Exploring Complex MPLS VPN Applications Models and
Exploring Complex MPLS VPN Applications Models and
Research Article
Keywords: Multiprotocol Label Switching (MPLS), VPN services, Modern Communication Demands,
Layer-3
DOI: https://doi.org/10.21203/rs.3.rs-3347362/v1
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Read Full License
Page 1/16
Abstract
In the modern landscape, robust data communication is pivotal for businesses and lifestyles. This has
led to intricate demands from enterprise customers for sophisticated communication solutions. As a
response, MPLS (Multiprotocol Label Switching) technology is being leveraged to meet these complex
connectivity needs. This paper undertakes a comprehensive exploration of intricate MPLS- Virtual Private
Networks (VPN) applications. The study entails both in-depth analysis and practical application on an
operational network to validate its efficacy. The research primarily delves into diverse models of complex
Layer 3 VPNs over MPLS. It commences by elucidating the foundational concept of a simple VPN and
subsequently navigates through various designs for deploying Layer-3 VPNs on MPLS networks. MPLS
technology has expanded the horizons of VPN services, catering precisely to contemporary business and
customer requirements. Beyond conventional peer-to-peer private communication, the technology
facilitates sophisticated iterations like managed service VPNs and overlapping VPNs. This paper
systematically navigates these intricacies, offering comprehensive insights into their mechanisms and
operational feasibility.
1. Introduction
Contemporary customers often express reservations about conventional Internet connectivity, primarily
due to security concerns associated with potential risks to confidentiality and integrity in public network
access. This apprehension has spurred the concept of Virtual Private Networks (VPNs), which have
emerged in various forms. VPNs leverage public infrastructures, such as the Internet, to establish private
networks accessible solely to authorized parties, mirroring the attributes of local networks in accessibility,
privacy, and management [1–3]. These VPNs fall into categories like Customer-Provisioned VPNs (CP-
VPNs) and Provider-Provisioned VPNs (PP-VPNs), further subdivided into Layer-2 and Layer-3 VPNs [4–
5].
In the realm of service provider-operated converged networks catering to diverse customer traffic, issues
arise, especially concerning time-sensitive data like voice and video, which may experience delivery
challenges affecting their desired characteristics. To ensure Service Level Agreement (SLA) adherence,
enhancing performance becomes imperative. This research presents an exhaustive survey of both
straightforward and intricate applications of MPLS VPNs, serving as the foundation for evaluating voice
traffic in this study [6–8].
Although Internet Protocol (IP) communication reigns supreme, it faces ongoing challenges, especially in
accommodating the diverse traffic requirements anticipated in modern and next-gen networks. These
networks must adeptly manage an array of traffic types serving distinct end-user applications, each with
unique characteristics and tolerance levels for disruption. For instance, voice traffic remains relatively
constant, whereas video traffic tends to be bursty, differing not only in traffic nature but also in sensitivity
to factors like Jitter. Non-real-time data transmissions are more forgiving of delay variations due to their
Page 2/16
tolerance for queuing. To enable a unified network catering to these diverse applications, performance
enhancement techniques are vital to tailor treatment to each application's distinctive needs [9–11].
This paper examines the utilization of MPLS VPNs for voice traffic transmission, evaluating various
performance enhancement methods to optimize throughput, minimize delay, and reduce jitter. The
intricate scenarios of MPLS VPN application are thoroughly expounded and practically implemented on
an operational network system to validate their efficacy. The study introduces diverse models of complex
Layer 3 VPNs over an MPLS infrastructure. It commences with the foundational simple VPN model,
elaborated in the initial section. Subsequently, the paper delves into distinct designs for Layer-3 VPNs
over MPLS networks, providing insights into their implementation strategies.
Customer-Provisioned VPNs are inherently Layer-2 VPNs, wherein the Provider remains unaware of the
VPN's creation. In terms of the VPN tunnel, the Provider functions akin to a Layer-2 switch. It's essential to
distinguish between the two interfaces at each customer site. The tunnel interface signifies the VPN and
presents a Layer-2 perspective, while the physical interface establishes IP peering with the Provider,
potentially involving routing protocols, and assumes a Layer-3 connection. Clarifying this hinge on
comprehending the tunnel interface's standpoint.
