The document summarizes a point-to-multipoint virtual private LAN service (VPLS) network testbed setup that uses auto-bandwidth allocation over MPLS traffic engineered tunnels. Key steps include:
1) Establishing pseudowires between provider edge routers using Border Gateway Protocol for auto-discovery and Label Distribution Protocol for signaling.
2) Configuring two VPLS instances on the provider edge routers to emulate LAN connectivity for different customer sites.
3) Creating MPLS-TE tunnels between provider edge routers using constraints-based routing and OSPF, which the pseudowires utilize.
4) Enabling auto-bandwidth allocation over the MPLS-TE tunnels to dynamically
This document provides an overview of Generalized Multi-Protocol Label Switching (GMPLS) and describes implementations of GMPLS research testbeds. It begins with an introduction to MPLS and GMPLS fundamentals, including MPLS protocols, extensions made by GMPLS, and the history and functions of both. It then discusses specific GMPLS implementations, providing an overview of research testbeds and the DRAGON/HOPI architecture. Finally, it covers connecting to GMPLS research and education networks.
This document discusses quality of service (QoS) in Multiprotocol Label Switching (MPLS) networks. It uses OPNET simulator to analyze an MPLS network. MPLS involves assigning labels to packets to identify their path through the network. This allows traffic engineering and QoS by directing different packet streams along different labeled switch paths. The document examines MPLS architecture, operation in different encapsulation modes, routing using hop-by-hop or explicit paths, and the MPLS header format including labels. It aims to evaluate QoS performance in MPLS networks using simulation.
It is considered to be the most perfect solution to address the most recently faced problems in present-day networks such as
“Routing, scalability, quality of service engineering management, traffic engineering”
This white paper discusses next-generation packet-based transport networks (PTN) with a focus on MPLS technologies. It describes how MPLS allows for cost-efficient routing of traffic in core networks and how it is used to deliver layer 3 and layer 2 VPN services. The paper also discusses layer 3 VPNs, layer 2 VPNs, virtual private wire service (VPWS), and virtual private LAN service (VPLS) as the major components of layer 2 VPNs delivered over MPLS networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
GMPLS extends MPLS to manage additional interface types beyond packet interfaces, such as TDM, wavelength switching, and fiber switching. It allows for establishing connection-oriented LSPs and provides routing, resource discovery, connection management, and restoration functions. GMPLS supports various interface types including packet, TDM, wavelength, and fiber switching. It faces challenges around routing, signaling, and management due to the large number of links and long setup times involved in photonic networks.
The document discusses issues with using TCP in ad hoc wireless networks and proposes solutions:
- TCP was designed for wired networks and faces challenges in ad hoc wireless networks due to characteristics like interference, dynamic topology, and packet loss.
- Existing TCP extensions and new transport protocols have been proposed to address issues like induced traffic, unfairness, power constraints, and congestion misinterpretation in ad hoc wireless networks.
- Solutions include splitting TCP functionality, adding awareness of lower layer conditions, and separating reliability, flow control and congestion control.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document provides an overview of Generalized Multi-Protocol Label Switching (GMPLS) and describes implementations of GMPLS research testbeds. It begins with an introduction to MPLS and GMPLS fundamentals, including MPLS protocols, extensions made by GMPLS, and the history and functions of both. It then discusses specific GMPLS implementations, providing an overview of research testbeds and the DRAGON/HOPI architecture. Finally, it covers connecting to GMPLS research and education networks.
This document discusses quality of service (QoS) in Multiprotocol Label Switching (MPLS) networks. It uses OPNET simulator to analyze an MPLS network. MPLS involves assigning labels to packets to identify their path through the network. This allows traffic engineering and QoS by directing different packet streams along different labeled switch paths. The document examines MPLS architecture, operation in different encapsulation modes, routing using hop-by-hop or explicit paths, and the MPLS header format including labels. It aims to evaluate QoS performance in MPLS networks using simulation.
It is considered to be the most perfect solution to address the most recently faced problems in present-day networks such as
“Routing, scalability, quality of service engineering management, traffic engineering”
This white paper discusses next-generation packet-based transport networks (PTN) with a focus on MPLS technologies. It describes how MPLS allows for cost-efficient routing of traffic in core networks and how it is used to deliver layer 3 and layer 2 VPN services. The paper also discusses layer 3 VPNs, layer 2 VPNs, virtual private wire service (VPWS), and virtual private LAN service (VPLS) as the major components of layer 2 VPNs delivered over MPLS networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
GMPLS extends MPLS to manage additional interface types beyond packet interfaces, such as TDM, wavelength switching, and fiber switching. It allows for establishing connection-oriented LSPs and provides routing, resource discovery, connection management, and restoration functions. GMPLS supports various interface types including packet, TDM, wavelength, and fiber switching. It faces challenges around routing, signaling, and management due to the large number of links and long setup times involved in photonic networks.
The document discusses issues with using TCP in ad hoc wireless networks and proposes solutions:
- TCP was designed for wired networks and faces challenges in ad hoc wireless networks due to characteristics like interference, dynamic topology, and packet loss.
- Existing TCP extensions and new transport protocols have been proposed to address issues like induced traffic, unfairness, power constraints, and congestion misinterpretation in ad hoc wireless networks.
- Solutions include splitting TCP functionality, adding awareness of lower layer conditions, and separating reliability, flow control and congestion control.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document discusses optimizing thresholds for Priority Flow Control (PFC) in long-range Fibre Channel over Ethernet (FCoE) links. It analyzes the performance of PFC and Converged Enhanced Ethernet (CEE) to achieve a lossless Ethernet-based storage area network (SAN) at lower cost than traditional Fibre Channel technologies. Specifically, it provides an analytical model for optimal PFC thresholds that regulate flow control and evaluates how link distance affects buffer requirements of FCoE switches in metropolitan area networks. The model is then validated through simulation.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document describes a proposed method for improving data transmission reliability in MPLS ring networks. Key points:
- It proposes adding "save points" at equal distances between nodes that would store transmission information and direct communication to a backup path if a disruption is detected.
- The network would maintain two independent paths - a main data path and backup path. If a disruption occurs, the nearest save point would inform sources to stop using the main path and retransmit over the backup path.
- This approach aims to reduce packet loss compared to existing methods by avoiding needing to re-route data over the entire network if an issue occurs near the destination node.
The proposed method is evaluated through simulation to analyze its impact
VPNs, Tunneling, and Overlay Networks
Virtual private networks (VPNs) allow private networks to be extended over public networks like the internet. VPNs provide benefits like extended communication, reduced costs, and improved productivity. There are two main types of VPNs: remote-access VPNs which connect users to a private network from various locations, and site-to-site VPNs which connect organizations' remote sites into a private network or allow organizations to share environments. Tunneling protocols like PPP and protocols like IPsec are used to securely encapsulate and transmit data across VPNs. Multiprotocol Label Switching (MPLS) and overlay networks are additional methods to improve network performance and security.
This document reviews Network-on-Chip (NoC) architectures that prioritize selected data streams to reduce communication latency. It categorizes the architectures based on the effect of prioritization (per end-to-end connection, per router, or per path segment) and discusses their pros and cons. Architectures that prioritize at the core-to-core level provide the highest latency reduction by bypassing the NoC, while those prioritizing per router or path segment require redetermining priority at each hop.
