
VPLS is a type of Layer 2 VPN in which the Service
Provider (SP) provides participating clients with L2
connectivity and is not involved with the client’s Layer 3
network, this is advantageous to the SP [8].
The VPLS network is not subjected to geographical
constraints, thus customers may be spread over a Metro or
Wide area network and will appear as if they belong to a
single LAN connection [7].
Ethernet service such as “Plug and Play” is readily
available to VPLS clients. For example MAC switching and
learning which allows better bandwidth throughput
compared to traditional technologies like Asynchronous
Transfer Mode (ATM) and Frame Relay.
The use of MPLS-TE tunnels for management of
bandwidth in a network can be done manually or
automatically. By using the manual adjustment of the
reserved bandwidth in a network, may lead to some
inconsistencies especially depending on the applications that
are sensitive to fluctuations in bandwidth adjustment. For
example voice application requires a dedicated/non-
interrupted service end delivery therefore the bandwidth
management scheme in place must ensure that adjustments
do not interrupt the flow of traffic in the network [13]
In this design paper, the requirements needed to
establish/implement a VPLS network are introduced in
section 2. Section 3 brings forward a test bed setup in which
particular attention is focused on the creation of a point-to-
point (P2MP) VPLS network. In section 4, an evaluation of
the P2MP VPLS test bed setup and finally section 5 draws
conclusions and brings forward future works on the VPLS
test bed network. It should be noted that Mikrotik routers are
used in the implementation of this paper.
Auto-Bandwidth Allocation in Multicast Aware VPLS
Networks
Allan R. Kweli, Alexandru Murgu
University of Cape Town,
Department of Electrical Engineering
Cape Town, South Africa
(allan.kweli, Alexandru.Murgu)@uct.ac.za
II. VPLS REQUIREMENTS
As previously introduced, VPLS as an Ethernet service
instance bridges end-to-end LANs over an MPLS based
network [9] and thereby emulates a LAN connection [10].
VPLS has core components that are involved in emulating
an Ethernet type connection namely [RFC4761, RFC4762 &
RFC3031]:
a) Customer Edge Router (CE), Provides an Ethernet
interface between the customer's LAN and the
provider's core network. CEs are VPLS-unaware and
are placed at the customers’ premises.
b) Provider Edge Router (PE), encapsulates the Ethernet
frames into MPLS, forwards packet to outgoing
interface and vice versa. It is located at a service
provider's network and is connected to a customer edge
(CE) router directly. PEs are capable of running
signalling and routing protocols for Pseudowire (PW)
setup.
c) Pseudowires (PW) are bi-directional in nature and
consist of a pair of uni-directional MPLS Virtual
Circuits (VCs).
d) MPLS core. The routers in the core network known as
“Label Edge/Switching Routers” LERs/LSRs are
responsible for the encapsulation/de-capsulation and
switching of labels on frames traversing the MPLS
network between VPLS sites
VPLS networks also known as Transparent LAN Service
(TLS) offer specific customer sites emulated Ethernet LAN
connectivity [7] through forwarding and learning MAC
addresses in the Layer 2 domain [5]. VPLS further provides
multipoint connectivity to customer sites on the same VPLS
instance over a single Provider Edge (PE) node [5]. In so
doing, the geographically dispersed sites appear as if they
are connected to the same Ethernet LAN [5]. Frames
forwarded in a VPLS network are similar to the forwarding
mechanism within IEEE 802.1 in which there is self-
learning between MAC addresses and ports, thus frame
forwarding is MAC address based [2].
MPLS used as the transport protocol for VPLS provides
techniques such as loop detection, label swapping and frame
encapsulation [11] which enable Ethernet service creation
within the (VPLS) network.
To emulate Ethernet switching over an MPLS network,
the PE (Label Edge Router) routers establish tunnels to other
LERs to form paths to forward the encapsulated Ethernet
frames. The virtual circuits formed are referred to as
Pseudowires (PWs). RFC 4761 and RFC 4762 offer
mechanisms for signaling and forwarding VPLS frames over
a network. Once the PWs are created they use the pre-
existing label switched paths to interconnect. However with
the introduction of MPLS-TE tunnels, the PWs
automatically use the tunnels to emulate LAN connectivity.
MPLS-TE tunnels are established using LDP and are
independent of the services running over them, in this case
VPLS [7].
The mechanisms used in the establishment of PWs in a
VPLS network, which include;
a) Border Gateway Protocol (BGP) for Auto-discovery
and Signalling [RFC4761]
b) Label Distribution Protocol (LDP) for Signalling
[RFC4762]
In section 3, a VPLS P2MP test bed network is presented
showing the interaction between the nodes participating in a
single VPLS instance.
III. VPLS EXPERIMENTAL SETUP
The VPLS setup is an end-to-end (P2MP) network with
MPLS at its core and MAC access to its Ethernet interfaces.
RFC 6136 describes a VPLS network as an end-to-end
network that has an underlying MPLS core. Figure 1
represents a P2MP VLPS instance between two clients.
In Figure 1, CE nodes represent Client Edge while PE
nodes represent Provider Edge core routers respectively
based at the SP premises. DbC and RtC denote the database
clients and real-time clients respectively.
Database server
Real-time server
CE1
CE2
PE1
PE2
PE3
PE4
CE3
CE4
CE5
DbC1
DbC2
DbC3
RtC1
RtC2
CE6
CE7DbC – Database Client
RtC – Realtime Client
Figure 1: Point-to-Multipoint VPLS setup
In the setup of the VPLS P2MP network, it is paramount
to establish PWs in order to attain an emulated service [7].
PWs encapsulate protocol data units across the network
tunnels in order to archive a service imitation of a LAN
network [12]. There are assumptions set aside during the
design of the PWs required for the VPLS P2MP test bed
setup shown in Figure 1 above, these include [7]:
The Provider Edge (PE) routers are logic, fully meshed
with tunnels over which packets belonging to a VPLS
instance are encapsulated and forwarded.
The Label Switched Paths (LSP) tunnels are MPLS or
LDP.
The LSP tunnels are established independently.
Figure 1 also shows the establishment of a PW, it is to be
noted that the signaling protocols reserved for PW
establishment reside in the PE routers. In this design paper,
focus is placed on the control plane of the PE routers whose
main functions are Signaling and Auto-discovery [7].
Signaling and Auto-discovery between the routers
requires that loopback addressing and Open Shortest Path
First (OSPF) protocols are in place for the exchange of
routing information between the routers, these will be
discussed in section 4.
A. Label Distribution Protocol
LDP is suited to relatively smaller networks as compared
to those that deploy BGP for VPLS peer discovery.
Therefore for it is used for signaling and setting the MPLS
backbone over which VPLS is deployed. The MPLS
configuration is shown below.
The above enables MPLS on the network facing
interfaces of router PE1. The other PE routers are
configured in the same way but only have one enabled
MPLS interface. Reason being that they only have one
interface facing the network. Having enabled MPLS on the
routers, VPLS PWs based on BGP are setup.
B. Border Gateway Protocol
This is one in which participating PEs of a particular
VPLS instance are identified. In Figure 1, PE nodes 1, 2,
and 4 have two different VPLS instances running. The two
different VPLS instances belong to the different sets of
traffic i.e. from the database server and the real-time server.
As previously mentioned BPG has the capability of auto-
discovery and this is advantageous to the VPLS setup of
large networks. The command line code shown below
invokes the auto-discovery between PE1 and the other PE
routers.
Routers PE 2, 3 and 4 are configured in a similar way but
only remote with PE1. Once the PE routers are peering then
the VPLS instances are setup for the different sets of traffic.
This is shown below.
The created bridges, A and B, correspond to the two
different VPLS instances to which the clients belong.
Having established the two different VPLS instances,
MPLS-TE tunnels are configured.
C. MPLS-TE Tunnel Setup
MPLS-TE tunnels are established using LDP and are
independent of the services running over them, in this case
