SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53
www.iosrjournals.org
DOI: 10.9790/2834-10314853 www.iosrjournals.org 48 | Page
Implementing VPN over MPLS
Engr. Awais Khan1
, Prof. Dr. Inayatullah Khan Babar2
1
(Department of Electrical Engineering, University of Engineering & Technology, Peshawar, Pakistan)
2
(Department of Electrical Engineering, University of Engineering & Technology, Peshawar, Pakistan)
Abstract: Now a day’s communication network and its services are migrating slowly towards new and
upgraded versions. Multi-Protocol label Switching (MPLS) is a key feature in new technology and it delivers
new services from old network to a new network during migration and it has totally focused on new network
topology. MPLS is capable of providing secure and reliable connection for costumers through Multi-Protocol
Label Switching Virtual Private Network (MPLS VPN). This thesis describes the requirements and motivation
for using MPLS VPN as a data center inter-connects technology. A comparison of Traditional VPN has been
made with that of MPLS VPN and also VPN has been implemented over MPLS using Graphical Network
Simulator GNS3. MPLS technology is being used widespread in the Service Provider (SP) networks for the
deployment of residential, business, and mobile services.
Keywords: Multi-protocol Label Switching (MPLS), Virtual Private Network (VPN), Virtual Routing and
Forwarding (VRF), Label Switched Path (LSP)
I. Introduction
In the last 15 years there are many different technologies used in transmission of network traffic from
source to destination. Asynchronous Transfer Mode (ATM), Frame Relay, and PPP were included in these
technologies. They are all useful and having their own benefits but there are some difficulties when these are
being internetworked. In parallel to using these technologies research was made by many companies to find the
alternate of these technologies because current technologies are so expensive. Out of these technologies some
new ideas were developed by Cisco System regarding Tag switching, which was later became a standard known
as Multi-Protocol Label Switching (MPLS).[1]
MPLS works on the basis of label switching. We assign a unique and independent label to every data
packet and then these packets are routed and switched through the network on the basis of these labels. These
labels are contained in the header of each packet and are overlooked by networking devices when processing
and forwarding packets. This idea of label switching is being used for long in data communication industry.
Frame Relay, X.25 and ATM are some example of label switching technologies which are in use since long. So
the journey towards MPLS is really now in fast pace. As we know that ATM, Frame Relay and IP etc. can be
easily and transparently carried through MPLS networks for the end user. Apart from large networks, MPLS is
also now in use in large enterprise networks of organization such as Business companies, government
organizations, hospitals, call centers and many more.
II. Multiprotocol Label Switching
MPLS (Multiprotocol Label Switching) is a standard networking technology in which packets are
forwarded through the network based on label attached to these packets. Adjacent routers in MPLS network
advertise labels among themselves and hence make peer to peer mapping. IP packets are forwarded by looking
at the labels attached to these packets and not by looking into the destination IP addresses, so we can say that
packet forwarding is by label switching instead of IP switching [4].
III. Packet Flow in an MPLS Network
Figure 1 shows a common MPLS network and its components. The devices inside the boundary of
provider network are the components of MPLS network. All the data packets passing through this cloudily
MPLS network are label based. The customer traffic outside this cloud are not label based, it may be IP based
etc. The customer owned Customer Edge (CE) routers (as shown in figure Site 1, Site 2 and Site 3) whose
interface is connected to label edge router (LER) or Provider Edge (PE) routers which are in domain of the
Service Provider. Why PE routers known as LER? Because it add label to the incoming (ingress) traffic when
enter into the MPLS network, and then remove the label on outgoing (egress) traffic when packets move out of
the MPLS networks. Within the MPLS cloud, the behavior of PE router is like LSRs (label switches routers)
because it switches packets from one node to the next looking into its labels.
Implementing VPN over MPLS