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
This document compares the performance of three routing protocols - AODV, DSDV, and OLSR - under the random waypoint mobility model using network simulation. Simulation results with 30 and 50 nodes found that OLSR performed better than AODV and DSDV in terms of packet receive rate and packets received with 30 nodes and a simulation time of 100 seconds. DSDV performed better than the other protocols with 50 nodes and a simulation time of 200 seconds. Overall, AODV showed the poorest performance in both scenarios. The document analyzes these routing protocols and the random waypoint mobility model to evaluate their performance under different parameters.
Admission control for multihop wireless backhaul networks with qo sPfedya
This document proposes several schemes for admission control of connections with quality of service (QoS) requirements over a multihop wireless backhaul network. It first constructs tree topologies connecting wireless backhaul nodes to a wired gateway. It then admits either the best subset of connections while respecting their rate and delay requirements, or admits all connections with appropriate degradation of their QoS requirements. The key contributions are addressing both rate and delay requirements for connections, which has not been done before for wireless backhauls, and providing algorithms for admission control that deterministically guarantee delays.
The document discusses packet switching networks and their topology at different levels from LANs to the Internet. Packet switching allows for connectionless and connection-oriented transfer of information. The network layer provides minimum services like routing and addressing to transport data between end systems. Switches like routers and bridges connect different networks and allow information to be shared globally.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
1. The document discusses the WAP (Wireless Application Protocol) architecture and its components for enabling wireless internet access on mobile devices. It includes protocols like WDP, WTLS, WSP, and WML.
2. The WAP architecture consists of a transport layer, security layer, transaction layer, session layer, and application layer. It maps to internet protocols like TCP/IP, TLS, and HTTP to provide similar functionality to mobile devices.
3. Special adaptations were required for the wireless environment, including new protocols like WML, a binary version of HTML, and WTA for wireless telephony integration. Gateways translate between internet protocols and WAP to enable access of web and other internet content on mobile
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
The document provides an overview of MPLS for traffic management. It discusses how MPLS improves on conventional IP networks and ATM by allowing traffic engineering through label switching. Key topics covered include MPLS components, terminology, dynamic LSP setup using RSVP signaling, traffic trunks, and deployment strategies. The goal of MPLS traffic engineering is to increase resource utilization and speed up network convergence.
This document discusses and compares layer-3 and layer-2 approaches to implementing IP/MPLS-based VPNs. MPLS layer-3 VPNs use a routed approach defined in RFC 2547, where customer routes are exchanged between provider edge (PE) routers using BGP. MPLS layer-2 VPNs can provide point-to-point or multi-point connectivity using virtual circuits or virtual private LAN service. The document evaluates aspects of each approach like supported traffic, scalability, and complexity to help service providers determine the best fit for their network.
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
The document proposes improvements to the AODV routing protocol in mobile ad hoc networks to enhance quality of service. It introduces two techniques: 1) Using a dynamic time-to-live value rather than a fixed value to establish connections over longer routes. 2) Implementing a varying queue length technique where the queue size increases instead of dropping packets if the node buffer is full, to minimize packet loss. The performance of the improved AODV protocol is evaluated based on metrics like packet delivery ratio, routing overhead, and throughput, and shows better results compared to the normal AODV protocol.
Frame Relay is a packet switching technology that was developed to improve on X.25 networks. It uses virtual circuits to transfer user data in frames more efficiently than X.25 by eliminating much of the overhead and removing hop-by-hop flow and error control. Frame Relay networks operate at the data link layer and use logical connections identified by a Data Link Connection Identifier to multiplex and switch user data frames, while call setup and teardown is handled on a separate control channel.
Frame Relay is a packet-switching protocol used to transmit data over wide area networks in an efficient manner. It segments data into variable length frames and leaves error correction to end points, allowing for faster transmission. Frame Relay provides permanent virtual circuits to make connections appear dedicated while allowing dynamic routing of frames.
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
In the real world one of the most important challenge for the broad implementation of mobile ad hoc network (MANET) technology is the finding way to capably interconnect them with the Internet. Yet, such interconnections are very difficult due to differences in mobility, addressing and routing between MANETs and reside IP networks. Imprecise address and routing techniques are hard to integrate. In this paper we propose the half tunnels as a powerful transition technique to integrate various networks. In this paper, we will also discuss some existing solutions like default routes host route etc to interconnect MANETs with the Internet, but on analysis we find them lacking in robustness and flexibility. For example, many solutions do not consider the presence of multiple gateways, and in such scenarios they either fail, or are less efficient due to the lack of multi-homing capabilities.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document discusses optimizing thresholds for Priority Flow Control (PFC) in long-range Fibre Channel over Ethernet (FCoE) links. It analyzes the performance of PFC and Converged Enhanced Ethernet (CEE) to achieve a lossless Ethernet-based storage area network (SAN) at lower cost than traditional Fibre Channel technologies. Specifically, it provides an analytical model for optimal PFC thresholds that regulate flow control and evaluates how link distance affects buffer requirements of FCoE switches in metropolitan area networks. The model is then validated through simulation.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document describes a proposed method for improving data transmission reliability in MPLS ring networks. Key points:
- It proposes adding "save points" at equal distances between nodes that would store transmission information and direct communication to a backup path if a disruption is detected.
- The network would maintain two independent paths - a main data path and backup path. If a disruption occurs, the nearest save point would inform sources to stop using the main path and retransmit over the backup path.
- This approach aims to reduce packet loss compared to existing methods by avoiding needing to re-route data over the entire network if an issue occurs near the destination node.
The proposed method is evaluated through simulation to analyze its impact
VPNs, Tunneling, and Overlay Networks
Virtual private networks (VPNs) allow private networks to be extended over public networks like the internet. VPNs provide benefits like extended communication, reduced costs, and improved productivity. There are two main types of VPNs: remote-access VPNs which connect users to a private network from various locations, and site-to-site VPNs which connect organizations' remote sites into a private network or allow organizations to share environments. Tunneling protocols like PPP and protocols like IPsec are used to securely encapsulate and transmit data across VPNs. Multiprotocol Label Switching (MPLS) and overlay networks are additional methods to improve network performance and security.
This document reviews Network-on-Chip (NoC) architectures that prioritize selected data streams to reduce communication latency. It categorizes the architectures based on the effect of prioritization (per end-to-end connection, per router, or per path segment) and discusses their pros and cons. Architectures that prioritize at the core-to-core level provide the highest latency reduction by bypassing the NoC, while those prioritizing per router or path segment require redetermining priority at each hop.
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
This document compares the performance of three routing protocols - AODV, DSDV, and OLSR - under the random waypoint mobility model using network simulation. Simulation results with 30 and 50 nodes found that OLSR performed better than AODV and DSDV in terms of packet receive rate and packets received with 30 nodes and a simulation time of 100 seconds. DSDV performed better than the other protocols with 50 nodes and a simulation time of 200 seconds. Overall, AODV showed the poorest performance in both scenarios. The document analyzes these routing protocols and the random waypoint mobility model to evaluate their performance under different parameters.