VPLS [7]. In the MPLS-TE tunnel setup constrained
shortest path first (CSPF) is for tunnel path selection and
open shortest path first (OSPF) is used to distribute TE
information. The MPLS-TE tunnels are created as shown
below.
Having established the MPLS-TE tunnel, the dynamically
created PWs use them to interconnect between the PE
routers. The traffic engineered tunnels facilitate the use of
auto-bandwidth management which in turn improves the
utilization of the available bandwidth.
D. Auto-Bandwidth Allocation
Using offline calculation to manage the bandwidth
allocation presents a problem of either under assignment or
over assignment of the bandwidth thus not efficiently
utilizing bandwidth. Therefore there is a need to use an
automatic bandwidth allocator that will respond to traffic
variations and optimally utilize the available bandwidth
[14], as illustrated in Figure 2.
0
200000
400000
600000
800000
1000000
1200000
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105
TrafficRate(Bit/s)
Time (Hrs.)
Reserved bandwidth
Highest possible
value
Highest
recorded value
after 1st
interval
New reserved
bandwidth
after 1st
interval
Time
interval
MPLS-TE tunnel
traffic rate
Figure 2: Auto-bandwidth allocation.
Benefits of using the auto-bandwidth approach to adjust
traffic rates in the LSP include [14]:
Offline calculation doesn’t support real-time traffic
adjustment, therefore may result to either over or
under assignment of bandwidth to the LSP.
On PE1
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.5 remote-as=65530 address-
families=l2vpn  update-source=lobridge
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.6 remote-as=65530 address-
families=l2vpn  update-source=lobridge
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.7 remote-as=65530 address-
families=l2vpn  update-source=lobridge
admin@PE1] > mpls ldp
[admin@PE1] /mpls ldp> set enabaled=yes lsr-
id=10.255.255.4 transport-address=10.255.255.4
[admin@PE1] > mpls ldp interface
[admin@PE1] /mpls ldp interface> add
interface=ether1
[admin@PE1] /mpls ldp interface> add
interface=ether2
[admin@PE1] /mpls ldp interface> add
interface=ether3
[admin@PE1] > interface bridge add name=A
[admin@PE1] > interface bridge add name=B
[admin@PE1] > interface bridge port add
interface=ether9 bridge=A
horizon=1
[admin@PE1] > interface bridge port add
interface=ether10 bridge=B horizon=1
[admin@PE1] > interface vpls bgp-vpls add
bridge=A bridge-horizon=1 route-
distinguisher=1:1 
site-id=1 import-route-targets=1:1 export-
route-targets=1:1
[admin@PE1] > interface vpls bgp-vpls add
bridge=B bridge-horizon=1 route-
distinguisher=2:2 
site-id=1 import-route-targets=2:2 export-
route-targets=2:2
[admin@PE3] > routing ospf instance set mpls-
te-area=backbone mpls-te-router-id=lobridge
[admin@PE3] > mpls traffic-eng interface add
interface=ether1 bandwidth=100000000
[admin@PE3] > mpls traffic-eng tunnel-path add
use-cspf=yes name=dynamic
[admin@PE3] > interface traffic-eng add
name=tepe3_to_pe1 bandwidth=83000000 primary-
path=dynamic from-address=10.255.255.6 to-
address=10.255.255.4 disabled=no record-
route=yes
[admin@PE3] > ip address add
address=10.99.99.6/30 interface=tepe3_to_pe1
[admin@PE3] > ip route add dst-
address=10.10.0.1 gateway=10.99.99.5
Reduced delay in bandwidth adjustment
Allocated bandwidth is optimally utilized given the
shorter adjustment period for the LSPs’ reserved
bandwidth.
The auto-bandwidth allocation minimum and maximum
limits of the tunnel, from PE3 to PE1, are set from the
ingress router as shown in the configuration below.
From the above configuration, the MPLS-TE tunnel
between PE1 and PE2 has been set with an upper limit of
100Mbps, a sampling rate of 1second and a bandwidth
adjustment interval of 1minute.
IV. EXPERIMENT EVALUATION
In the experimental evaluation, the multicast awareness of
the VPLS network is analyzed. Using real time traffic and
the file transfer protocol, traffic through the TE tunnels is
analyzed and evaluated using the Wireshark monitoring
tool. The multicast awareness aspect of VPLS reduces the
number of similar frames to be replicated to other
destinations by the source. This reduces the traffic load on
the network thus efficiently utilizing the available
bandwidth. Replication of frames to different client sites
occurs closest to the client site that has requested the
application or service. Some of the metrics used for the
multicast awareness performance evaluation include:
Ingress replication
High traffic rate throughput
Auto-bandwidth budgeting
Quality of service
Ingress replication of frames to the different client sites
occurs at the nearest possible node, in the network, which is
PE1. The server and client sites belong to the same VPLS
instance. PE1 is the only replication point which reduces
bandwidth wastage in the network when client-end nodes at
PE2 and PE4 request for data from the real-time server at
CE2, as shown in Figure 3.
Client facing end
Network facing end Client facing end
Real-time server
CE2 PE1
PE4
CE4 RtC1
RtC2
CE7
PE2
Figure 3: VPLS aware multicasting
In order to achieve multicasting, it is important that
multicast members belong to the same group. That is why in
the setup of the VPLS test bed environment, care was taken
to assign the same import-route-target value to the router’s
interface belonging to a particular VPLS instance. Having
specified the import route target value to an interface, this
interface is then bridged to the client facing end router.
Figure 4 illustrates the relationship between the real-server
traffic and the network facing traffic rate from router PE1.
Figure 4: Ingress replication traffic profile
From Figure 4, it is shown that the traffic on the
client facing end of router PE1 is approximately half that of
the traffic on the network facing interface. This implies that
there is ingress replication at router PE1. However, if the
replication had occurred at the server, this would mean that
the clients’ bandwidth requirements would have to be
increased to facilitate the transfer of the frames. Therefore
by having the replication of the frames within the network
and close to the destinations, leads to lower bandwidth costs
for the client. Figure 5 is an illustration of the real time
traffic rates in tunnels 1 and 2 in comparison to the network
traffic.
Figure 5: VPLS aware multicast traffic profile
Figure 5 illustrates the different amounts of traffic
that is entering the network. The highest bandwidth is a
representation of the traffic on the physical interface of
router PE1. That means the other bandwidth traffic profiles
represent the frames going through the MPLS-TE tunnels in
the VPLS network. It is not possible to have a combined
value of traffic volume over the two tunnels being greater
than that of the actual interface at PE3, this is because they
are connected to virtual interfaces and it is not possible to
have virtual traffic greater than the actual traffic. Having
this kind of traffic traversing the tunnels is advantageous in
that it offer the SP control of how to manage it as will be
discussed in the subsequent section under auto-bandwidth
allocation.
E. Auto-bandwidth Allocation
As previously discussed auto-bandwidth allocation
offers control of traffic traversing the tunnels. Traffic In the
VPLS network was initially learned and this offered an
insight into how and what kind of adjustment settings will
[admin@PE1] > interface traffic-eng
[admin@PE1] /interface traffic-eng> add
name=tepe1_to_pe2 from-address=10.255.255.4
to-address=10.255.255.5 bandwidth=100000000
primary-path=stat auto-bandwidth-range=1000-
100000000 
auto-bandwidth-avg-interval=1s
auto-bandwidth-update-interval=1m
be implemented to automatically adjust the bandwidth
within the tunnels. By setting these adjustments, the tunnels
are able to dynamically change their bandwidth allocation
within the tunnels. Figure 6 is a representation of TE tunnels
using multiple time intervals in a multicast aware VPLS
network.
CE1 PE1
PE2
PE3
PE4 CE6
CE5
CE3
Database server
DbC1
DbC2
DbC3
TE tunnel 2
Client facing end
Network facing end Client facing end
Figure 6: Auto-bandwidth allocation in a multicast aware VPLS network
VPLS as stated offers Ethernet type connectivity
therefore it is able to deliver high volumes of data to its
enterprise clients. Taking this into consideration it is
important to avoid instances in which the allocated
