03-Design of Traffic Engineered MPLS VPN For Protected Traffic Using GNS Simulator
03-Design of Traffic Engineered MPLS VPN For Protected Traffic Using GNS Simulator
AbstractMultiprotocol Label Switching(MPLS) lends protecting its path in case of any failover [4]. This helps the
efficiency to very large networks, and is the most used transport service provider to provide a guaranteed service to its
technology for service provider networks to support multiple customers. MPLS thus can provide multiple services at the
customers. Customers connected to a service providers network same instant in the same network, justifying its importance in
demand for secure, reliable, private and ultra fast connections
todays networking generation.
over the globe. This paper describes designing of MPLS
VPN(Virtual Private Network) along with dedicated traffic MPLS enabled networks are designed for various
tunneling for each VPN with the help of OSPF(Open Shortest customers and their various scenarios depending upon the
Path First) and MP-BGP(Multi Protocol-Border Gateway customers demands in the same network infrastructure. A
Protocol) which helps in keeping the customers isolated, network transparent tunnel can be created between the end points of the
manageable and reliable. It also includes path protection, mainly network depending upon the class of traffic. All these
link and node protection in the MPLS network for failover configurations are done on the service providers end and thus
functionality along with features like route reflectors for better the customer does not have to worry about the routing required
efficiency. GNS(Graphical Network Simulator) software stack or deployment of extra resources.
with VMware virtualization were chosen for this purpose, as
these applications are well suited for emulation of real network
The designed network in this paper connects customers
environment. The resultant network obtained after this design is from its headquarters to its various sites throughout the world
a real time solution to many problems and demands in todays using a private connection enabled with traffic tunneling. These
service providers network. private communications are carried by MPLS VPN using
features like Route Distinguisher(RD) and Route Target(RT).
Index Terms MPLS, MPLS Traffic Engineering, MPLS MP-BGP [5] is used to carry these large databases throughout
Virtual Private Network, routing protocols, route reflectors, link the network along with Route Reflectors that will allow the
protection, node protection. IBGP(Internal Border Gateway Protocol) neighbors to learn all
the paths of the network. Every VPN is allotted a different
I. INTRODUCTION tunnel path so that complete privacy and security can be
achieved for every customer. Path protection mechanisms like
There has been an exponential growth in the tele-
Fast Reroute(FRR) are used for faster recovery in case of a
communication sector throughout the world in the past few
failure. Link and node protection is given to the links and nodes
years, which has led to an incredibly huge amount of traffic
that carry higher importance in the network. All these features
being sent from one location to another with different
included in the MPLS network leads to an highly efficient
requirements and choices of services. MPLS has proved to be
network that can be used in real-time scenarios.
a promising solution that provides different features in the
This paper is organized as follows: Section II illustrates the
same network of the service provider, thus replacing many
previous work done in the MPLS domain. Section III
transport technologies. One of the most exceptional feature of
elaborates the proposed designing for a multiple customer
MPLS is Traffic Engineering(TE) [1] that allows a service
MPLS network, whereas Section IV deals with the analysis of
provider to optimize the traffic flow and links utilization as it
simulation results. The final section summarizes the paper.
would be demanded of a service providers network. It gives a
substantial amount of control in the hands of the service II. PREVIOUS WORK
provider regarding the optimal utilization of the available
Earlier, if the customers were willing to setup a private link
resources[2].
between their various offices they would request the service
There are many reasons why deployment of MPLS has
provider for a separate link which was a costly investment.
become so popular. The most significant of them is the
Also, the customers could not use the same private IP addresses
concept of VPN [3] which segregates the traffic according to
the criteria set by the customers, making the connection secure while connecting to the service provider network as the service
and private. It can be used to establish private connections provider could not distinguish between the various customers.
When MPLS VPN started getting implemented [6] ,it enabled
between different sites of the same customers that might be
the service provider to lease private links to the customer on
present at different locations. MPLS also has the capability of
978-1-4673-9338-6/16/$31.00 2016
c IEEE 405
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
the same network without any additional links to be installed. B. Design scenario of a sample network
Also the VRF(Virtual Routing and Forwarding) feature in VPN The goal of the proposed sample network as shown below
now allows the customers to even use the same IP addresses. in Fig. 1, is to show how the features of MPLS VPN can be
Traffic engineering implementation [7] further made combined with traffic engineering and path protection to satisfy
optimal utilization of all the links present in the network, certain given constraints by customers. The sample network
reducing the load from over utilized links. Thus parameters like has three different companies : Customer A, B and C, and these
packet loss, jitter and delay are improved in MPLS enabled three companies have their headquarters and sites at different
network. Path protection and restoration is a key element in locations throughout the globe. This sample network insists on
MPLS networks. Providers sell their services to customers. the following constraints:
This service delivery is concluded by a contract where certain x C1: Customer A should be able to communicate among
SLAs are specified. In order to provide reliable service its headquarters and sites. Similarly customer B and C
delivery, the network is to be made immune to different kind should be able to communicate amongst their own
of network outages and instability. This can be achieved by headquarters and sites.
using Fast Reroute specification for link protection and Record x C2:Customer As headquarter should be able to
Route Object for node protection. communicate with customer Bs and Cs headquarters
III. DESCRIPTION OF PROPOSED NETWORK only and not their site locations. Similarly for customer
B and C.
A. Motivation x C3:All the customers belong to different Autonomous
At the present time, the customers not only want to have Systems.
private connections with their own sites but also some other x C4:Minimum number of links should be utilized for
constraints involved along with it like communication with communication between these companies and their
between various other company headquarters also in the same sites by the service provider.
link. This leads to a complex VPN structure where some x C5:Every customer should be allotted a separate tunnel
connections are to made absolutely secure whereas some for communication between its own centers.
should be interconnected with others and all this should be x C6:Path protection should be enabled for the network
managed in the same link leased by the customer from the for guaranteed services.
service provider.
C. Proposed Solution
Also, the company customers do not like to share their links
with other customers, to maintain the required privacy and The proposed solution satisfying these constraints can be
security. Sharing of links can also lead to unwanted traffic of shown via emulators like GNS(Graphical Network Simulator)
others on the links which could lead to packet loss of their own which is applicable for real-time scenarios. The steps for
traffic, thus reducing the Quality of Services(QoS). designing this network can be shown as below:
Consequently, it is preferred to use a personal link for every x S1:Layer 3 MPLS VPNs
customer. When more than one customer is connected to a
406
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
407
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
V. CONCLUSION
The major challenge for MPLS network is to cope up with
the ever increasing needs and demands for various services in
limited amount of resources. Meanwhile it should also maintain
Fig. 5: MPLS TE tunnel 1 for customer A the quality of services in terms of packet loss, jitter, delay,
privacy and security. This paper provides a design for such a
complex MPLS enabled network along with various criteria
and features, thus proving it to be a promising technology for
future also. Every step required to design a traffic engineered
MPLS VPN network with path protection is mentioned and
proved by implementing the scenario in GNS3 software.
The use of this design will limit the wastage of unused links
and instead provide tunneled route for every customer at the
same instant and in the same network infrastructure. This in
turn will prove to be cost effective for both the customers and
service provider. The implementation of the proposed design
Fig. 6: MPLS TE tunnel 2 for customer B
will surely reduce parameters like packet loss and delay.
Security and privatization of the link is achieved by using
complex MPLS VPN, that puts restrictions on the connectivity
with unwanted customers. Failover functionality is provided for
guaranteed service to customers by giving path protection to
the important traffic engineered tunnels.
408
This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
409