Admission control for multihop wireless backhaul networks with qo sPfedya
This document proposes several schemes for admission control of connections with quality of service (QoS) requirements over a multihop wireless backhaul network. It first constructs tree topologies connecting wireless backhaul nodes to a wired gateway. It then admits either the best subset of connections while respecting their rate and delay requirements, or admits all connections with appropriate degradation of their QoS requirements. The key contributions are addressing both rate and delay requirements for connections, which has not been done before for wireless backhauls, and providing algorithms for admission control that deterministically guarantee delays.
The document discusses packet switching networks and their topology at different levels from LANs to the Internet. Packet switching allows for connectionless and connection-oriented transfer of information. The network layer provides minimum services like routing and addressing to transport data between end systems. Switches like routers and bridges connect different networks and allow information to be shared globally.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
1. The document discusses the WAP (Wireless Application Protocol) architecture and its components for enabling wireless internet access on mobile devices. It includes protocols like WDP, WTLS, WSP, and WML.
2. The WAP architecture consists of a transport layer, security layer, transaction layer, session layer, and application layer. It maps to internet protocols like TCP/IP, TLS, and HTTP to provide similar functionality to mobile devices.
3. Special adaptations were required for the wireless environment, including new protocols like WML, a binary version of HTML, and WTA for wireless telephony integration. Gateways translate between internet protocols and WAP to enable access of web and other internet content on mobile
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
The document provides an overview of MPLS for traffic management. It discusses how MPLS improves on conventional IP networks and ATM by allowing traffic engineering through label switching. Key topics covered include MPLS components, terminology, dynamic LSP setup using RSVP signaling, traffic trunks, and deployment strategies. The goal of MPLS traffic engineering is to increase resource utilization and speed up network convergence.
This document discusses and compares layer-3 and layer-2 approaches to implementing IP/MPLS-based VPNs. MPLS layer-3 VPNs use a routed approach defined in RFC 2547, where customer routes are exchanged between provider edge (PE) routers using BGP. MPLS layer-2 VPNs can provide point-to-point or multi-point connectivity using virtual circuits or virtual private LAN service. The document evaluates aspects of each approach like supported traffic, scalability, and complexity to help service providers determine the best fit for their network.
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
The document proposes improvements to the AODV routing protocol in mobile ad hoc networks to enhance quality of service. It introduces two techniques: 1) Using a dynamic time-to-live value rather than a fixed value to establish connections over longer routes. 2) Implementing a varying queue length technique where the queue size increases instead of dropping packets if the node buffer is full, to minimize packet loss. The performance of the improved AODV protocol is evaluated based on metrics like packet delivery ratio, routing overhead, and throughput, and shows better results compared to the normal AODV protocol.
Frame Relay is a packet switching technology that was developed to improve on X.25 networks. It uses virtual circuits to transfer user data in frames more efficiently than X.25 by eliminating much of the overhead and removing hop-by-hop flow and error control. Frame Relay networks operate at the data link layer and use logical connections identified by a Data Link Connection Identifier to multiplex and switch user data frames, while call setup and teardown is handled on a separate control channel.
Frame Relay is a packet-switching protocol used to transmit data over wide area networks in an efficient manner. It segments data into variable length frames and leaves error correction to end points, allowing for faster transmission. Frame Relay provides permanent virtual circuits to make connections appear dedicated while allowing dynamic routing of frames.
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
In the real world one of the most important challenge for the broad implementation of mobile ad hoc network (MANET) technology is the finding way to capably interconnect them with the Internet. Yet, such interconnections are very difficult due to differences in mobility, addressing and routing between MANETs and reside IP networks. Imprecise address and routing techniques are hard to integrate. In this paper we propose the half tunnels as a powerful transition technique to integrate various networks. In this paper, we will also discuss some existing solutions like default routes host route etc to interconnect MANETs with the Internet, but on analysis we find them lacking in robustness and flexibility. For example, many solutions do not consider the presence of multiple gateways, and in such scenarios they either fail, or are less efficient due to the lack of multi-homing capabilities.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Fair network bandwidth allocation in iaa s datacenters via a cooperative game...ieeepondy
Fair network bandwidth allocation in iaa s datacenters via a cooperative game approach
+91-9994232214,7806844441, ieeeprojectchennai@gmail.com,
www.projectsieee.com, www.ieee-projects-chennai.com
IEEE PROJECTS 2016-2017
-----------------------------------
Contact:+91-9994232214,+91-7806844441
Email: ieeeprojectchennai@gmail.com
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
The document discusses quality of service (QoS) in mobile ad hoc networks (MANETs). It covers several key topics:
1) The challenges of providing QoS in MANETs due to their dynamic and decentralized nature.
2) Different approaches to QoS classification and provisioning at various network layers. This includes MAC layer solutions like IEEE 802.11e and network layer solutions like QoS-aware routing protocols.
3) Specific QoS routing protocols discussed, including ticket-based, predictive location-based, and trigger-based distributed protocols.
Resource Allocation using ASK, FSK and PSK Modulation Techniques with varying Mchiragwarty
Satellite communication systems operate in the
presence of path loss and atmospherically induced fading,
which results in waveform distortion, altering phase and bit
time period. After penetrating through several atmospheric
layers, the signal experiences Doppler shift which results in
frequency change and phase reversal, thus to sync the
receiver to the incoming signal we make use of the Phase
Locked Loop (PLL) with a filter at its core functioning.
To recover and reconstruct the original signal, the use of
filter banks in the loop filter block of the PLL will be added
and discussed. The idea of using M-channel uniform filter
banks is to minimize the error by optimizing the
performance in decomposition and reconstruction of signals.
Using different types of fundamental coherent digital
modulation schemes like, M-ary Amplitude/Frequency
/Phase shift keying (MASK, MFSK, MPSK), the best
optimized solution can be determined for all M-channels for
high data rates and bandwidth constraints.
The presentation studies the design of a digital PLL system by
using a variable filter block for several digital modulation
schemes used in ground to space communication links. Two
basic designs will be developed, first model with a fixed set
of filters, those seen in traditional legacy systems and the
second model, which consist of a filtering block made up of
Quadrature Mirror Filter banks (QMF). The method is based
on the strength of the incoming signal and modulation
scheme, which in turn decides the number of filter banks, to
be used to recover the signal.
In this presentation, the focus on pseudo-adaptive nature of the
filter banks is to reconstruct the original signal, considering
the effects of Doppler shift for fast moving airborne
platforms. Subsequently, the comparison between the
performance of the fixed filter based architecture and the
additional design with the variable pseudo-adaptive filter
banks design includes the QMF and Discrete Cosine
Transform Filter banks (DCT). This will follow with the
software oriented simulation of the performance of the
proposed design method, in different scenarios experienced
in satellite links.
Report for Network Subject at my college at May,2017 and we were suppose to present the operation of MPLS inside the core network of the service provider while the costumer is using a VPN connection
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingIRJET Journal
This document discusses using intelligent packet scheduling algorithms in an IP over MPLS VPLS network. It proposes using fuzzy logic and neuro-fuzzy systems at label switched routers to schedule packets. The key contributions are: 1) Modeling the network topology in NS2 and defining parameters like link bandwidth and delay; 2) Developing fuzzy and neuro-fuzzy inference systems with input variables for packet scheduling; 3) Analyzing the training error of the neuro-fuzzy algorithm and comparing the fuzzy and neuro-fuzzy performance metrics based on trace file results. The goal is to evaluate how incorporating intelligence into packet scheduling can effectively optimize network performance and delivery of data in the MPLS VPLS network.