bandwidth is not sufficient thus leading to either network
congestion or dropping of some frames. Figure 7 is a
representation of a short time interval in which frames are
dropped in the network.
Figure 7: Auto-bandwidth timer t = 30 seconds
The time interval in tunnel 1 is set to t = 30 seconds. It is
however noted that there are intervals in which the reserved
bandwidth is less than the actual traffic rate in the tunnel.
This in turn leads to frames being dropped in the network.
However in Figure 8, the auto-bandwidth interval in the
tunnel was set at t = 60 seconds.
Figure 8: Auto-bandwidth timer t = 1min
Comparing Figure 7 to Figure 8 shows that the
reserved bandwidth is sufficient for the traffic rates in tunnel
2. However even though there are instances in which the
traffic rate is higher than the reserved limit, tunnel 2 drops
less frames compared to tunnel 1.
The adjustment of the bandwidth was also noted
monitored by the Mikrotik router between PE1 and PE2, on
TE tunnel 1 as shown below.
The above Mikrotik based result agrees with a
point in time t=100s on Figure 5.16. Monitoring the tunnel’s
behavior using Mikrotik gives an insight into the labels
attached and the route the traffic traverses. It also shows the
relationship between the reserved bandwidth and the rate
limit, the later will always be higher than the former. From
the Mikrotik result, in the next interval the reserved
bandwidth in the next interval will be highest recorded
average form the previous interval.
The auto-bandwidth allocator in the tunnel ensures
that that the maximum recorded mean is set as the next
bandwidth reservation value in the subsequent interval. In
the implementation of the auto-bandwidth parameters, as
mentioned earlier, a sampling period of one second and an
adjustment interval of one minute are set. These were seen
as optimal parameters in the way in which the adjustment
interval was not too short that would consequently lead to
packets being dropped in case of sudden spikes in the data
flowing through the tunnel.
The adjustment period is not too long such that it
would lead to bandwidth underutilization i.e. in the case of a
high reserved limit in which there is minimal use of the
allocated bandwidth. As shown in Figure 9.
Figure 9: Auto-bandwidth timer t = 90 seconds
Comparing tunnel 3 to tunnels 1 and 2 shows that the
largest time interval leads to underutilization of the reserved
bandwidth. More so there are also instances in which the
reserved bandwidth is less than the traffic rate in the tunnel.
[admin@PE1] > interface traffic-eng monitor 0
tunnel-id: 1 primary-path-state: established
primary-path: dynpe1_to_pe2
secondary-path-state: not-necessary
active-path: dynpe1_to_pe2
active-lspid: 2
active-label: 121
explicit-route:
"S:10.3.0.254/32,S:10.0.255.2/32,S:10.0.255.1/3
2,S:10.1.0.254/32,S:10.1.0.1/32"
recorded-route:"10.0.255.2[121],
10.1.0.254[132], 10.1.0.1[3]" reserved-
bandwidth: 52.3Mbps rate-limit: 61.7Mbps
rate-measured-last: 45.3Mbps
rate-measured-highest: 46.3Mbps
From the above comparisons, it is noted that tunnel 2 is
the most efficient when it comes to bandwidth utilization
amongst all the 3 tunnels. Having achieved auto-bandwidth
allocation within the tunnels, the performance of the traffic
traversing the network is monitored to validate its quality of
service delivery.
F. Classical QoS Performance Metrics
QoS parameters ensure the delivery of services
across a network. The availability of bandwidth coupled
with the availability of network nodes and routes offer
delivery of frames across the network. It is important to
know the behavior of frames traversing the network. A
performance metric such as jitter offers an insight into how
real time applications, such as voice traffic, are handled.
Jitter is termed as the average deviation from the network’s
latency. Network performance metrics are determined by the
jitter value [15]. The results represented by Figure 10
illustrate the amount of jitter within the network.
Figure 10: Jitter pattern
Figure 10 was obtained from an RTP stream and with the
aid of Wireshark. During the RTP stream the link between
PE1 and PE2 was monitored. The average jitter recorded
was under 2.5ms suggesting a high quality of service
delivery for real time traffic even though there is link
disruption in the network.
V. CONCLUSIONS
From the above results, the establishment of PWs using
the different mechanisms presented by RFC 4761 and RFC
4762 offer different design options of creating a P2MP
VPLS instance. BGP caters for the dynamic setup of a
meshed VPLS network capable of running several instances
without worry of the complexity involved while manually
establishing it (VPLS network) using LDP.
The data plane, the results presented show the multicast
awareness of the VPLS network. Frames from the Real-time
and Database servers were not flooded into the network but
they were delivered to specific clients participating in
different VPLS instances. The multicast awareness of the
VPLS network ensured the efficient use of the available
bandwidth.
The use of MPLS-TE tunnels for the delivery of
frames across the network also improves the utilization of
the network bandwidth by offering control over allocated
and reserved bandwidth. The results presented by the auto-
bandwidth allocation mechanism showed that having a
constantly reserved bandwidth leads to underutilization of
network resources.
Furthermore, the QoS results presented showed that
by using traffic engineered tunnel there is no network
degradation. This is advantageous due to the fact that the TE
tunnels and the PWs are dynamic in nature and will
therefore reconstruct a network path to ensure the delivery
of frames from the servers to client machines.
Therefore the VPLS network presented is not only
multicast aware but it also utilizes the available bandwidth
efficiently. The network is also virtualized therefore has low
setup costs. This further improves the ease of expanding a
VPLS network that is running BGP. In this paper, the
advantages of deploying a VPLS were brought forward with
specific interest in the design setup of a multicast aware
VPLS network
REFERENCES
[1] Huawei Technologies: “Technical White Paper for VPLS”,
Huawei Technologies, 2007
[2] Cisco Systems: “Virtual Private LAN Service Architectures and
Operation”, White Paper 2004
[3] Zhuo Xu: “Designing and Implementing IP/MPLS-Based Ethernet
Layer 2 VPN Services, An Advanced Guide for VPLS and VLL”,
2010
[4] Y. Kamite, Y. Wada, Y. Serbest, T. Morin and L. Fang:
“Requirements for Multicast Support in Virtual Private LAN
Services”, IETF RFC 5501, March 2009.
[5] M. Lasserre and V. Kompella: “Virtual Private LAN Service
(VPLS) Using Label Distribution Protocol (LDP) Signaling”, IETF
RFC 4762, January 2007.
[6] K. Kompella, B. Kothari and R Cherukuri: “ Layer 2 Virtual
Private Networks Using BGP for Auto-discovery and Signaling”,
draft-kompella-l2vpn-l2vpn-10.txt, February 2012
[7] K. Kompella and Y. Rekhter: “Virtual Private LAN Service
(VPLS) Using BGP for Auto-Discovery and Signaling” IETF RFC
4761, January 2007.
[8] E. Rosen, B. Davie, V. Radoaca and W. Lou: “Provisioning, Auto-
Discovery, and Signaling in Layer 2 Virtual Private Networks
(L2VPNs)”, IETF RFC 6074, January 2011.
[9] A. Sajassi and D. Mohan: “Layer 2 Virtual Private Network
(L2VPN) Operations, Administration, and Maintenance (OAM)
Requirements and Framework”, IETF RFC 6136, March 2011.
[10] A. Sajassi, F. Brockners, D. Mohan and Y. Serbest: “Virtual
Private LAN Service (VPLS) Interoperability with Customer Edge
(CE) Bridges”, IETF RFC 6246 June 2011
[11] E. Rosen, A. Viswanathan and R. Callon: “Multiprotocol Label
Switching Architecture”, IETF RFC 3031 January 2001.
[12] X. Xiao, D. McPherson, and P. Pate: “Requirements for Pseudo-
Wire Emulation Edge-to-Edge (PWE3)” IETF RFC 3916,
September 2004.
[13] Juniper Networks, Inc, MPLS Applications Configuration Guide,
121st ed. Californiav, USA: Juniper Networks, Inc, 2012.
[14] Mohan Nanduri, Mark Kasten, and Naoki Kitajima. (2012,
Febuary) MPLS Traffic Engineering with Auto-Bandwidth:
Operational Experience and Lessons Learned. [Online].
http://meetings.apnic.net/__data/assets/pdf_file/0020/45623/MPLS
-Traffic-Engineering-with-Auto-Bandwidth.pdf
[15] Vinod Joseph and Srinivas Mulugu, Deploying Next Generation
Multicast-Enabled Applications. USA: Morgan Kaufmann, 2011.