DOI: 10.9790/2834-10314853 www.iosrjournals.org 49 | Page
Figure: 1 Service Provider MPLS Network [20]
IV. Virtual Private Network
A VPN is a private network over a public or shared network in such a way as they are directly
connected. In VPN, different features like management, security etc of a private network can be attained over a
public network. In VPN different sites of costumers are connected but they are inaccessible from others
costumer’s sites. The VPN normally is used for one company and then several sites of that company to be
connected through the common/ public service provider network. The advantage of VPNs is to allow remote
locations of different costumers to be securely connected over a public networks, and hence the costumer do not
need to buy dedicated network lines [5].
V. MPLS VPN Routing
The correct routing information should be updated for the VPNs in routing and forwarding (VRF) table
of PE. The routing topology information for different VPNs needs to be populated in separate VRFs. This split-
up is obtained by addition of an identifier called route distinguisher to general IP route advertisements.
RDs are eight byte chunks that is present ahead of IPV4 address route advertisements. RD for every
VRF should be distinct. A route distinguisher may be representing as 100:25. Where 100 denote ASN of that
particular service provider while 25 represents any specific VRF. Now this RD is distinct for all the customer’s
VRF and when there are many VRFs and they may have gone through different service provider’s network, they
are still recognizable through the help of these RDs. [6].
Routing updates accomplished with BGP. iBGP or interior BGP with MPLS extension is used for
communication among PE routers. BGP updates among routers are based on incoming and outgoing routing
plans which is configured on these nodes. [7].
Route Distinguisher = (type + ASN + Assigned number)
VPN IP Address = Route Distinguisher + IPv4 Address
VI. Implementation
Now a basic MPLS VPN will be configured as shown in the below Figure 5.1 in which a simple MPLS
VPN model with serving two sites of a customer. For this purpose The Graphical Network Simulator (GNS3)
software has been used, it is an open source software and is very powerful tool for networks. It runs virtual
routers with real IOS.
Figure 2 Lab Topology of VPN MPLS
Implementing VPN over MPLS
DOI: 10.9790/2834-10314853 www.iosrjournals.org 50 | Page
As a review,
 P or Provider routers are present at the core of MPLS network; they run MPLS protocols and have no direct
connection with the customer NEs.
 PE or Provider Edge routers are at the boundary of MPLS cloud and are links with P router at one end and
with customer node at other end and all VPN services are configured at PEs.
 CE or Customer Edge router is placed at the boundary of customer network and is not running MPLS.
 An Interior gateway protocol (i.e. OSPF) is running between P and PE which also helps in LDP and BGP
adjacencies inside the network.
 MP-BGP is running between PEs only.
 An Interior gateway protocol like OSPF is also running b/w CE & and its corresponding PE.
In the above topology, OSPF has been used separately in the provider network & on CE.
We will perform following steps in order to get the functionality of MPLS VPN.
1. To enable MPLS on all routers in provider backbone network.
2. To build VRFs & allocate them for the routing interfaces.
3. To construct MP-BGP among PEs.
4. To configure OSPF b/w every PE and it’s connected CE router.
5. And finally to enable route redistribution b/w customer sites and the provider network
First we will do the basic configurations of all the routers and assigning addresses as per Figure 1
Then, an Interior gateway protocol like Open Shortest Path First (OSPF) has been run on the routers of provider
network i.e. on PE1, P and PE2.
Figure 4 Running OSPF on PE1 Router
Now we will to run MPLS on Router PE1, P and PE2.
Figure 5 Running MPLS on PE1 Router
Create Virtual routing and forwarding (VRF) between PE1 & CE1
Figure 6 VRF Configuration (PE1 to CE1)
Similarly between PE2 and CE2
Implementing VPN over MPLS
DOI: 10.9790/2834-10314853 www.iosrjournals.org 51 | Page
Figure 7 VRF Configuration (PE2 to CE2)
MP-BGP need to be configured for the VRF advertisement among PEs. It support multiple address
family e.g. ipv6 or ipv4. Only PE routers run MP-BGP while the P routers only use MPLS and OSPF etc for
packets forwarding with the SP network.
Figure 8 MP-BGP Configuration on PE1 towards PE2