This document discusses implementing a virtual private network (VPN) over multi-protocol label switching (MPLS). It begins with an introduction to MPLS and how it works using label switching to route packets. It then discusses VPNs and how MPLS VPNs use separate routing tables called virtual routing and forwarding tables to isolate customer networks. The document demonstrates configuring an MPLS VPN using the GNS3 network simulator with two customer edge routers connecting two customer sites over an MPLS provider network. MPLS, VPNs, and the specific configuration steps are described. In the results section, the routing tables of the customer edge routers are shown to have routes from both customer sites, demonstrating that the MPLS VPN was successfully implemented to connect
This document discusses quality of service (QoS) in Multiprotocol Label Switching (MPLS) networks. It begins with an abstract that provides an overview of MPLS and how it can improve network traffic flow and management by assigning labels to packets. The document then analyzes an MPLS network using an OPNET simulator. It explores various aspects of MPLS including its architecture, forwarding process, labels, label switching paths and how routers distinguish between labeled and unlabeled frames. The goal is to evaluate QoS performance in MPLS networks.
Segment routing is a network technology focused on addressing the pain points of existing IP and Multiprotocol Label Switching (MPLS) networks in terms of simplicity, scale, and ease of operation. It’s a foundation for application engineered routing because it prepares the networks for new business models where applications can direct network behavior.
Segment routing seeks the right balance between distributed intelligence and centralized optimization and programming. It was built for the software-defined networking (SDN) era.
Segment routing enables enhanced packet forwarding behavior. It enables a network to transport unicast packets through a specific forwarding path, other than the normal shortest path that a packet usually takes. This capability benefits many use cases, and you can build those specific paths based on application requirements.
Segment routing uses the source routing paradigm. A node, usually a router but it can also be a switch, a trusted server, or a virtual forwarder running on a hypervisor, steers a packet through an ordered list of instructions, called segments. A segment can represent any instruction, topological or service-based. A segment can have a local semantic to a segment-routing node or global within a segment-routing network. Segment routing allows you to enforce a flow through any topological path and service chain while maintaining per-flow state only at the ingress node to the segment-routing network. To be aligned with modern IP networks, segment routing supports equal-cost multipath (ECMP) by design, and the forwarding within a segment-routing network uses all possible paths, when desired.
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
This document analyzes and compares the performance of MPLS-enabled networks and traditional IP networks. It discusses how MPLS protocol performs with OSPF protocol. Nine Cisco routers running IOS version 12.4 were used to test network performance with MPLS and traditional IP routing. The results show how service providers can benefit from MPLS services by increasing network latency and additional benefits obtained from MPLS. Key areas analyzed include latency, utilization in the network. MPLS networks offer benefits like traffic engineering, scalability, VPN services, and ability to carry layer 2 protocols over the MPLS core.
MPLS (Multi-Protocol Label Switching) simplifies packet forwarding by assigning labels to packets and using these labels for forwarding instead of long network addresses. It allows for traffic engineering and quality of service by establishing Label Switched Paths (LSPs) to direct different types of traffic over specific paths. MPLS supports various Layer 2 and Layer 3 protocols and improves network performance and scalability compared to traditional IP routing. It is widely used to implement virtual private networks (VPNs) across shared infrastructures.
Mpls vpn using vrf virtual routing and forwardingIJARIIT
Multi-Protocol Label Switching (MPLS) which was introduced by Internet Engineering Task Force (IETF) is
usually used in communication networks which started attracting all the internet service provider(ISP) networks with its
brilliant and excellent features that provide quality of services (QOS)and guarantees to traffic which carries data from one
network to another network directly through labels.
Virtual Private Network (VPN) is one of the highly useful MPLS applications which allow a service provider or a large enterprise
network to offer network Layer VPN services that guarantee and carries traffic securely and privately from customer’s one to
another through the service provider’s network. To support multiple customers that Customers Request for secure, reliable,
private and ultrafast connections over the internet MPLS VPN standards include the concept of a virtual router. This feature
called a VRF table. VRF or Virtual Routing and Forwarding technology that permit a router to have various routing table or
multiple VPN at the same time that they are located in the same router but they are independent and also the VRF feature in
VPN now allows different customers to use same IP addresses connected to the same ISP. A VRF exists inside a single MPLS
router and typically routers need at least one VRF for each customer attached to that particular router.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
1) GMPLS is an advanced protocol that automates provisioning of connections in multilayer networks including optical networks to improve efficiency.
2) GMPLS extends MPLS to support not just packet switching but also time-division multiplexing, fiber switching, and wavelength switching in optical networks.
3) The paper discusses applications of GMPLS technology for traffic engineering and provisioning connections to balance loads in multilayer networks including WDM optical networks.
Virtual circuits are connections over packet-switched networks that appear as dedicated physical links between devices. They are established through configuration and allow higher-level protocols to avoid dealing with packetization of data. While virtual circuits resemble circuit switching, factors like queue lengths and load can cause variable performance unlike dedicated circuits. Examples of protocols that provide virtual circuits include TCP, X.25, Frame Relay, and ATM. Virtual circuits can be either switched, established on demand, or permanent, preconfigured for repeated use.
This document discusses virtual leased lines and how MPLS can be used to provide them. It describes how MPLS can transport IP, layer 2 protocols, Frame Relay, and ATM in a point-to-point manner with quality of service guarantees. It outlines key Cisco MPLS technologies like traffic engineering, differentiated services traffic engineering, quality of service, fast reroute, and auto bandwidth allocation that enable building virtual leased line services with bandwidth, delay, and jitter guarantees.
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
This paper proposes a load balancing algorithm using fuzzy logic so that maximum Quality of Experience can
be achieved. Avoidance of congestion is one of the major performance objectives of traffic engineering in
MPLS networks. Load balancing can prevent the congestion caused due to inefficient allocation of network
resources. Another aspect of the network performance is Quality of Experience (QoE). QoE in
telecommunications terminology, it is a measurement used to determine how well that network is satisfying the
end user's requirements. The Mean Opinion Score (MOS) is an important factor in determining the QoE. MOS
is a measurement of the quality delivered by the network based on human perception at the destination end.
Specifically we can tell mean opinion score (MOS) provides a numerical indication of the perceived quality of
received media after compression and/or transmission.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
This document provides an introduction to Multi-Protocol Label Switching (MPLS), including its motivation, basic concepts, components, protocols, operation, advantages, and disadvantages. MPLS combines IP routing with ATM switching to address some of the limitations of IP routing, such as lack of quality of service, while being less complex and expensive than ATM. It works by assigning short, fixed-length labels to IP packets at the edge of the network which are then used for fast packet forwarding within the network core.