2.2 Layer-3 VPN
The Layer-3 VPN entails active involvement of the Service Provider in the routing process alongside the
customer. This involves configuring a Layer-3 interface with an IP address within the Service Provider's
network that corresponds to the customer's private network. For instance, if the customer's WAN interface
employs the IP address 172.16.1.1/30, the Provider's device facing that peer site configures the IP
address 172.16.1.2/30 within the same VPN. Moreover, a distinct subnet is designated for the point-to-
point connection between the Provider and the other peer site. For example, the subnet 172.16.7.1/30 and
172.16.7.2/30 might be allocated for this purpose [15–16].
Page 3/16
In the pre-MPLS era, implementing Layer-3 VPNs was notably intricate. It necessitated a dedicated router
for each customer on every Point of Presence (POP) of the provider, a management-intensive and
expensive undertaking. The advent of MPLS revolutionized Layer-3 VPN deployment, rendering it more
feasible.
2.3 MPLS – VPN
The core concept of MPLS-VPN revolves around the capability to allocate multiple labels (or a label
stack) to a single packet. The outer label serves as the transport label, overseeing the packet's
conveyance to its intended endpoint. As the packet progresses to the next Label Switching Router (LSR),
this outer label is assessed and potentially replaced or removed to facilitate the packet's journey to its
ultimate destination. An essential quandary arises: how does the ultimate destination router process this
incoming data? This is contingent upon the presence of an additional label, known as the inner label. In
its absence, the data advances to the routing engine, where its Layer 3 attributes (IP address) are
evaluated, culminating in the definitive decision concerning its ultimate target [17–20].
Conversely, if an additional label is present, it serves as a determinant for the associated VPN type (Layer-
2 or Layer-3). Consider a Layer-3 VPN scenario: the router scrutinizes the IP destination within the traffic
and endeavors to discover a corresponding entry within the Virtual Routing and Forwarding (VRF) table.
This specialized table corresponds to the specific VPN, assisting the router in shaping routing
determinations for the incoming data.
Page 4/16
outcomes are outlined in Figs. 5 (a, b, c, d), where a conspicuous alignment between the theory and the
routing tables of customer routers is evident.
The anticipated outcome revolves around observing that the routing table of each branch exclusively
contains routes from its own branches and the HQ within the same customer. For instance, in the case of
Customer 1 Branch A, denoted as R7, we expect to find routes from Customer 1 Branch B and Customer 1
HQ, specifically 10.8.8.0/24 and 10.15.15.0/24, respectively. This pattern extends across the other
branches and their corresponding HQs.
Additionally, we foresee the HQ routers of each customer encompassing routes from their own branches
alongside the route linked to the counterpart HQ. For example, Customer 2 HQ router (R16) should include
routes from Customer 2 Branch A, Customer 2 Branch B, and Customer 1 HQ, which are 10.9.9.0/24,
10.10.10.0/24, and 10.15.15.15.0/24 respectively. Figures 9 (a, b, c, d, e, f) provide a visual depiction of
the BGP table for all customer routers. Notably, on HQ routers 15 and 16, certain routes only bear the AS
of the provider, indicative of routes stemming from the same VPN of the respective customer. Meanwhile,
routes marked with an unfamiliar AS (100 or 200) signify routes originating from the HQ of the other
customer.
The experimental setup employs a topology depicted in Fig. 11. To implement this, route targets are
allocated, as depicted in Fig. 12, and subsequently configured, as outlined in Fig. 13.
In the preceding scenario, the anticipated outcome involves the presence of routes for all branches' LANs
across all customers in the routing table of router 15. Similarly, the LAN associated with the centralized
Page 5/16
service, denoted as 10.15.15.15.0, is expected to be present in the routing tables of all customer routers.
Conversely, no routes pertaining to customer 1 should be present on any router within customer 2.
Figures 14 (a, b, c, d, e) visually portray the BGP table for all customer routers, alongside the centralized
services router.
Upon scrutiny, the centralized services router reveals the coexistence of all LANs, complete with the
accurate AS numbers corresponding to the respective customers.
4. Conclusion
Our exploration into complex MPLS VPN applications highlights their pivotal role in addressing
contemporary business and communication needs. The study delves deeply into Layer 3 MPLS VPNs,
dissecting their intricacies and implementations to cater to diverse demands. Through meticulous
experimentation, we analyze scenarios involving overlapping VPNs, centralized services, and managed
CE VPNs, showcasing their adaptability in dynamic networking environments. The study's insights hold
significance as businesses navigate evolving communication landscapes. The seamless integration of
VPNs, optimized performance enhancements, and precise route-target assignments form a robust
networking foundation, catering to multifaceted demands. This research underscores MPLS VPNs'
versatility in accommodating intricate communication scenarios, ensuring secure data exchange, and
facilitating tailored information flow. Ultimately, the study showcases MPLS technology's efficacy,
offering insights that guide businesses in constructing resilient, customized networking solutions in
today's digital era.