Figure 9 MP-BGP Configuration on PE2 towards PE1
We can see the console message that MP-BGP neighbor ship is made b/w PE1 & PE2.
Now OSPF will be configured between PE & connected CE
Implementing VPN over MPLS
DOI: 10.9790/2834-10314853 www.iosrjournals.org 52 | Page
Similarly OSPF will be configured between PE2 and CE2.
Now in the last step we will redistribute routes b/w customer sites and Service Provider network. So first we
will redistribute OSPF 2 into BGP.
And then we will redistribute BGP into OSPF 2
VII. Results/ Analysis
Thus Routing Tables of Router CE1 and CE2 have been completely converged, as we can see all the routes of
CE2 visible/accessible in CE1.
Implementing VPN over MPLS
DOI: 10.9790/2834-10314853 www.iosrjournals.org 53 | Page
Similarly all the routes of CE1 are visible/ accessible in CE2 as shown below.
Hence the VPN has been successfully implemented over MPLS in the given scenario.
VIII. Conclusion
The advantages of MPLS VPN are so diverse i.e. it is easily manageable (addition or deletion of a new
sites just require the connectivity/ configuration of a customer site with the PE router), secure (since a separate
VRF is maintained for each customer site, hence there no chance of security breach as all the customers are well
segregated) and scalable (no complete mesh between customer sites is required), so it is now the need of service
provider to implement. Its ability of combining the plus points of overlay & peer to peer VPN model makes it
the priority solution by ISPs to offer their services to the customers. Traffic engineering, QoS are the additional
features of using MPLS network, also management of network including addition or deletion of new sites is
extremely easy.
In the near future all traditional VPN technologies will soon be replaced with MPLS VPN, due to its
flexibility, fast routing & switching and more secure features.
References
[1]. J. t. Johnson, "Five reason to move to MPLS (Multi protocol Label Switching)," Network World, 29 March 2007.
[2]. L. Paulson., "Using MPLS to unify multiple network types," Computer ,sponsored by IEEE computer society , vol. 37, no. 5, pp.
15-17, 2004.
[3]. S. G. K. N. a. P. P. Veni, "Performance analysis of network traffic behavior in conventional network over MPLS," in
Communication Control and Computing Technologies, 2010.
[4]. W. G. Hannes Gredler, "Traffic Engineering and MPLS", the Complete IS-IS Routing Protocol,," 2005.
[5]. F. Palmieri, "Evaluating MPLS VPN against traditional approaches," in Eighth IEEE Symposium on Computers and
Communications (ISCC’03), June 30, 2003.
[6]. D. H. F. Badran, "Service Provider Networking Infrastructures with MPLS," in Sixth IEEE Symposium on Computers and
Communications (ISCC'01), July 05, 2001.
[7]. R. Pulley, "Implementing VPNs Using MPLS," in Proceedings of MPLS Forum, 2000.
[8]. L. M. G. Heron, "An Architecture for L2VPNs," in IETF draft: draft-ietf-ppvpn-12vpn-00.txt, 2001.
[9]. S. Previdi, "Introduction to MPLS-BGP-VPN," in Proceedings of MPLS Forum , 2000.
[10]. R. Y. Rosen E, "RFC 4364 BGP/MPLS IP Virtual Private Networks (VPNs)," in RFC 4364, IETF, 2006.
[11]. I. P. J. Guichard, "MPLS and VPN Architectures," Cisco Press, 2000.
[12]. R. Venkateswaran, "Virtual Private Networks," in IEEE Potentials, Mar. 2001.
[13]. V. Alwayn, "Advanced MPLS Design and Implementation," Cisco Systems, 2002.
[14]. A. Y. S. V. C. Mahesh Kr. Porwal., "Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and
Traffic distribution in OSPF and MPLS," in International Conference on Emerging Trends in Engineering and Technology,
ICETET, July, 2008.
[15]. D. O. Awduche, "MPLS and Traffic Engineering in IP Networks," in IEEE Communications Magazine, December 1999.
[16]. P. B. Liwen He, "Liwen HPure MPLS TechnologyThe Third International Conference on Availability, Reliability and Security,
IEEE," in The Third International Conference on Availability, Reliability and Security, IEEE, 2008.
[17]. A. H. a. B. B. Xipeng Xiao, "Traffic Engineering with MPLS in the Internet," in Global Center Inc. Lionel M, NI, Michigan State
University., 2001.
[18]. D. Wright, "Voice over MPLS Compared to Voice over Other Packet Transport Technologies," in IEEE Communications
Magazine, November 2002.
[19]. U. L. a. L. Lobo, "MPLS Configuration on Cisco IOS Software," in Cisco Press, Oct 17,2005, Copy right 2006.
[20]. L. D. Ghein, MPLS Fundamentals, Cisco Press , November 2006, Copy right 2007.
[21]. J. Reagan, Cisco CCIP MPLS Study Guide” Copy rights 2002 Sybex Inc, Sybex Inc, Copy rights 2002.