More Related Content

What's hot

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
AhmedAymanMastersThesis
AhmedAymanMastersThesisAhmedAymanMastersThesis
AhmedAymanMastersThesisAhmed Ayman
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sPfedya
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12RAJAN ST
 
Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpnssubha_87
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04daniel ayalew
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 

What's hot (19)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
AhmedAymanMastersThesis
AhmedAymanMastersThesisAhmedAymanMastersThesis
AhmedAymanMastersThesis
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Vp ns
Vp nsVp ns
Vp ns
 
94
9494
94
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo s
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Unit 5
Unit 5Unit 5
Unit 5
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12S.t rajan cjb0912010 ft12
S.t rajan cjb0912010 ft12
 
Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpns
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04
 
Frame relay
Frame relay Frame relay
Frame relay
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Viewers also liked

Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...Fair network bandwidth allocation in iaa s datacenters via a cooperative game...
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...ieeepondy
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying M
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying MResource Allocation using ASK, FSK and PSK Modulation Techniques with varying M
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying Mchiragwarty
 

Viewers also liked (6)

Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
 
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...Fair network bandwidth allocation in iaa s datacenters via a cooperative game...
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying M
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying MResource Allocation using ASK, FSK and PSK Modulation Techniques with varying M
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying M
 

Similar to Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks

VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingApproach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingIRJET Journal
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingIJARIIT
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)Vipin Sahu
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 

Similar to Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks (20)

VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingApproach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
 
G010314853
G010314853G010314853
G010314853
 
J010136172
J010136172J010136172
J010136172
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
Mpls
MplsMpls
Mpls
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
Virtual
VirtualVirtual
Virtual
 