This document discusses MPLS VPN and its three main types: point-to-point VPNs using pseudowires to encapsulate traffic between two sites; layer 2 VPNs called VPLS that provide switched VLAN services across sites; and layer 3 VPNs known as VPRN that utilize VRF tables to segment routing for each customer using BGP. It describes how MPLS VPN works using CE, PE, and P routers to forward labeled packets through the provider network and pop the label at the destination PE to deliver the packet. Finally, it provides additional resources for learning more about MPLS VPN technologies.
this slide contains fundamental concept about VPLS protocol, according to the latest version of Cisco books and i taught it at IRAN TIC company.in the next slide, i upload attractive advanced feature about VPLS.
(Some of the pictures in this slide are borrowed from the wonderful site of my good friend Gokhan Kosem)
(www.ipcisco.com)
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
This document summarizes research on congestion and fairness issues in wireless mesh networks. The researchers found that:
1) Wireless mesh networks using CSMA/CA MAC protocols can experience "starvation", where one-hop flows receive most bandwidth while competing multi-hop flows receive almost nothing.
2) Through experiments on an operational urban mesh network, they confirmed starvation occurs and isolated that only a one-hop TCP flow coupled with a two-hop TCP flow is needed to induce it.
3) They developed an analytical model to understand the causes of starvation as the interaction of MAC-layer biases, congestion control loops, and penalties of switching between network states.
4) Their model suggests a "
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks (20)
Auto-Bandwidth Allocation in Multicast Aware VPLS Netowrks
1. Abstract-Traditionally, customers that preferred
transparent Ethernet segment connection between their
sites achieved it through bridging their geographically
dispersed sites using Ethernet of Internet Protocol
(EoIP) tunnels. However this presented the inefficient
usage of the service providers’ (SP) bandwidth due to the
IP header overheads. Virtual Private LAN Service
(VPLS) networks offer more efficient usage of
bandwidth as a network resource by using the frame
encapsulation techniques offered by the Multiprotocol
Label Switching (MPLS) protocol. For the SP and the
client to benefit from protocols such as MPLS, for
efficient bandwidth utilization, there has to be signaling
and discovery protocols namely Border Gateway
Protocol (BGP) and Label Distribution Protocol (LDP)
within the network. In this paper the mentioned
discovery and signaling protocols are used to establish a
multicast aware VPLS network. The VPLS network uses
MPLS traffic engineered (MPLS-TE) to control the
utilization of the available bandwidth through the use of
the auto-bandwidth management mechanism.
Index Terms - VPLS, MPLS, BGP, LDP, MPLS-TE.
I. INTRODUCTION
Virtual Private LAN Service (VPLS) is a Layer 2 Virtual
Private Network technology that uses Multiprotocol Label
Switching (MPLS) as its transport protocol to deliver
Ethernet services over a Service Provider network [1]. The
VPLS service is offered over an MPLS network, thereby
enabling clients/customers multipoint access/connectivity
over geographically dispersed areas. The multipoint nature
of VPLS implies that associated clients can directly connect
to each other in contrast to point-to-point where they’d be
connected over a hub, thus reducing transmission delay [2].
VPLS also known as Transparent LAN Service (TLS)
emulates a multipoint-to-multipoint (MP2MP) Local Area
Network (LAN) connection over dispersed areas by bridging
its domains over an MPLS network [3]. Customer sites’
remote LAN segments behave as a single LAN via VPLS
MP2MP interconnectivity [4].
VPLS offers Service Providers (SPs) and clients a wide
range of amenities utilizing the functionality of Ethernet
services and the flexibility of an MPLS core [3]. For
example, Ethernet offers throughput of up to 900GB, thus
high bandwidth throughput.
Multicast services are available to clients [5] and this is a
significant advantage to the SP in that the network is not
flooded with traffic packets to unknown destinations thereby
improving bandwidth utilization within the network.
MPLS advantages such as its reliability, flexibility, fast
re-routing and traffic engineering services are enjoyed by
VPLS users (SPs and customers). MPLS traffic engineering,
(MPLS-TE) tunnels can support reliable Quality-of-Service
(QoS) end-to-end [5], to facilitate efficient use of network
resources. Therefore the cost-effective advantage of the
Ethernet combined with the scalability, reliability and traffic
engineering of the Multiprotocol Label Switching (MPLS)
protocol offer VPLS customers better service delivery [6].
VPLS offers architectural simplicity to the service
provider (SP). The SP provides Layer 2 resource
connectivity to the enterprise clients who will themselves
govern the design of their IP and routing protocols [6].
VPLS is a type of Layer 2 VPN in which the Service
Provider (SP) provides participating clients with L2
connectivity and is not involved with the client’s Layer 3
network, this is advantageous to the SP [8].
The VPLS network is not subjected to geographical
constraints, thus customers may be spread over a Metro or
Wide area network and will appear as if they belong to a
single LAN connection [7].
Ethernet service such as “Plug and Play” is readily
available to VPLS clients. For example MAC switching and
learning which allows better bandwidth throughput
compared to traditional technologies like Asynchronous
Transfer Mode (ATM) and Frame Relay.
The use of MPLS-TE tunnels for management of
bandwidth in a network can be done manually or
automatically. By using the manual adjustment of the
reserved bandwidth in a network, may lead to some
inconsistencies especially depending on the applications that
are sensitive to fluctuations in bandwidth adjustment. For
example voice application requires a dedicated/non-
interrupted service end delivery therefore the bandwidth
management scheme in place must ensure that adjustments
do not interrupt the flow of traffic in the network [13]
In this design paper, the requirements needed to
establish/implement a VPLS network are introduced in
section 2. Section 3 brings forward a test bed setup in which
particular attention is focused on the creation of a point-to-
point (P2MP) VPLS network. In section 4, an evaluation of
the P2MP VPLS test bed setup and finally section 5 draws
conclusions and brings forward future works on the VPLS
test bed network. It should be noted that Mikrotik routers are
used in the implementation of this paper.
Auto-Bandwidth Allocation in Multicast Aware VPLS
Networks
Allan R. Kweli, Alexandru Murgu
University of Cape Town,
Department of Electrical Engineering
Cape Town, South Africa
(allan.kweli, Alexandru.Murgu)@uct.ac.za
2. II. VPLS REQUIREMENTS
As previously introduced, VPLS as an Ethernet service
instance bridges end-to-end LANs over an MPLS based
network [9] and thereby emulates a LAN connection [10].
VPLS has core components that are involved in emulating
an Ethernet type connection namely [RFC4761, RFC4762 &
RFC3031]:
a) Customer Edge Router (CE), Provides an Ethernet
interface between the customer's LAN and the
provider's core network. CEs are VPLS-unaware and
are placed at the customers’ premises.
b) Provider Edge Router (PE), encapsulates the Ethernet
frames into MPLS, forwards packet to outgoing
interface and vice versa. It is located at a service
provider's network and is connected to a customer edge
(CE) router directly. PEs are capable of running
signalling and routing protocols for Pseudowire (PW)
setup.
c) Pseudowires (PW) are bi-directional in nature and
consist of a pair of uni-directional MPLS Virtual
Circuits (VCs).
d) MPLS core. The routers in the core network known as
“Label Edge/Switching Routers” LERs/LSRs are
responsible for the encapsulation/de-capsulation and
switching of labels on frames traversing the MPLS
network between VPLS sites
VPLS networks also known as Transparent LAN Service
(TLS) offer specific customer sites emulated Ethernet LAN
connectivity [7] through forwarding and learning MAC
addresses in the Layer 2 domain [5]. VPLS further provides
multipoint connectivity to customer sites on the same VPLS
instance over a single Provider Edge (PE) node [5]. In so
doing, the geographically dispersed sites appear as if they
are connected to the same Ethernet LAN [5]. Frames
forwarded in a VPLS network are similar to the forwarding
mechanism within IEEE 802.1 in which there is self-
learning between MAC addresses and ports, thus frame
forwarding is MAC address based [2].