More Related Content

What's hot

Broome Honours Paper
Broome Honours PaperBroome Honours Paper
Broome Honours PaperDerek Broome
 
Topic 7 Digital Technique Fiber optics
Topic 7 Digital Technique Fiber opticsTopic 7 Digital Technique Fiber optics
Topic 7 Digital Technique Fiber opticsBai Haqi
 
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Pradeep Singh
 
Optical Fiber communication
Optical Fiber communicationOptical Fiber communication
Optical Fiber communicationEklavya Singh
 
Body third generation of fiber optic communication systems
Body third generation of fiber optic communication systemsBody third generation of fiber optic communication systems
Body third generation of fiber optic communication systemsMohammad Jahangir Hosen Bhuiyan
 
Performance evaluation of VLC system using new modulation approach
Performance evaluation of VLC system using new modulation approachPerformance evaluation of VLC system using new modulation approach
Performance evaluation of VLC system using new modulation approachjournalBEEI
 
Performance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkPerformance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkijwmn
 
Merits of optical fiber n fiber optic link
Merits of optical fiber n fiber optic linkMerits of optical fiber n fiber optic link
Merits of optical fiber n fiber optic linkRauf Wani
 
IRJET- Under Water Optical Wireless Communication
IRJET- Under Water Optical Wireless CommunicationIRJET- Under Water Optical Wireless Communication
IRJET- Under Water Optical Wireless CommunicationIRJET Journal
 
Fiber optics communication & Technology
Fiber optics communication & TechnologyFiber optics communication & Technology
Fiber optics communication & TechnologyPrateek Kumar
 
Lights Fantastic: The Current State of Fiber Optics
Lights Fantastic: The Current State of Fiber OpticsLights Fantastic: The Current State of Fiber Optics
Lights Fantastic: The Current State of Fiber Opticsexperior
 
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...IOSRJECE
 
Fiber Optics Course
Fiber Optics Course Fiber Optics Course
Fiber Optics Course Ahmed OM
 
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...IOSR Journals
 
IRJET- Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...
IRJET-  	  Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...IRJET-  	  Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...
IRJET- Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...IRJET Journal
 
Connectors coupler-fdf
Connectors coupler-fdfConnectors coupler-fdf
Connectors coupler-fdfBala V
 
OPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONOPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONubhatia7
 

What's hot (20)

40120130405008
4012013040500840120130405008
40120130405008
 
Broome Honours Paper
Broome Honours PaperBroome Honours Paper
Broome Honours Paper
 
Topic 7 Digital Technique Fiber optics
Topic 7 Digital Technique Fiber opticsTopic 7 Digital Technique Fiber optics
Topic 7 Digital Technique Fiber optics
 
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
 
I017446164
I017446164I017446164
I017446164
 
Optical Fiber communication
Optical Fiber communicationOptical Fiber communication
Optical Fiber communication
 
Body third generation of fiber optic communication systems
Body third generation of fiber optic communication systemsBody third generation of fiber optic communication systems
Body third generation of fiber optic communication systems
 
Performance evaluation of VLC system using new modulation approach
Performance evaluation of VLC system using new modulation approachPerformance evaluation of VLC system using new modulation approach
Performance evaluation of VLC system using new modulation approach
 
Performance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless networkPerformance and interference analysis of 802.11 g wireless network
Performance and interference analysis of 802.11 g wireless network
 
Merits of optical fiber n fiber optic link
Merits of optical fiber n fiber optic linkMerits of optical fiber n fiber optic link
Merits of optical fiber n fiber optic link
 
IRJET- Under Water Optical Wireless Communication
IRJET- Under Water Optical Wireless CommunicationIRJET- Under Water Optical Wireless Communication
IRJET- Under Water Optical Wireless Communication
 
Fiber optics communication & Technology
Fiber optics communication & TechnologyFiber optics communication & Technology
Fiber optics communication & Technology
 
Lights Fantastic: The Current State of Fiber Optics
Lights Fantastic: The Current State of Fiber OpticsLights Fantastic: The Current State of Fiber Optics
Lights Fantastic: The Current State of Fiber Optics
 
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
Optimum Location of EDFA based on Eye Diagram, Q-factor and Bit Error Rate Me...
 