Ip virtual leased line
Ip virtual leased lineIp virtual leased line
Ip virtual leased line
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
L347176
L347176L347176
L347176
 

Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks

  • 1. Abstract-Traditionally, customers that preferred transparent Ethernet segment connection between their sites achieved it through bridging their geographically dispersed sites using Ethernet of Internet Protocol (EoIP) tunnels. However this presented the inefficient usage of the service providers’ (SP) bandwidth due to the IP header overheads. Virtual Private LAN Service (VPLS) networks offer more efficient usage of bandwidth as a network resource by using the frame encapsulation techniques offered by the Multiprotocol Label Switching (MPLS) protocol. For the SP and the client to benefit from protocols such as MPLS, for efficient bandwidth utilization, there has to be signaling and discovery protocols namely Border Gateway Protocol (BGP) and Label Distribution Protocol (LDP) within the network. In this paper the mentioned discovery and signaling protocols are used to establish a multicast aware VPLS network. The VPLS network uses MPLS traffic engineered (MPLS-TE) to control the utilization of the available bandwidth through the use of the auto-bandwidth management mechanism. Index Terms - VPLS, MPLS, BGP, LDP, MPLS-TE. I. INTRODUCTION Virtual Private LAN Service (VPLS) is a Layer 2 Virtual Private Network technology that uses Multiprotocol Label Switching (MPLS) as its transport protocol to deliver Ethernet services over a Service Provider network [1]. The VPLS service is offered over an MPLS network, thereby enabling clients/customers multipoint access/connectivity over geographically dispersed areas. The multipoint nature of VPLS implies that associated clients can directly connect to each other in contrast to point-to-point where they’d be connected over a hub, thus reducing transmission delay [2]. VPLS also known as Transparent LAN Service (TLS) emulates a multipoint-to-multipoint (MP2MP) Local Area Network (LAN) connection over dispersed areas by bridging its domains over an MPLS network [3]. Customer sites’ remote LAN segments behave as a single LAN via VPLS MP2MP interconnectivity [4]. VPLS offers Service Providers (SPs) and clients a wide range of amenities utilizing the functionality of Ethernet services and the flexibility of an MPLS core [3]. For example, Ethernet offers throughput of up to 900GB, thus high bandwidth throughput. Multicast services are available to clients [5] and this is a significant advantage to the SP in that the network is not flooded with traffic packets to unknown destinations thereby improving bandwidth utilization within the network. MPLS advantages such as its reliability, flexibility, fast re-routing and traffic engineering services are enjoyed by VPLS users (SPs and customers). MPLS traffic engineering, (MPLS-TE) tunnels can support reliable Quality-of-Service (QoS) end-to-end [5], to facilitate efficient use of network resources. Therefore the cost-effective advantage of the Ethernet combined with the scalability, reliability and traffic engineering of the Multiprotocol Label Switching (MPLS) protocol offer VPLS customers better service delivery [6]. VPLS offers architectural simplicity to the service provider (SP). The SP provides Layer 2 resource connectivity to the enterprise clients who will themselves govern the design of their IP and routing protocols [6]. VPLS is a type of Layer 2 VPN in which the Service Provider (SP) provides participating clients with L2 connectivity and is not involved with the client’s Layer 3 network, this is advantageous to the SP [8]. The VPLS network is not subjected to geographical constraints, thus customers may be spread over a Metro or Wide area network and will appear as if they belong to a single LAN connection [7]. Ethernet service such as “Plug and Play” is readily available to VPLS clients. For example MAC switching and learning which allows better bandwidth throughput compared to traditional technologies like Asynchronous Transfer Mode (ATM) and Frame Relay. The use of MPLS-TE tunnels for management of bandwidth in a network can be done manually or automatically. By using the manual adjustment of the reserved bandwidth in a network, may lead to some inconsistencies especially depending on the applications that are sensitive to fluctuations in bandwidth adjustment. For example voice application requires a dedicated/non- interrupted service end delivery therefore the bandwidth management scheme in place must ensure that adjustments do not interrupt the flow of traffic in the network [13] In this design paper, the requirements needed to establish/implement a VPLS network are introduced in section 2. Section 3 brings forward a test bed setup in which particular attention is focused on the creation of a point-to- point (P2MP) VPLS network. In section 4, an evaluation of the P2MP VPLS test bed setup and finally section 5 draws conclusions and brings forward future works on the VPLS test bed network. It should be noted that Mikrotik routers are used in the implementation of this paper. Auto-Bandwidth Allocation in Multicast Aware VPLS Networks Allan R. Kweli, Alexandru Murgu University of Cape Town, Department of Electrical Engineering Cape Town, South Africa (allan.kweli, Alexandru.Murgu)@uct.ac.za
  • 2. II. VPLS REQUIREMENTS As previously introduced, VPLS as an Ethernet service instance bridges end-to-end LANs over an MPLS based network [9] and thereby emulates a LAN connection [10]. VPLS has core components that are involved in emulating an Ethernet type connection namely [RFC4761, RFC4762 & RFC3031]: a) Customer Edge Router (CE), Provides an Ethernet interface between the customer's LAN and the provider's core network. CEs are VPLS-unaware and are placed at the customers’ premises. b) Provider Edge Router (PE), encapsulates the Ethernet frames into MPLS, forwards packet to outgoing interface and vice versa. It is located at a service provider's network and is connected to a customer edge (CE) router directly. PEs are capable of running signalling and routing protocols for Pseudowire (PW) setup. c) Pseudowires (PW) are bi-directional in nature and consist of a pair of uni-directional MPLS Virtual Circuits (VCs). d) MPLS core. The routers in the core network known as “Label Edge/Switching Routers” LERs/LSRs are responsible for the encapsulation/de-capsulation and switching of labels on frames traversing the MPLS network between VPLS sites VPLS networks also known as Transparent LAN Service (TLS) offer specific customer sites emulated Ethernet LAN connectivity [7] through forwarding and learning MAC addresses in the Layer 2 domain [5]. VPLS further provides multipoint connectivity to customer sites on the same VPLS instance over a single Provider Edge (PE) node [5]. In so doing, the geographically dispersed sites appear as if they are connected to the same Ethernet LAN [5]. Frames forwarded in a VPLS network are similar to the forwarding mechanism within IEEE 802.1 in which there is self- learning between MAC addresses and