MPLS used as the transport protocol for VPLS provides
techniques such as loop detection, label swapping and frame
encapsulation [11] which enable Ethernet service creation
within the (VPLS) network.
To emulate Ethernet switching over an MPLS network,
the PE (Label Edge Router) routers establish tunnels to other
LERs to form paths to forward the encapsulated Ethernet
frames. The virtual circuits formed are referred to as
Pseudowires (PWs). RFC 4761 and RFC 4762 offer
mechanisms for signaling and forwarding VPLS frames over
a network. Once the PWs are created they use the pre-
existing label switched paths to interconnect. However with
the introduction of MPLS-TE tunnels, the PWs
automatically use the tunnels to emulate LAN connectivity.
MPLS-TE tunnels are established using LDP and are
independent of the services running over them, in this case
VPLS [7].
The mechanisms used in the establishment of PWs in a
VPLS network, which include;
a) Border Gateway Protocol (BGP) for Auto-discovery
and Signalling [RFC4761]
b) Label Distribution Protocol (LDP) for Signalling
[RFC4762]
In section 3, a VPLS P2MP test bed network is presented
showing the interaction between the nodes participating in a
single VPLS instance.
III. VPLS EXPERIMENTAL SETUP
The VPLS setup is an end-to-end (P2MP) network with
MPLS at its core and MAC access to its Ethernet interfaces.
RFC 6136 describes a VPLS network as an end-to-end
network that has an underlying MPLS core. Figure 1
represents a P2MP VLPS instance between two clients.
In Figure 1, CE nodes represent Client Edge while PE
nodes represent Provider Edge core routers respectively
based at the SP premises. DbC and RtC denote the database
clients and real-time clients respectively.
Database server
Real-time server
CE1
CE2
PE1
PE2
PE3
PE4
CE3
CE4
CE5
DbC1
DbC2
DbC3
RtC1
RtC2
CE6
CE7DbC – Database Client
RtC – Realtime Client
Figure 1: Point-to-Multipoint VPLS setup
In the setup of the VPLS P2MP network, it is paramount
to establish PWs in order to attain an emulated service [7].
PWs encapsulate protocol data units across the network
tunnels in order to archive a service imitation of a LAN
network [12]. There are assumptions set aside during the
design of the PWs required for the VPLS P2MP test bed
setup shown in Figure 1 above, these include [7]:
The Provider Edge (PE) routers are logic, fully meshed
with tunnels over which packets belonging to a VPLS
instance are encapsulated and forwarded.
The Label Switched Paths (LSP) tunnels are MPLS or
LDP.
The LSP tunnels are established independently.
Figure 1 also shows the establishment of a PW, it is to be
noted that the signaling protocols reserved for PW
establishment reside in the PE routers. In this design paper,
focus is placed on the control plane of the PE routers whose
main functions are Signaling and Auto-discovery [7].
Signaling and Auto-discovery between the routers
requires that loopback addressing and Open Shortest Path
First (OSPF) protocols are in place for the exchange of
routing information between the routers, these will be
discussed in section 4.
3. A. Label Distribution Protocol
LDP is suited to relatively smaller networks as compared
to those that deploy BGP for VPLS peer discovery.
Therefore for it is used for signaling and setting the MPLS
backbone over which VPLS is deployed. The MPLS
configuration is shown below.
The above enables MPLS on the network facing
interfaces of router PE1. The other PE routers are
configured in the same way but only have one enabled
MPLS interface. Reason being that they only have one
interface facing the network. Having enabled MPLS on the
routers, VPLS PWs based on BGP are setup.
B. Border Gateway Protocol
This is one in which participating PEs of a particular
VPLS instance are identified. In Figure 1, PE nodes 1, 2,
and 4 have two different VPLS instances running. The two
different VPLS instances belong to the different sets of
traffic i.e. from the database server and the real-time server.
As previously mentioned BPG has the capability of auto-
discovery and this is advantageous to the VPLS setup of
large networks. The command line code shown below
invokes the auto-discovery between PE1 and the other PE
routers.
Routers PE 2, 3 and 4 are configured in a similar way but
only remote with PE1. Once the PE routers are peering then
the VPLS instances are setup for the different sets of traffic.
This is shown below.
The created bridges, A and B, correspond to the two
different VPLS instances to which the clients belong.
Having established the two different VPLS instances,
MPLS-TE tunnels are configured.
C. MPLS-TE Tunnel Setup
MPLS-TE tunnels are established using LDP and are
independent of the services running over them, in this case
VPLS [7]. In the MPLS-TE tunnel setup constrained
shortest path first (CSPF) is for tunnel path selection and
open shortest path first (OSPF) is used to distribute TE
information. The MPLS-TE tunnels are created as shown
below.
Having established the MPLS-TE tunnel, the dynamically
created PWs use them to interconnect between the PE
routers. The traffic engineered tunnels facilitate the use of
auto-bandwidth management which in turn improves the
utilization of the available bandwidth.
D. Auto-Bandwidth Allocation
Using offline calculation to manage the bandwidth
allocation presents a problem of either under assignment or
over assignment of the bandwidth thus not efficiently
utilizing bandwidth. Therefore there is a need to use an
automatic bandwidth allocator that will respond to traffic
variations and optimally utilize the available bandwidth
[14], as illustrated in Figure 2.
0
200000
400000
600000
800000
1000000
1200000
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105
TrafficRate(Bit/s)
Time (Hrs.)
Reserved bandwidth
Highest possible
value
Highest
recorded value
after 1st
interval
New reserved
bandwidth
after 1st
interval
Time
interval
MPLS-TE tunnel
traffic rate
Figure 2: Auto-bandwidth allocation.
Benefits of using the auto-bandwidth approach to adjust
traffic rates in the LSP include [14]:
Offline calculation doesn’t support real-time traffic
adjustment, therefore may result to either over or
under assignment of bandwidth to the LSP.