Fiber Optics Course
Fiber Optics Course Fiber Optics Course
Fiber Optics Course
 
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...
 
IRJET- Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...
IRJET-  	  Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...IRJET-  	  Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...
IRJET- Enhancing the Efficiency of Licenced Spectrum Sharing in 5G Hetero...
 
Connectors coupler-fdf
Connectors coupler-fdfConnectors coupler-fdf
Connectors coupler-fdf
 
OPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONOPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATION
 
Ppt.final.phd thesis
Ppt.final.phd thesisPpt.final.phd thesis
Ppt.final.phd thesis
 

Viewers also liked

Pengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNPengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNlegalservice
 
Conoscere l'editoria 1
Conoscere l'editoria 1Conoscere l'editoria 1
Conoscere l'editoria 1Cosi Repossi
 
Impacto de la tegnologia en la sociedad
Impacto de la tegnologia en la sociedadImpacto de la tegnologia en la sociedad
Impacto de la tegnologia en la sociedadPARDOHERMES
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.comGudeer Kitty
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebEstevam Hruschka
 
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...IOSR Journals
 
Operations Semester Objectives
Operations Semester ObjectivesOperations Semester Objectives
Operations Semester ObjectivesMichael Warr
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.comGudeer Kitty
 

Viewers also liked (20)

MEREK PATENT
MEREK PATENT MEREK PATENT
MEREK PATENT
 
Pengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNPengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDN
 
Conoscere l'editoria 1
Conoscere l'editoria 1Conoscere l'editoria 1
Conoscere l'editoria 1
 
Impacto de la tegnologia en la sociedad
Impacto de la tegnologia en la sociedadImpacto de la tegnologia en la sociedad
Impacto de la tegnologia en la sociedad
 
NPIK JAGUNG
NPIK JAGUNGNPIK JAGUNG
NPIK JAGUNG
 
Service graphics 2015
Service graphics 2015Service graphics 2015
Service graphics 2015
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.com
 
L010338894
L010338894L010338894
L010338894
 
R010229096
R010229096R010229096
R010229096
 
A012540108
A012540108A012540108
A012540108
 
F010424451
F010424451F010424451
F010424451
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the Web
 
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...
Effects Of Heat Source And Thermal Diffusion On An Unsteady Free Convection F...
 
G1303054353
G1303054353G1303054353
G1303054353
 
M017657678
M017657678M017657678
M017657678
 
Operations Semester Objectives
Operations Semester ObjectivesOperations Semester Objectives
Operations Semester Objectives
 
I1303025763
I1303025763I1303025763
I1303025763
 
D018121824
D018121824D018121824
D018121824
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.com
 
Ouranos hemeljesuschristus
Ouranos hemeljesuschristusOuranos hemeljesuschristus
Ouranos hemeljesuschristus
 

Similar to G010314853

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingIJARIIT
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)mashiur
 
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAllan Kweli
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfHuynh MVT
 
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingApproach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET Journal
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 

Similar to G010314853 (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
my project publication
my project publicationmy project publication
my project publication
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Vp ns
Vp nsVp ns
Vp ns
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS NetowrksAuto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
 
mpls-lecture.pdf
mpls-lecture.pdfmpls-lecture.pdf
mpls-lecture.pdf
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdf
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingApproach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
 
L347176
L347176L347176
L347176
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
Mpls
MplsMpls
Mpls
 