Declarations
Page 6/16
Acknowledgments: The authors extend their appreciation to the Deputyship for Research& Innovation,
Ministry of Education in Saudi Arabia for funding this research work through the project number ISP23-
56.
Data Availability Statement: Data sharing not applicable to this article as no datasets were generated or
analyzed during the current study.
Author contributions: Emad S. Hassan; methodology, Ayman E. A. Abdelaal; software, Emad S. Hassan;
validation, Ayman E. A. Abdelaal; formal analysis, Ahmed S. Oshaba; investigation, Ahmed S. Oshaba;
resources, Atef El-Emary; data curation, Atef El-Emary; writing—original draft preparation, Emad S.
Hassan; writing—review and editing, Moawad I. Dessouky; visualization, Fathi E. Abd El‑Samie;
supervision, Fathi E. Abd El‑Samie; project administration, Emad S. Hassan; funding acquisition. All
authors have read and agreed to the published version of the manuscript.
Funding: This research was funded by Deputyship for Research& Innovation, Ministry of Education in
Saudi Arabia, grant number ISP23-56.
References
1. Cheng, T., Zhou, F.: "5G Virtual Private Network Planning Methodology Analysis," 14th International
Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 2022,
pp. 1–4, (2022). 10.1109/WCSP55476.2022.10039428
2. Aung, S.T., Thein, T.: "Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks," IEEE
Conference on Computer Applications(ICCA), Yangon, Myanmar, 2020, pp. 1–5, (2020).
10.1109/ICCA49400.2020.9022848
3. Figueiredo, R., Subratie, K.: "Demo: EdgeVPN.io: Open-source Virtual Private Network for Seamless
Edge Computing with Kubernetes," 2020 IEEE/ACM Symposium on Edge Computing (SEC), San Jose,
CA, USA, pp. 190–192, (2020). 10.1109/SEC50012.2020.00032
4. Guo, K., Mukherjee, S., Paul, S., Rangarajan, S.: "Optimal customer provisioning in network-based
mobile VPNs," The First Annual International Conference on Mobile and Ubiquitous Systems:
Networking and Services, 2004. MOBIQUITOUS 2004., Boston, MA, USA, pp. 95–104, (2004).
10.1109/MOBIQ.2004.1331714
5. Houidi, Z.B., Meulle, M.: "A new VPN routing approach for large scale networks," The 18th IEEE
International Conference on Network Protocols, Kyoto, Japan, pp. 124–133, (2010).
10.1109/ICNP.2010.5762761
Page 7/16
6. Zubilevich, A.L., Sidney, S.A., Tsarenko, V.A.: "The Effect of the Use of Service Level Agreement for
Operators of Transport Systems and On-Board Systems," 2021 Systems of Signals Generating and
Processing in the Field of on Board Communications, Moscow, Russia, pp. 1–5, (2021).
10.1109/IEEECONF51389.2021.9416045
7. Ganapathy, D.N., Joshi, K.P.: A Semantically Rich Framework to Automate Cloud Service Level
Agreements. IEEE Trans. Serv. Comput. 16(1), 53–64 (2023). 1 Jan.-Feb 10.1109/TSC.2022.3140585
8. Sahoo, S., Bigo, S., Benzaoui, N.: "Introducing Best-in-Class Service Level Agreement for Time-
Sensitive Edge Computing," European Conference on Optical Communication (ECOC), Bordeaux,
France, 2021, pp. 1–4, (2021). 10.1109/ECOC52684.2021.9605824
9. Ganapathy, D.N., Joshi, K.P.: A Semantically Rich Framework to Automate Cloud Service Level
Agreements. IEEE Trans. Serv. Comput. 16(1), 53–64 (2023). 1 Jan.-Feb 10.1109/TSC.2022.3140585
10. Zhang, H., Pan, G., Xu, S., Zhang, S., Jiang, Z., Hard, A.: and Soft Hybrid Slicing Framework for Service
Level Agreement Guarantee via Deep Reinforcement Learning," 2022 IEEE 95th Vehicular Technology
Conference: (VTC Helsinki, Finland, 2022, pp. 1–5, (2022). 10.1109/VTC2022-
Spring54318.2022.9860789
11. Peoples, C., Moore, A., Georgalas, N.: "Customer Classification Recommender to Support
Personalised Service Level Agreements Across the Internet of Things," IEEE 8th World Forum on
Internet of Things (WF-IoT), Yokohama, Japan, 2022, pp. 1–6, (2022). 10.1109/WF-
IoT54382.2022.10152125
12. Saputra, B.G.A., Nugroho, K., Ikhwan, S.: "Implementation of Layer 2 MPLS VPN on the SDN Hybrid
Network using Ansible and ONOS Controllers," IEEE International Conference on Communication,
Networks and Satellite (COMNETSAT), Purwokerto, Indonesia, 2021, pp. 27–31, (2021).