On PE1
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.5 remote-as=65530 address-
families=l2vpn update-source=lobridge
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.6 remote-as=65530 address-
families=l2vpn update-source=lobridge
[admin@PE1] > routing bgp peer add remote-
address=10.255.255.7 remote-as=65530 address-
families=l2vpn update-source=lobridge
admin@PE1] > mpls ldp
[admin@PE1] /mpls ldp> set enabaled=yes lsr-
id=10.255.255.4 transport-address=10.255.255.4
[admin@PE1] > mpls ldp interface
[admin@PE1] /mpls ldp interface> add
interface=ether1
[admin@PE1] /mpls ldp interface> add
interface=ether2
[admin@PE1] /mpls ldp interface> add
interface=ether3
[admin@PE1] > interface bridge add name=A
[admin@PE1] > interface bridge add name=B
[admin@PE1] > interface bridge port add
interface=ether9 bridge=A
horizon=1
[admin@PE1] > interface bridge port add
interface=ether10 bridge=B horizon=1
[admin@PE1] > interface vpls bgp-vpls add
bridge=A bridge-horizon=1 route-
distinguisher=1:1
site-id=1 import-route-targets=1:1 export-
route-targets=1:1
[admin@PE1] > interface vpls bgp-vpls add
bridge=B bridge-horizon=1 route-
distinguisher=2:2
site-id=1 import-route-targets=2:2 export-
route-targets=2:2
[admin@PE3] > routing ospf instance set mpls-
te-area=backbone mpls-te-router-id=lobridge
[admin@PE3] > mpls traffic-eng interface add
interface=ether1 bandwidth=100000000
[admin@PE3] > mpls traffic-eng tunnel-path add
use-cspf=yes name=dynamic
[admin@PE3] > interface traffic-eng add
name=tepe3_to_pe1 bandwidth=83000000 primary-
path=dynamic from-address=10.255.255.6 to-
address=10.255.255.4 disabled=no record-
route=yes
[admin@PE3] > ip address add
address=10.99.99.6/30 interface=tepe3_to_pe1
[admin@PE3] > ip route add dst-
address=10.10.0.1 gateway=10.99.99.5
4. Reduced delay in bandwidth adjustment
Allocated bandwidth is optimally utilized given the
shorter adjustment period for the LSPs’ reserved
bandwidth.
The auto-bandwidth allocation minimum and maximum
limits of the tunnel, from PE3 to PE1, are set from the
ingress router as shown in the configuration below.
From the above configuration, the MPLS-TE tunnel
between PE1 and PE2 has been set with an upper limit of
100Mbps, a sampling rate of 1second and a bandwidth
adjustment interval of 1minute.
IV. EXPERIMENT EVALUATION
In the experimental evaluation, the multicast awareness of
the VPLS network is analyzed. Using real time traffic and
the file transfer protocol, traffic through the TE tunnels is
analyzed and evaluated using the Wireshark monitoring
tool. The multicast awareness aspect of VPLS reduces the
number of similar frames to be replicated to other
destinations by the source. This reduces the traffic load on
the network thus efficiently utilizing the available
bandwidth. Replication of frames to different client sites
occurs closest to the client site that has requested the
application or service. Some of the metrics used for the
multicast awareness performance evaluation include:
Ingress replication
High traffic rate throughput
Auto-bandwidth budgeting
Quality of service
Ingress replication of frames to the different client sites
occurs at the nearest possible node, in the network, which is
PE1. The server and client sites belong to the same VPLS
instance. PE1 is the only replication point which reduces
bandwidth wastage in the network when client-end nodes at
PE2 and PE4 request for data from the real-time server at
CE2, as shown in Figure 3.
Client facing end
Network facing end Client facing end
Real-time server
CE2 PE1
PE4
CE4 RtC1
RtC2
CE7
PE2
Figure 3: VPLS aware multicasting
In order to achieve multicasting, it is important that
multicast members belong to the same group. That is why in
the setup of the VPLS test bed environment, care was taken
to assign the same import-route-target value to the router’s
interface belonging to a particular VPLS instance. Having
specified the import route target value to an interface, this
interface is then bridged to the client facing end router.
Figure 4 illustrates the relationship between the real-server
traffic and the network facing traffic rate from router PE1.
Figure 4: Ingress replication traffic profile
From Figure 4, it is shown that the traffic on the
client facing end of router PE1 is approximately half that of
the traffic on the network facing interface. This implies that
there is ingress replication at router PE1. However, if the
replication had occurred at the server, this would mean that
the clients’ bandwidth requirements would have to be
increased to facilitate the transfer of the frames. Therefore
by having the replication of the frames within the network
and close to the destinations, leads to lower bandwidth costs
for the client. Figure 5 is an illustration of the real time
traffic rates in tunnels 1 and 2 in comparison to the network
traffic.
Figure 5: VPLS aware multicast traffic profile
Figure 5 illustrates the different amounts of traffic
that is entering the network. The highest bandwidth is a
representation of the traffic on the physical interface of
router PE1. That means the other bandwidth traffic profiles
represent the frames going through the MPLS-TE tunnels in
the VPLS network. It is not possible to have a combined
value of traffic volume over the two tunnels being greater
than that of the actual interface at PE3, this is because they
are connected to virtual interfaces and it is not possible to
have virtual traffic greater than the actual traffic. Having
this kind of traffic traversing the tunnels is advantageous in
that it offer the SP control of how to manage it as will be
discussed in the subsequent section under auto-bandwidth
allocation.
E. Auto-bandwidth Allocation
As previously discussed auto-bandwidth allocation
offers control of traffic traversing the tunnels. Traffic In the
VPLS network was initially learned and this offered an
insight into how and what kind of adjustment settings will
[admin@PE1] > interface traffic-eng
[admin@PE1] /interface traffic-eng> add
name=tepe1_to_pe2 from-address=10.255.255.4
to-address=10.255.255.5 bandwidth=100000000
primary-path=stat auto-bandwidth-range=1000-
100000000
auto-bandwidth-avg-interval=1s
auto-bandwidth-update-interval=1m
5. be implemented to automatically adjust the bandwidth
within the tunnels. By setting these adjustments, the tunnels
are able to dynamically change their bandwidth allocation
within the tunnels. Figure 6 is a representation of TE tunnels
using multiple time intervals in a multicast aware VPLS
network.
CE1 PE1
PE2
PE3
PE4 CE6
CE5
CE3
Database server
DbC1
DbC2
DbC3
TE tunnel 2
Client facing end
Network facing end Client facing end
Figure 6: Auto-bandwidth allocation in a multicast aware VPLS network
VPLS as stated offers Ethernet type connectivity
therefore it is able to deliver high volumes of data to its
enterprise clients. Taking this into consideration it is
important to avoid instances in which the allocated
bandwidth is not sufficient thus leading to either network
congestion or dropping of some frames. Figure 7 is a
representation of a short time interval in which frames are
dropped in the network.
Figure 7: Auto-bandwidth timer t = 30 seconds
The time interval in tunnel 1 is set to t = 30 seconds. It is
however noted that there are intervals in which the reserved
bandwidth is less than the actual traffic rate in the tunnel.
This in turn leads to frames being dropped in the network.
However in Figure 8, the auto-bandwidth interval in the
tunnel was set at t = 60 seconds.
Figure 8: Auto-bandwidth timer t = 1min
Comparing Figure 7 to Figure 8 shows that the
reserved bandwidth is sufficient for the traffic rates in tunnel
2. However even though there are instances in which the
traffic rate is higher than the reserved limit, tunnel 2 drops
less frames compared to tunnel 1.
The adjustment of the bandwidth was also noted
monitored by the Mikrotik router between PE1 and PE2, on
TE tunnel 1 as shown below.
The above Mikrotik based result agrees with a
point in time t=100s on Figure 5.16. Monitoring the tunnel’s
behavior using Mikrotik gives an insight into the labels
attached and the route the traffic traverses. It also shows the
relationship between the reserved bandwidth and the rate
limit, the later will always be higher than the former. From
the Mikrotik result, in the next interval the reserved
bandwidth in the next interval will be highest recorded
average form the previous interval.