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

G010314853

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org DOI: 10.9790/2834-10314853 www.iosrjournals.org 48 | Page Implementing VPN over MPLS Engr. Awais Khan1 , Prof. Dr. Inayatullah Khan Babar2 1 (Department of Electrical Engineering, University of Engineering & Technology, Peshawar, Pakistan) 2 (Department of Electrical Engineering, University of Engineering & Technology, Peshawar, Pakistan) Abstract: Now a day’s communication network and its services are migrating slowly towards new and upgraded versions. Multi-Protocol label Switching (MPLS) is a key feature in new technology and it delivers new services from old network to a new network during migration and it has totally focused on new network topology. MPLS is capable of providing secure and reliable connection for costumers through Multi-Protocol Label Switching Virtual Private Network (MPLS VPN). This thesis describes the requirements and motivation for using MPLS VPN as a data center inter-connects technology. A comparison of Traditional VPN has been made with that of MPLS VPN and also VPN has been implemented over MPLS using Graphical Network Simulator GNS3. MPLS technology is being used widespread in the Service Provider (SP) networks for the deployment of residential, business, and mobile services. Keywords: Multi-protocol Label Switching (MPLS), Virtual Private Network (VPN), Virtual Routing and Forwarding (VRF), Label Switched Path (LSP) I. Introduction In the last 15 years there are many different technologies used in transmission of network traffic from source to destination. Asynchronous Transfer Mode (ATM), Frame Relay, and PPP were included in these technologies. They are all useful and having their own benefits but there are some difficulties when these are being internetworked. In parallel to using these technologies research was made by many companies to find the alternate of these technologies because current technologies are so expensive. Out of these technologies some new ideas were developed by Cisco System regarding Tag switching, which was later became a standard known as Multi-Protocol Label Switching (MPLS).[1] MPLS works on the basis of label switching. We assign a unique and independent label to every data packet and then these packets are routed and switched through the network on the basis of these labels. These labels are contained in the header of each packet and are overlooked by networking devices when processing and forwarding packets. This idea of label switching is being used for long in data communication industry. Frame Relay, X.25 and ATM are some example of label switching technologies which are in use since long. So the journey towards MPLS is really now in fast pace. As we know that ATM, Frame Relay and IP etc. can be easily and transparently carried through MPLS networks for the end user. Apart from large networks, MPLS is also now in use in large enterprise networks of organization such as Business companies, government organizations, hospitals, call centers and many more. II. Multiprotocol Label Switching MPLS (Multiprotocol Label Switching) is a standard networking technology in which packets are forwarded through the network based on label attached to these packets. Adjacent routers in MPLS network advertise labels among themselves and hence make peer to peer mapping. IP packets are forwarded by looking at the labels attached to these packets and not by looking into the destination IP addresses, so we can say that packet forwarding is by label switching instead of IP switching [4]. III. Packet Flow in an MPLS Network Figure 1 shows a common MPLS network and its components. The devices inside the boundary of provider network are the components of MPLS network. All the data packets passing through this cloudily MPLS network are label based. The customer traffic outside this cloud are not label based, it may be IP based etc. The customer owned Customer Edge (CE) routers (as shown in figure Site 1, Site 2 and Site 3) whose interface is connected to label edge router (LER) or Provider Edge (PE) routers which are in domain of the Service Provider. Why PE routers known as LER? Because it add label to the incoming (ingress) traffic when enter into the MPLS network, and then remove the label on outgoing (egress) traffic when packets move out of the MPLS networks. Within the MPLS cloud, the behavior of PE router is like LSRs (label switches routers) because it switches packets from one node to the next looking into its labels.