10.1109/COMNETSAT53002.2021.9530788
13. Budiyanto, S., Gunawan, D.: "Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice
Over Internet Protocol," in IEEE Access, vol. 11, pp. 60853–60865, (2023).
10.1109/ACCESS.2023.3286032
14. Darmawan, E., Budiyanto, S., Silalahi, L.M., "QoS Analysis on VoIP with VPN using SSL and L2TP
IPSec Method,": IEEE International Conference on Communication, Networks and Satellite
(COMNETSAT), Solo, Indonesia, 2022, pp. 130–136, (2022).
10.1109/COMNETSAT56033.2022.9994572
15. Yautibug Coro, A.L., Avila-Pesantez, D., Arellano-Aucancela, A.: "Evaluation of 6PE and 6VPE
techniques in MPLS-VPN networks for video streaming," IEEE International Conference on Machine
Learning and Applied Network Technologies (ICMLANT), Soyapango, El Salvador, 2021, pp. 1–5,
(2021). 10.1109/ICMLANT53170.2021.9690563
16. Pazienza, A., Lella, E., Noviello, P., Vitulano, F., "Analysis of Network-level Key Exchange Protocols in
the Post-Quantum Era,": IEEE 15th Workshop on Low Temperature Electronics (WOLTE), Matera, Italy,
2022, pp. 1–4, (2022). 10.1109/WOLTE55422.2022.9882818
Page 8/16
17. Sllame, A.M., "Performance Evaluation of Multimedia over MPLS VPN and IPSec Networks,": IEEE
2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic
Control and Computer Engineering (MI-STA), Sabratha, Libya, 2022, pp. 32–37, (2022). 10.1109/MI-
STA54861.2022.9837572
18. Gupron, M.Y., Umaisaroh, U., Wicaksono, A.: "Network Automation for CE Router with Route Leaking
in MPLS-VPN Network," 2022 International Symposium on Information Technology and Digital
Innovation (ISITDI), Padang, Indonesia, pp. 162–167, (2022). 10.1109/ISITDI55734.2022.9944460
19. Yan, T., Wu, W., Li, L., Xie, W., "Configuration method of cross-domain MPLS VPN based on double
MCE,": 6th International Conference on Wireless Communications and Applications (ICWCAPP),
Haikou, China, 2022, pp. 106–108, (2022). 10.1109/ICWCAPP57292.2022.00033
20. Gales, E.-M., Croitoru, V.: "Traffic Engineering and QoS in a Proposed MPLS-VPN," 2020 International
Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 2020, pp. 1–4,
10.1109/ISETC50328.2020.9301135
21. Ameur, S.Z.: Techniques and Tools for Encryption, IPSec and VPN. In: Computer Science Security:
Concepts and Tools, pp. 109–132. Wiley (2022). 10.1002/9781394163847.ch6
22. Sarsembagieva, K., Gardikis, G., Xilouris, G., Kourtis, A., "A fast route planning algorithm for MPLS-
TE,": International Conference on Telecommunications and Multimedia (TEMU), Heraklion, Greece,
2012, pp. 142–146, (2012). 10.1109/TEMU.2012.6294706
23. Rossberg, M., Grey, M., Trapp, M., Girlich, F., Schaefer, G.: "Distributed monitoring of self-configuring
Virtual Private Networks," 2013 IFIP/IEEE International Symposium on Integrated Network
Management (IM Ghent, Belgium, 2013, pp. 1080–1081. (2013)
Figures
Figure 1
Page 9/16
Figure 2
Figure 3
Page 10/16
Figure 4
Figure 5
Page 11/16
Figure 6
Figure 7
Page 12/16
Figure 8
Figure 9
Figure 10
Page 13/16
Traffic Flow for Overlapping VPN.
Figure 11
Figure 12
Page 14/16
Figure 13
Figure 14
Page 15/16
d) BGP table of router 10 for Centralized Services VPN.
Page 16/16