ports, thus frame forwarding is MAC address based [2]. MPLS used as the transport protocol for VPLS provides techniques such as loop detection, label swapping and frame encapsulation [11] which enable Ethernet service creation within the (VPLS) network. To emulate Ethernet switching over an MPLS network, the PE (Label Edge Router) routers establish tunnels to other LERs to form paths to forward the encapsulated Ethernet frames. The virtual circuits formed are referred to as Pseudowires (PWs). RFC 4761 and RFC 4762 offer mechanisms for signaling and forwarding VPLS frames over a network. Once the PWs are created they use the pre- existing label switched paths to interconnect. However with the introduction of MPLS-TE tunnels, the PWs automatically use the tunnels to emulate LAN connectivity. MPLS-TE tunnels are established using LDP and are independent of the services running over them, in this case VPLS [7]. The mechanisms used in the establishment of PWs in a VPLS network, which include; a) Border Gateway Protocol (BGP) for Auto-discovery and Signalling [RFC4761] b) Label Distribution Protocol (LDP) for Signalling [RFC4762] In section 3, a VPLS P2MP test bed network is presented showing the interaction between the nodes participating in a single VPLS instance. III. VPLS EXPERIMENTAL SETUP The VPLS setup is an end-to-end (P2MP) network with MPLS at its core and MAC access to its Ethernet interfaces. RFC 6136 describes a VPLS network as an end-to-end network that has an underlying MPLS core. Figure 1 represents a P2MP VLPS instance between two clients. In Figure 1, CE nodes represent Client Edge while PE nodes represent Provider Edge core routers respectively based at the SP premises. DbC and RtC denote the database clients and real-time clients respectively. Database server Real-time server CE1 CE2 PE1 PE2 PE3 PE4 CE3 CE4 CE5 DbC1 DbC2 DbC3 RtC1 RtC2 CE6 CE7DbC – Database Client RtC – Realtime Client Figure 1: Point-to-Multipoint VPLS setup In the setup of the VPLS P2MP network, it is paramount to establish PWs in order to attain an emulated service [7]. PWs encapsulate protocol data units across the network tunnels in order to archive a service imitation of a LAN network [12]. There are assumptions set aside during the design of the PWs required for the VPLS P2MP test bed setup shown in Figure 1 above, these include [7]: The Provider Edge (PE) routers are logic, fully meshed with tunnels over which packets belonging to a VPLS instance are encapsulated and forwarded. The Label Switched Paths (LSP) tunnels are MPLS or LDP. The LSP tunnels are established independently. Figure 1 also shows the establishment of a PW, it is to be noted that the signaling protocols reserved for PW establishment reside in the PE routers. In this design paper, focus is placed on the control plane of the PE routers whose main functions are Signaling and Auto-discovery [7]. Signaling and Auto-discovery between the routers requires that loopback addressing and Open Shortest Path First (OSPF) protocols are in place for the exchange of routing information between the routers, these will be discussed in section 4.
  • 3. A. Label Distribution Protocol LDP is suited to relatively smaller networks as compared to those that deploy BGP for VPLS peer discovery. Therefore for it is used for signaling and setting the MPLS backbone over which VPLS is deployed. The MPLS configuration is shown below. The above enables MPLS on the network facing interfaces of router PE1. The other PE routers are configured in the same way but only have one enabled MPLS interface. Reason being that they only have one interface facing the network. Having enabled MPLS on the routers, VPLS PWs based on BGP are setup. B. Border Gateway Protocol This is one in which participating PEs of a particular VPLS instance are identified. In Figure 1, PE nodes 1, 2, and 4 have two different VPLS instances running. The two different VPLS instances belong to the different sets of traffic i.e. from the database server and the real-time server. As previously mentioned BPG has the capability of auto- discovery and this is advantageous to the VPLS setup of large networks. The command line code shown below invokes the auto-discovery between PE1 and the other PE routers. Routers PE 2, 3 and 4 are configured in a similar way but only remote with PE1. Once the PE routers are peering then the VPLS instances are setup for the different sets of traffic. This is shown below. The created bridges, A and B, correspond to the two different VPLS instances to which the clients belong. Having established the two different VPLS instances, MPLS-TE tunnels are configured. C. MPLS-TE Tunnel Setup MPLS-TE tunnels are established using LDP and are independent of the services running over them, in this case VPLS [7]. In the MPLS-TE tunnel setup constrained shortest path first (CSPF) is for tunnel path selection and open shortest path first (OSPF) is used to distribute TE information. The MPLS-TE tunnels are created as shown below. Having established the MPLS-TE tunnel, the dynamically created PWs use them to interconnect between the PE routers. The traffic engineered tunnels facilitate the use of auto-bandwidth management which in turn improves the utilization of the available bandwidth. D. Auto-Bandwidth Allocation Using offline calculation to manage the bandwidth allocation presents a problem of either under assignment or over assignment of the bandwidth thus not efficiently utilizing bandwidth. Therefore there is a need to use an automatic bandwidth allocator that will respond to traffic variations and optimally utilize the available bandwidth [14], as illustrated in Figure 2. 0 200000 400000 600000 800000 1000000 1200000 0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 TrafficRate(Bit/s) Time (Hrs.) Reserved bandwidth Highest possible value Highest recorded value after 1st interval New reserved bandwidth after 1st interval Time interval MPLS-TE tunnel traffic rate Figure 2: Auto-bandwidth allocation. Benefits of using the auto-bandwidth approach to adjust traffic rates in the LSP include [14]: Offline calculation doesn’t support real-time traffic adjustment, therefore may result to either over or under assignment of bandwidth to the LSP. On PE1 [admin@PE1] > routing bgp peer add remote- address=10.255.255.5 remote-as=65530 address- families=l2vpn update-source=lobridge [admin@PE1] > routing bgp peer add remote- address=10.255.255.6 remote-as=65530 address- families=l2vpn update-source=lobridge [admin@PE1] > routing bgp peer add remote- address=10.255.255.7 remote-as=65530 address- families=l2vpn update-source=lobridge admin@PE1] > mpls ldp [admin@PE1] /mpls ldp> set enabaled=yes lsr- id=10.255.255.4 transport-address=10.255.255.4 [admin@PE1] > mpls ldp interface [admin@PE1] /mpls ldp interface> add interface=ether1 [admin@PE1] /mpls ldp interface> add interface=ether2 [admin@PE1] /mpls ldp interface> add interface=ether3 [admin@PE1] > interface bridge add name=A [admin@PE1] > interface bridge add name=B [admin@PE1] > interface bridge port add interface=ether9 bridge=A horizon=1 [admin@PE1] > interface bridge port add interface=ether10 bridge=B horizon=1 [admin@PE1] > interface vpls bgp-vpls add bridge=A bridge-horizon=1 route- distinguisher=1:1 site-id=1 import-route-targets=1:1 export- route-targets=1:1 [admin@PE1] > interface vpls bgp-vpls add bridge=B bridge-horizon=1 route- distinguisher=2:2 site-id=1 import-route-targets=2:2 export- route-targets=2:2 [admin@PE3] > routing ospf instance set mpls- te-area=backbone mpls-te-router-id=lobridge [admin@PE3] > mpls traffic-eng interface add interface=ether1 bandwidth=100000000 [admin@PE3] > mpls traffic-eng tunnel-path add use-cspf=yes name=dynamic [admin@PE3] > interface traffic-eng add name=tepe3_to_pe1 bandwidth=83000000 primary- path=dynamic from-address=10.255.255.6 to- address=10.255.255.4 disabled=no record- route=yes [admin@PE3] > ip address add address=10.99.99.6/30 interface=tepe3_to_pe1 [admin@PE3] > ip route add dst- address=10.10.0.1 gateway=10.99.99.5