  • 2. Implementing VPN over MPLS DOI: 10.9790/2834-10314853 www.iosrjournals.org 49 | Page Figure: 1 Service Provider MPLS Network [20] IV. Virtual Private Network A VPN is a private network over a public or shared network in such a way as they are directly connected. In VPN, different features like management, security etc of a private network can be attained over a public network. In VPN different sites of costumers are connected but they are inaccessible from others costumer’s sites. The VPN normally is used for one company and then several sites of that company to be connected through the common/ public service provider network. The advantage of VPNs is to allow remote locations of different costumers to be securely connected over a public networks, and hence the costumer do not need to buy dedicated network lines [5]. V. MPLS VPN Routing The correct routing information should be updated for the VPNs in routing and forwarding (VRF) table of PE. The routing topology information for different VPNs needs to be populated in separate VRFs. This split- up is obtained by addition of an identifier called route distinguisher to general IP route advertisements. RDs are eight byte chunks that is present ahead of IPV4 address route advertisements. RD for every VRF should be distinct. A route distinguisher may be representing as 100:25. Where 100 denote ASN of that particular service provider while 25 represents any specific VRF. Now this RD is distinct for all the customer’s VRF and when there are many VRFs and they may have gone through different service provider’s network, they are still recognizable through the help of these RDs. [6]. Routing updates accomplished with BGP. iBGP or interior BGP with MPLS extension is used for communication among PE routers. BGP updates among routers are based on incoming and outgoing routing plans which is configured on these nodes. [7]. Route Distinguisher = (type + ASN + Assigned number) VPN IP Address = Route Distinguisher + IPv4 Address VI. Implementation Now a basic MPLS VPN will be configured as shown in the below Figure 5.1 in which a simple MPLS VPN model with serving two sites of a customer. For this purpose The Graphical Network Simulator (GNS3) software has been used, it is an open source software and is very powerful tool for networks. It runs virtual routers with real IOS. Figure 2 Lab Topology of VPN MPLS
  • 3. Implementing VPN over MPLS DOI: 10.9790/2834-10314853 www.iosrjournals.org 50 | Page As a review,  P or Provider routers are present at the core of MPLS network; they run MPLS protocols and have no direct connection with the customer NEs.  PE or Provider Edge routers are at the boundary of MPLS cloud and are links with P router at one end and with customer node at other end and all VPN services are configured at PEs.  CE or Customer Edge router is placed at the boundary of customer network and is not running MPLS.  An Interior gateway protocol (i.e. OSPF) is running between P and PE which also helps in LDP and BGP adjacencies inside the network.  MP-BGP is running between PEs only.  An Interior gateway protocol like OSPF is also running b/w CE & and its corresponding PE. In the above topology, OSPF has been used separately in the provider network & on CE. We will perform following steps in order to get the functionality of MPLS VPN. 1. To enable MPLS on all routers in provider backbone network. 2. To build VRFs & allocate them for the routing interfaces. 3. To construct MP-BGP among PEs. 4. To configure OSPF b/w every PE and it’s connected CE router. 5. And finally to enable route redistribution b/w customer sites and the provider network First we will do the basic configurations of all the routers and assigning addresses as per Figure 1 Then, an Interior gateway protocol like Open Shortest Path First (OSPF) has been run on the routers of provider network i.e. on PE1, P and PE2. Figure 4 Running OSPF on PE1 Router Now we will to run MPLS on Router PE1, P and PE2. Figure 5 Running MPLS on PE1 Router Create Virtual routing and forwarding (VRF) between PE1 & CE1 Figure 6 VRF Configuration (PE1 to CE1) Similarly between PE2 and CE2
  • 4. Implementing VPN over MPLS DOI: 10.9790/2834-10314853 www.iosrjournals.org 51 | Page Figure 7 VRF Configuration (PE2 to CE2) MP-BGP need to be configured for the VRF advertisement among PEs. It support multiple address family e.g. ipv6 or ipv4. Only PE routers run MP-BGP while the P routers only use MPLS and OSPF etc for packets forwarding with the SP network. Figure 8 MP-BGP Configuration on PE1 towards PE2 Figure 9 MP-BGP Configuration on PE2 towards PE1 We can see the console message that MP-BGP neighbor ship is made b/w PE1 & PE2. Now OSPF will be configured between PE & connected CE
