MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS. 67260.

Slides:



Advertisements
Similar presentations
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Advertisements

Identifying MPLS Applications
Multi-Protocol Label Switch (MPLS)
Internetworking II: MPLS, Security, and Traffic Engineering
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Introducing MPLS Labels and Label Stacks
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
MPLS Multiple Protocol Label Switching 2003/2/19.
MPLS and Traffic Engineering
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Introduction to MPLS and Traffic Engineering
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
Multi-Protocol Label Switching
Multi-Protocol Label Switch (MPLS) 1 Outline Introduction MPLS Terminology MPLS Operation – Label Encapsulation Label Distribution Protocol (LDP) Any.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
MPLS networking at PSP Co Multi-Protocol Label Switching Presented by: Hamid Sheikhghanbari 1.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Introduction to MPLS and Traffic Engineering Zartash Afzal Uzmi.
1 Multiprotocol Label Switching. 2 “ ” It was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
MultiProtocol Label Switching (MPLS) July 29, 2000TECON 2000 Pramoda Nallur Alcatel Internetworking Division.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Multiprotocol Label Switching (MPLS) References: Juniper white papers on MPLS and DiffServ at: white_papers/
© 2006 Cisco Systems, Inc. All rights reserved. MPLS Introduction Module 4: Frame Mode MPLS Implementation.
Multi-protocol Label Switching Jiang Wu Computer Science Seminar 5400.
LO1 Know types of Network Systems and Protocols. Wan Technologies.
Module 4: Designing Routing and Switching Requirements.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
1 UHG MPLS Experience June 14, 2005 Sorell Slaymaker Director Network Architecture & Technologies
Virtual Private Networks Warren Toomey. Available WAN Links.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Module 5: Configuring Access for Remote Clients and Networks.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Multiple Protocol Support: Multiprotocol Level Switching.
Lecture 1: Introduction to WAN
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
Multi-protocol Label Switching
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Networks
Advanced Computer Networks
Multiprotocol Label Switching
Virtual Private Networks
B-TECH PROJECT MID-SEM PRESENTATION 2011
Virtual Private Network (VPN)
VPN: Virtual Private Network
Wide Area Network.
Internet Quality of Service
Examining Network Protocols
Virtual Private Network (VPN)
The Business Value of MPLS VPNs
Presentation transcript:

MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS

Presentation Outline To describe the: Need Need History History Working Working Benefits Benefits Of MPLS-based Virtual Private Networks

Why MPLS-based VPNs? Trends in Enterprise Computing Trends in Enterprise Computing 1. Companies having offices scattered throughout the country. 2. On-the-run employees. Network Congestion Network Congestion Better QoS required for Voice over IP and converged voice and data networks. Security Security More sophisticated and costly attacks on networks.

Definition/Features of MPLS Stands for Multi-protocol Label Switching. Stands for Multi-protocol Label Switching. A technology for speeding up network traffic flow and making it manageable. A technology for speeding up network traffic flow and making it manageable. Works by attaching a label in front of each packet. Works by attaching a label in front of each packet. At each subsequent hop in the network, the router only takes a look at the label and forwards it. At each subsequent hop in the network, the router only takes a look at the label and forwards it. This is in contrast to the normal switching where routers look at the IP address of each packet and forward it accordingly. This is in contrast to the normal switching where routers look at the IP address of each packet and forward it accordingly. This is how MPLS saves time and make traffic flow faster and smoother. This is how MPLS saves time and make traffic flow faster and smoother.

MPLS Features Contd. Label Distribution: Each LSR in the network maintains a table of {incoming interface, label} and {outgoing interface, label}. Label Distribution: Each LSR in the network maintains a table of {incoming interface, label} and {outgoing interface, label}. Resource Reservation: MPLS allows the reservation of bandwidth beforehand to ensure the continuous transmission of audio and/or video data. Resource Reservation: MPLS allows the reservation of bandwidth beforehand to ensure the continuous transmission of audio and/or video data. Traffic Engineering: Process of directing and diverting traffic to where there are resources available. Factors that affect Traffic Engineering are: Traffic Engineering: Process of directing and diverting traffic to where there are resources available. Factors that affect Traffic Engineering are: Current available resources Current available resources Current and future state of the network Current and future state of the network QoS Requirements QoS Requirements

MPLS Terminology Egress: Exit point from the network. Egress: Exit point from the network. FEC: Forwarding Equivalence Class. A sequence of packets that are routed the same way, meaning through the same LSP. FEC: Forwarding Equivalence Class. A sequence of packets that are routed the same way, meaning through the same LSP. Ingress: Entry point into the network. Ingress: Entry point into the network. LER: Label Edge Router. An LSR at the edge of an MPLS network. These routers usually make up the ingress and egress of the network. LER: Label Edge Router. An LSR at the edge of an MPLS network. These routers usually make up the ingress and egress of the network. LSR: Label Switching Router. A part of the MPLS network that forwards packets based on the label attached in front of the packets. LSR: Label Switching Router. A part of the MPLS network that forwards packets based on the label attached in front of the packets.