  • 4. Reduced delay in bandwidth adjustment Allocated bandwidth is optimally utilized given the shorter adjustment period for the LSPs’ reserved bandwidth. The auto-bandwidth allocation minimum and maximum limits of the tunnel, from PE3 to PE1, are set from the ingress router as shown in the configuration below. From the above configuration, the MPLS-TE tunnel between PE1 and PE2 has been set with an upper limit of 100Mbps, a sampling rate of 1second and a bandwidth adjustment interval of 1minute. IV. EXPERIMENT EVALUATION In the experimental evaluation, the multicast awareness of the VPLS network is analyzed. Using real time traffic and the file transfer protocol, traffic through the TE tunnels is analyzed and evaluated using the Wireshark monitoring tool. The multicast awareness aspect of VPLS reduces the number of similar frames to be replicated to other destinations by the source. This reduces the traffic load on the network thus efficiently utilizing the available bandwidth. Replication of frames to different client sites occurs closest to the client site that has requested the application or service. Some of the metrics used for the multicast awareness performance evaluation include: Ingress replication High traffic rate throughput Auto-bandwidth budgeting Quality of service Ingress replication of frames to the different client sites occurs at the nearest possible node, in the network, which is PE1. The server and client sites belong to the same VPLS instance. PE1 is the only replication point which reduces bandwidth wastage in the network when client-end nodes at PE2 and PE4 request for data from the real-time server at CE2, as shown in Figure 3. Client facing end Network facing end Client facing end Real-time server CE2 PE1 PE4 CE4 RtC1 RtC2 CE7 PE2 Figure 3: VPLS aware multicasting In order to achieve multicasting, it is important that multicast members belong to the same group. That is why in the setup of the VPLS test bed environment, care was taken to assign the same import-route-target value to the router’s interface belonging to a particular VPLS instance. Having specified the import route target value to an interface, this interface is then bridged to the client facing end router. Figure 4 illustrates the relationship between the real-server traffic and the network facing traffic rate from router PE1. Figure 4: Ingress replication traffic profile From Figure 4, it is shown that the traffic on the client facing end of router PE1 is approximately half that of the traffic on the network facing interface. This implies that there is ingress replication at router PE1. However, if the replication had occurred at the server, this would mean that the clients’ bandwidth requirements would have to be increased to facilitate the transfer of the frames. Therefore by having the replication of the frames within the network and close to the destinations, leads to lower bandwidth costs for the client. Figure 5 is an illustration of the real time traffic rates in tunnels 1 and 2 in comparison to the network traffic. Figure 5: VPLS aware multicast traffic profile Figure 5 illustrates the different amounts of traffic that is entering the network. The highest bandwidth is a representation of the traffic on the physical interface of router PE1. That means the other bandwidth traffic profiles represent the frames going through the MPLS-TE tunnels in the VPLS network. It is not possible to have a combined value of traffic volume over the two tunnels being greater than that of the actual interface at PE3, this is because they are connected to virtual interfaces and it is not possible to have virtual traffic greater than the actual traffic. Having this kind of traffic traversing the tunnels is advantageous in that it offer the SP control of how to manage it as will be discussed in the subsequent section under auto-bandwidth allocation. E. Auto-bandwidth Allocation As previously discussed auto-bandwidth allocation offers control of traffic traversing the tunnels. Traffic In the VPLS network was initially learned and this offered an insight into how and what kind of adjustment settings will [admin@PE1] > interface traffic-eng [admin@PE1] /interface traffic-eng> add name=tepe1_to_pe2 from-address=10.255.255.4 to-address=10.255.255.5 bandwidth=100000000 primary-path=stat auto-bandwidth-range=1000- 100000000 auto-bandwidth-avg-interval=1s auto-bandwidth-update-interval=1m
  • 5. be implemented to automatically adjust the bandwidth within the tunnels. By setting these adjustments, the tunnels are able to dynamically change their bandwidth allocation within the tunnels. Figure 6 is a representation of TE tunnels using multiple time intervals in a multicast aware VPLS network. CE1 PE1 PE2 PE3 PE4 CE6 CE5 CE3 Database server DbC1 DbC2 DbC3 TE tunnel 2 Client facing end Network facing end Client facing end Figure 6: Auto-bandwidth allocation in a multicast aware VPLS network VPLS as stated offers Ethernet type connectivity therefore it is able to deliver high volumes of data to its enterprise clients. Taking this into consideration it is important to avoid instances in which the allocated bandwidth is not sufficient thus leading to either network congestion or dropping of some frames. Figure 7 is a representation of a short time interval in which frames are dropped in the network. Figure 7: Auto-bandwidth timer t = 30 seconds The time interval in tunnel 1 is set to t = 30 seconds. It is however noted that there are intervals in which the reserved bandwidth is less than the actual traffic rate in the tunnel. This in turn leads to frames being dropped in the network. However in Figure 8, the auto-bandwidth interval in the tunnel was set at t = 60 seconds. Figure 8: Auto-bandwidth timer t = 1min Comparing Figure 7 to Figure 8 shows that the reserved bandwidth is sufficient for the traffic rates in tunnel 2. However even though there are instances in which the traffic rate is higher than the reserved limit, tunnel 2 drops less frames compared to tunnel 1. The adjustment of the bandwidth was also noted monitored by the Mikrotik router between PE1 and PE2, on TE tunnel 1 as shown below. The above Mikrotik based result agrees with a point in time t=100s on Figure 5.16. Monitoring the tunnel’s