  • 5. Implementing VPN over MPLS DOI: 10.9790/2834-10314853 www.iosrjournals.org 52 | Page Similarly OSPF will be configured between PE2 and CE2. Now in the last step we will redistribute routes b/w customer sites and Service Provider network. So first we will redistribute OSPF 2 into BGP. And then we will redistribute BGP into OSPF 2 VII. Results/ Analysis Thus Routing Tables of Router CE1 and CE2 have been completely converged, as we can see all the routes of CE2 visible/accessible in CE1.
  • 6. Implementing VPN over MPLS DOI: 10.9790/2834-10314853 www.iosrjournals.org 53 | Page Similarly all the routes of CE1 are visible/ accessible in CE2 as shown below. Hence the VPN has been successfully implemented over MPLS in the given scenario. VIII. Conclusion The advantages of MPLS VPN are so diverse i.e. it is easily manageable (addition or deletion of a new sites just require the connectivity/ configuration of a customer site with the PE router), secure (since a separate VRF is maintained for each customer site, hence there no chance of security breach as all the customers are well segregated) and scalable (no complete mesh between customer sites is required), so it is now the need of service provider to implement. Its ability of combining the plus points of overlay & peer to peer VPN model makes it the priority solution by ISPs to offer their services to the customers. Traffic engineering, QoS are the additional features of using MPLS network, also management of network including addition or deletion of new sites is extremely easy. In the near future all traditional VPN technologies will soon be replaced with MPLS VPN, due to its flexibility, fast routing & switching and more secure features. References [1]. J. t. Johnson, "Five reason to move to MPLS (Multi protocol Label Switching)," Network World, 29 March 2007. [2]. L. Paulson., "Using MPLS to unify multiple network types," Computer ,sponsored by IEEE computer society , vol. 37, no. 5, pp. 15-17, 2004. [3]. S. G. K. N. a. P. P. Veni, "Performance analysis of network traffic behavior in conventional network over MPLS," in Communication Control and Computing Technologies, 2010. [4]. W. G. Hannes Gredler, "Traffic Engineering and MPLS", the Complete IS-IS Routing Protocol,," 2005. [5]. F. Palmieri, "Evaluating MPLS VPN against traditional approaches," in Eighth IEEE Symposium on Computers and Communications (ISCC’03), June 30, 2003. [6]. D. H. F. Badran, "Service Provider Networking Infrastructures with MPLS," in Sixth IEEE Symposium on Computers and Communications (ISCC'01), July 05, 2001. [7]. R. Pulley, "Implementing VPNs Using MPLS," in Proceedings of MPLS Forum, 2000. [8]. L. M. G. Heron, "An Architecture for L2VPNs," in IETF draft: draft-ietf-ppvpn-12vpn-00.txt, 2001. [9]. S. Previdi, "Introduction to MPLS-BGP-VPN," in Proceedings of MPLS Forum , 2000. [10]. R. Y. Rosen E, "RFC 4364 BGP/MPLS IP Virtual Private Networks (VPNs)," in RFC 4364, IETF, 2006. [11]. I. P. J. Guichard, "MPLS and VPN Architectures," Cisco Press, 2000. [12]. R. Venkateswaran, "Virtual Private Networks," in IEEE Potentials, Mar. 2001. [13]. V. Alwayn, "Advanced MPLS Design and Implementation," Cisco Systems, 2002. [14]. A. Y. S. V. C. Mahesh Kr. Porwal., "Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic distribution in OSPF and MPLS," in International Conference on Emerging Trends in Engineering and Technology, ICETET, July, 2008. [15]. D. O. Awduche, "MPLS and Traffic Engineering in IP Networks," in IEEE Communications Magazine, December 1999. [16]. P. B. Liwen He, "Liwen HPure MPLS TechnologyThe Third International Conference on Availability, Reliability and Security, IEEE," in The Third International Conference on Availability, Reliability and Security, IEEE, 2008. [17]. A. H. a. B. B. Xipeng Xiao, "Traffic Engineering with MPLS in the Internet," in Global Center Inc. Lionel M, NI, Michigan State University., 2001. [18]. D. Wright, "Voice over MPLS Compared to Voice over Other Packet Transport Technologies," in IEEE Communications Magazine, November 2002. [19]. U. L. a. L. Lobo, "MPLS Configuration on Cisco IOS Software," in Cisco Press, Oct 17,2005, Copy right 2006. [20]. L. D. Ghein, MPLS Fundamentals, Cisco Press , November 2006, Copy right 2007. [21]. J. Reagan, Cisco CCIP MPLS Study Guide” Copy rights 2002 Sybex Inc, Sybex Inc, Copy rights 2002.