Benefits of MPLS Faster Packet Switching. Faster Packet Switching. Better management of different kinds of traffic (voice, data or converged). Better management of different kinds of traffic (voice, data or converged). Bandwidth Reservation for different Quality of Service. Bandwidth Reservation for different Quality of Service. Works with Internet Protocol (IP), Asynchronous Transfer Mode (ATM), Frame Relay; thus multiprotocol. Works with Internet Protocol (IP), Asynchronous Transfer Mode (ATM), Frame Relay; thus multiprotocol. Expected to work with future technologies. Expected to work with future technologies.

Definition/Features of VPN Stands for Virtual Private Network. Stands for Virtual Private Network. A VPN is a private network that uses a public network such as the Internet to provide secure remote access to the corporate network for its employees. A VPN is a private network that uses a public network such as the Internet to provide secure remote access to the corporate network for its employees. This is in contrast to earlier, expensive leased lines. This is in contrast to earlier, expensive leased lines. It works by sharing the same public infrastructure while providing security with the help of encryption and tunneling protocols. It works by sharing the same public infrastructure while providing security with the help of encryption and tunneling protocols. Data (packets) is encrypted by the sender and decrypted by the receiver. Data (packets) is encrypted by the sender and decrypted by the receiver. Only data that is encrypted properly enters a particular tunnel. Only data that is encrypted properly enters a particular tunnel.

Fig. 2: Virtual Private Network

VPN Terminology Tunneling: Transmission of private data through the public network such that the routing nodes in the network are unaware that the transmission is part of a private network. Tunneling: Transmission of private data through the public network such that the routing nodes in the network are unaware that the transmission is part of a private network. Encryption: The conversion of data into a form called ciphertext that is not understandable to anyone who’s not authorized to look at it. Encryption: The conversion of data into a form called ciphertext that is not understandable to anyone who’s not authorized to look at it. L2TP: Layer 2 Tunneling Protocol, a common tunneling protocol. L2TP: Layer 2 Tunneling Protocol, a common tunneling protocol. PPTP: Point to Point Tunneling Protocol, another common VPN tunneling protocol. PPTP: Point to Point Tunneling Protocol, another common VPN tunneling protocol.

Benefits of VPN Extend connectivity of a corporation beyond geographic boundaries. Extend connectivity of a corporation beyond geographic boundaries. Provide secure connections. Provide secure connections. Reduce expenditure and costs as compared to leased lines or WANs. Reduce expenditure and costs as compared to leased lines or WANs. Eliminate the need for transportation of remote users. Eliminate the need for transportation of remote users. Provide potential for networking in a global environment. Provide potential for networking in a global environment.

Conclusion MPLS-based Virtual Private Networks promise a lot of potential when properly designed. Virtual Private Networks provide the highly desirable benefits of low-cost, high speed, and secure connection. MPLS, on the other hand, provide better Quality of Service based on Traffic Engineering and Resource Reservation. So, I expect to see these kind of networks in heavy use in the near future.

References Brittain, Paul and Adrian Farrel, MPLS Virtual Private Networks, November, Brittain, Paul and Adrian Farrel, MPLS Virtual Private Networks, November, Brittain, Paul and Adrian Farrel, MPLS Traffic Engineering: A choice of signalling protocols, crldprsvp.pdf, January 17, Brittain, Paul and Adrian Farrel, MPLS Traffic Engineering: A choice of signalling protocols, crldprsvp.pdf, January 17, MPL VPNs, archive/ripe-39/presentations/mpls-vpn/, Novermber MPL VPNs, archive/ripe-39/presentations/mpls-vpn/, Novermber Spirent White Paper, BGP/MPLS Virtual Private Networks: Performance and Security over the Internet, literatureqqw8/marketingliterature/W5103_RFC_2547.pdf. Spirent White Paper, BGP/MPLS Virtual Private Networks: Performance and Security over the Internet, literatureqqw8/marketingliterature/W5103_RFC_2547.pdf. Tyson, Jeff, How Virtual Private Networks Work, Tyson, Jeff, How Virtual Private Networks Work,