behavior using Mikrotik gives an insight into the labels attached and the route the traffic traverses. It also shows the relationship between the reserved bandwidth and the rate limit, the later will always be higher than the former. From the Mikrotik result, in the next interval the reserved bandwidth in the next interval will be highest recorded average form the previous interval. The auto-bandwidth allocator in the tunnel ensures that that the maximum recorded mean is set as the next bandwidth reservation value in the subsequent interval. In the implementation of the auto-bandwidth parameters, as mentioned earlier, a sampling period of one second and an adjustment interval of one minute are set. These were seen as optimal parameters in the way in which the adjustment interval was not too short that would consequently lead to packets being dropped in case of sudden spikes in the data flowing through the tunnel. The adjustment period is not too long such that it would lead to bandwidth underutilization i.e. in the case of a high reserved limit in which there is minimal use of the allocated bandwidth. As shown in Figure 9. Figure 9: Auto-bandwidth timer t = 90 seconds Comparing tunnel 3 to tunnels 1 and 2 shows that the largest time interval leads to underutilization of the reserved bandwidth. More so there are also instances in which the reserved bandwidth is less than the traffic rate in the tunnel. [admin@PE1] > interface traffic-eng monitor 0 tunnel-id: 1 primary-path-state: established primary-path: dynpe1_to_pe2 secondary-path-state: not-necessary active-path: dynpe1_to_pe2 active-lspid: 2 active-label: 121 explicit-route: "S:10.3.0.254/32,S:10.0.255.2/32,S:10.0.255.1/3 2,S:10.1.0.254/32,S:10.1.0.1/32" recorded-route:"10.0.255.2[121], 10.1.0.254[132], 10.1.0.1[3]" reserved- bandwidth: 52.3Mbps rate-limit: 61.7Mbps rate-measured-last: 45.3Mbps rate-measured-highest: 46.3Mbps
  • 6. From the above comparisons, it is noted that tunnel 2 is the most efficient when it comes to bandwidth utilization amongst all the 3 tunnels. Having achieved auto-bandwidth allocation within the tunnels, the performance of the traffic traversing the network is monitored to validate its quality of service delivery. F. Classical QoS Performance Metrics QoS parameters ensure the delivery of services across a network. The availability of bandwidth coupled with the availability of network nodes and routes offer delivery of frames across the network. It is important to know the behavior of frames traversing the network. A performance metric such as jitter offers an insight into how real time applications, such as voice traffic, are handled. Jitter is termed as the average deviation from the network’s latency. Network performance metrics are determined by the jitter value [15]. The results represented by Figure 10 illustrate the amount of jitter within the network. Figure 10: Jitter pattern Figure 10 was obtained from an RTP stream and with the aid of Wireshark. During the RTP stream the link between PE1 and PE2 was monitored. The average jitter recorded was under 2.5ms suggesting a high quality of service delivery for real time traffic even though there is link disruption in the network. V. CONCLUSIONS From the above results, the establishment of PWs using the different mechanisms presented by RFC 4761 and RFC 4762 offer different design options of creating a P2MP VPLS instance. BGP caters for the dynamic setup of a meshed VPLS network capable of running several instances without worry of the complexity involved while manually establishing it (VPLS network) using LDP. The data plane, the results presented show the multicast awareness of the VPLS network. Frames from the Real-time and Database servers were not flooded into the network but they were delivered to specific clients participating in different VPLS instances. The multicast awareness of the VPLS network ensured the efficient use of the available bandwidth. The use of MPLS-TE tunnels for the delivery of frames across the network also improves the utilization of the network bandwidth by offering control over allocated and reserved bandwidth. The results presented by the auto- bandwidth allocation mechanism showed that having a constantly reserved bandwidth leads to underutilization of network resources. Furthermore, the QoS results presented showed that by using traffic engineered tunnel there is no network degradation. This is advantageous due to the fact that the TE tunnels and the PWs are dynamic in nature and will therefore reconstruct a network path to ensure the delivery of frames from the servers to client machines. Therefore the VPLS network presented is not only multicast aware but it also utilizes the available bandwidth efficiently. The network is also virtualized therefore has low setup costs. This further improves the ease of expanding a VPLS network that is running BGP. In this paper, the advantages of deploying a VPLS were brought forward with specific interest in the design setup of a multicast aware VPLS network REFERENCES [1] Huawei Technologies: “Technical White Paper for VPLS”, Huawei Technologies, 2007 [2] Cisco Systems: “Virtual Private LAN Service Architectures and Operation”, White Paper 2004 [3] Zhuo Xu: “Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services, An Advanced Guide for VPLS and VLL”, 2010 [4] Y. Kamite, Y. Wada, Y. Serbest, T. Morin and L. Fang: “Requirements for Multicast Support in Virtual Private LAN Services”, IETF RFC 5501, March 2009. [5] M. Lasserre and V. Kompella: “Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling”, IETF RFC 4762, January 2007. [6] K. Kompella, B. Kothari and R Cherukuri: “ Layer 2 Virtual Private Networks Using BGP for Auto-discovery and Signaling”, draft-kompella-l2vpn-l2vpn-10.txt, February 2012 [7] K. Kompella and Y. Rekhter: “Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling” IETF RFC 4761, January 2007. [8] E. Rosen, B. Davie, V. Radoaca and W. Lou: “Provisioning, Auto- Discovery, and Signaling in Layer 2 Virtual Private Networks (L2VPNs)”, IETF RFC 6074, January 2011. [9] A. Sajassi and D. Mohan: “Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework”, IETF RFC 6136, March 2011. [10] A. Sajassi, F. Brockners, D. Mohan and Y. Serbest: “Virtual Private LAN Service (VPLS) Interoperability with Customer Edge (CE) Bridges”, IETF RFC 6246 June 2011 [11] E. Rosen, A. Viswanathan and R. Callon: “Multiprotocol Label Switching Architecture”, IETF RFC 3031 January 2001. [12] X. Xiao, D. McPherson, and P. Pate: “Requirements for Pseudo- Wire Emulation Edge-to-Edge (PWE3)” IETF RFC 3916, September 2004. [13] Juniper Networks, Inc, MPLS Applications Configuration Guide, 121st ed. Californiav, USA: Juniper Networks, Inc, 2012. [14] Mohan Nanduri, Mark Kasten, and Naoki Kitajima. (2012, Febuary) MPLS Traffic Engineering with Auto-Bandwidth: Operational Experience and Lessons Learned. [Online]. http://meetings.apnic.net/__data/assets/pdf_file/0020/45623/MPLS -Traffic-Engineering-with-Auto-Bandwidth.pdf [15] Vinod Joseph and Srinivas Mulugu, Deploying Next Generation Multicast-Enabled Applications. USA: Morgan Kaufmann, 2011.