The auto-bandwidth allocator in the tunnel ensures
that that the maximum recorded mean is set as the next
bandwidth reservation value in the subsequent interval. In
the implementation of the auto-bandwidth parameters, as
mentioned earlier, a sampling period of one second and an
adjustment interval of one minute are set. These were seen
as optimal parameters in the way in which the adjustment
interval was not too short that would consequently lead to
packets being dropped in case of sudden spikes in the data
flowing through the tunnel.
The adjustment period is not too long such that it
would lead to bandwidth underutilization i.e. in the case of a
high reserved limit in which there is minimal use of the
allocated bandwidth. As shown in Figure 9.
Figure 9: Auto-bandwidth timer t = 90 seconds
Comparing tunnel 3 to tunnels 1 and 2 shows that the
largest time interval leads to underutilization of the reserved
bandwidth. More so there are also instances in which the
reserved bandwidth is less than the traffic rate in the tunnel.
[admin@PE1] > interface traffic-eng monitor 0
tunnel-id: 1 primary-path-state: established
primary-path: dynpe1_to_pe2
secondary-path-state: not-necessary
active-path: dynpe1_to_pe2
active-lspid: 2
active-label: 121
explicit-route:
"S:10.3.0.254/32,S:10.0.255.2/32,S:10.0.255.1/3
2,S:10.1.0.254/32,S:10.1.0.1/32"
recorded-route:"10.0.255.2[121],
10.1.0.254[132], 10.1.0.1[3]" reserved-
bandwidth: 52.3Mbps rate-limit: 61.7Mbps
rate-measured-last: 45.3Mbps
rate-measured-highest: 46.3Mbps
6. From the above comparisons, it is noted that tunnel 2 is
the most efficient when it comes to bandwidth utilization
amongst all the 3 tunnels. Having achieved auto-bandwidth
allocation within the tunnels, the performance of the traffic
traversing the network is monitored to validate its quality of
service delivery.
F. Classical QoS Performance Metrics
QoS parameters ensure the delivery of services
across a network. The availability of bandwidth coupled
with the availability of network nodes and routes offer
delivery of frames across the network. It is important to
know the behavior of frames traversing the network. A
performance metric such as jitter offers an insight into how
real time applications, such as voice traffic, are handled.
Jitter is termed as the average deviation from the network’s
latency. Network performance metrics are determined by the
jitter value [15]. The results represented by Figure 10
illustrate the amount of jitter within the network.
Figure 10: Jitter pattern
Figure 10 was obtained from an RTP stream and with the
aid of Wireshark. During the RTP stream the link between
PE1 and PE2 was monitored. The average jitter recorded
was under 2.5ms suggesting a high quality of service
delivery for real time traffic even though there is link
disruption in the network.
V. CONCLUSIONS
From the above results, the establishment of PWs using
the different mechanisms presented by RFC 4761 and RFC
4762 offer different design options of creating a P2MP
VPLS instance. BGP caters for the dynamic setup of a
meshed VPLS network capable of running several instances
without worry of the complexity involved while manually
establishing it (VPLS network) using LDP.
The data plane, the results presented show the multicast
awareness of the VPLS network. Frames from the Real-time
and Database servers were not flooded into the network but
they were delivered to specific clients participating in
different VPLS instances. The multicast awareness of the
VPLS network ensured the efficient use of the available
bandwidth.
The use of MPLS-TE tunnels for the delivery of
frames across the network also improves the utilization of
the network bandwidth by offering control over allocated
and reserved bandwidth. The results presented by the auto-
bandwidth allocation mechanism showed that having a
constantly reserved bandwidth leads to underutilization of
network resources.
Furthermore, the QoS results presented showed that
by using traffic engineered tunnel there is no network
degradation. This is advantageous due to the fact that the TE
tunnels and the PWs are dynamic in nature and will
therefore reconstruct a network path to ensure the delivery
of frames from the servers to client machines.
Therefore the VPLS network presented is not only
multicast aware but it also utilizes the available bandwidth
efficiently. The network is also virtualized therefore has low
setup costs. This further improves the ease of expanding a
VPLS network that is running BGP. In this paper, the
advantages of deploying a VPLS were brought forward with
specific interest in the design setup of a multicast aware
VPLS network
REFERENCES
[1] Huawei Technologies: “Technical White Paper for VPLS”,
Huawei Technologies, 2007
[2] Cisco Systems: “Virtual Private LAN Service Architectures and
Operation”, White Paper 2004
[3] Zhuo Xu: “Designing and Implementing IP/MPLS-Based Ethernet
Layer 2 VPN Services, An Advanced Guide for VPLS and VLL”,
2010
[4] Y. Kamite, Y. Wada, Y. Serbest, T. Morin and L. Fang:
“Requirements for Multicast Support in Virtual Private LAN
Services”, IETF RFC 5501, March 2009.
[5] M. Lasserre and V. Kompella: “Virtual Private LAN Service
(VPLS) Using Label Distribution Protocol (LDP) Signaling”, IETF
RFC 4762, January 2007.
[6] K. Kompella, B. Kothari and R Cherukuri: “ Layer 2 Virtual
Private Networks Using BGP for Auto-discovery and Signaling”,
draft-kompella-l2vpn-l2vpn-10.txt, February 2012
[7] K. Kompella and Y. Rekhter: “Virtual Private LAN Service
(VPLS) Using BGP for Auto-Discovery and Signaling” IETF RFC
4761, January 2007.
[8] E. Rosen, B. Davie, V. Radoaca and W. Lou: “Provisioning, Auto-
Discovery, and Signaling in Layer 2 Virtual Private Networks
(L2VPNs)”, IETF RFC 6074, January 2011.
[9] A. Sajassi and D. Mohan: “Layer 2 Virtual Private Network
(L2VPN) Operations, Administration, and Maintenance (OAM)
Requirements and Framework”, IETF RFC 6136, March 2011.
[10] A. Sajassi, F. Brockners, D. Mohan and Y. Serbest: “Virtual
Private LAN Service (VPLS) Interoperability with Customer Edge
(CE) Bridges”, IETF RFC 6246 June 2011
[11] E. Rosen, A. Viswanathan and R. Callon: “Multiprotocol Label
Switching Architecture”, IETF RFC 3031 January 2001.
[12] X. Xiao, D. McPherson, and P. Pate: “Requirements for Pseudo-
Wire Emulation Edge-to-Edge (PWE3)” IETF RFC 3916,
September 2004.
[13] Juniper Networks, Inc, MPLS Applications Configuration Guide,
121st ed. Californiav, USA: Juniper Networks, Inc, 2012.
[14] Mohan Nanduri, Mark Kasten, and Naoki Kitajima. (2012,
Febuary) MPLS Traffic Engineering with Auto-Bandwidth:
Operational Experience and Lessons Learned. [Online].
http://meetings.apnic.net/__data/assets/pdf_file/0020/45623/MPLS
-Traffic-Engineering-with-Auto-Bandwidth.pdf
[15] Vinod Joseph and Srinivas Mulugu, Deploying Next Generation
Multicast-Enabled Applications. USA: Morgan Kaufmann, 2011.