SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
(MPLS) MultiProtocol Labling
        Switching

 Software Engineering 4C03
Computer Network & Computer
          Security
     Dr. Kartik Krishnan
         Winter 2004

           Final Copy


       Researcher: Paul Chan
        Student ID: 9914759


    Last Revised: March 29th, 2004
4C03 Project Proposal

Objective

As computer networks become more and more a basic staple asset for
both businesses and in general human communication. Since the
adoption of the internet as a main medium of communication, we have
noticed a correlating burden on the existing hardware and software
system supporting these operations. We are beginning to see that our
current IP switching router configurations struggle to satisfy all the
bandwidth and network throughput requirements. In addition with the
growth of online businesses, there is a push for added security measures
to allow for transmission of sensitive data.

MPLS is a hardware and software solution to this problem. By using newer
networking hardware and smarter software algorithms to direct network
data we can achieve more efficient, flexible and secure network
communications.

Approach

In this report we will briefly describe what MPLS is and how it works.
Moreover, we will discuss how MPLS features can improve current
network conditions and lastly we will see an example of how MPLS
impacts current technology. General knowledge about IP based routing
and switching is assumed as we have studied these in our 4C03
Networking & Security course in great detail.

Impact

This report is intended to give this audience a brief introduction in the
developing networking technology due to be released sometime in the
summer of 2004. From this presentation the audience should be able to
gain insight into the growth of network usage and the necessity for more
efficient ways route information. It should be clear that newer technology
is needed to replace the current technology if we wish to continue
supporting increasing numbers of networked users and devices. Hence
the need for new and cleaver ways to do the things we do on a daily basis.

We will show that MPLS offers many different benefits in addition to the
current IP network. It allows for network traffic engineering to ensure
quality of service (QoS), reliability, security and data transfer efficiency.
This list is only a mere fraction of the list of benefits MPLS brings to the IP
based networking domain. In depth research is needed for one to
understand the depth and breadth of the benefits MPLS brings to our
current networking architecture.
What is wrong with what we have now?

As the internet becomes the standard medium to carry information to and
from their destination we will see traditional protocols and hardware be
pushed to their operating thresholds. How do we solve the problem of
increased demands for quality network bandwidth? How do we guarantee
our packets will get from our sources to our intended destinations without
loss delay and most importantly of all how can we know that are packets
are traveling thru authorized secure networks?

Traditional networking infrastructure relay packets of information via
routers that determine the next best path each packet was to take. Based
on different routing algorithms each packet was sent down the shortest
path or quickest path whichever is deemed to be the priority. Each time a
packet arrived at a router their fate would be determined by a routing table
governed by complex algorithms. The most basic constructs of IP routing
do not include considerations to the quality of network that the packet will
travel nor does it take into account what is the most secure path a packet
can take. It is only concerned with how it can get a packet to its
destination while minimizing the distance (hops). MPLS or Multi Protocol
Label switch is the answer to our concerns above. Since traditional IP
networks have no means of labeling, categorizing or monitoring the
packets that traverse them it is nearly impossible to track and direct
specific packets to ensure that priority packets get to their destination via
the right channels. MPLS technology works to solve these IP
shortcomings.

What is MPLS

MPLS is an “overlay” protocol, meaning that MPLS uses the existing
structure of traditional IP switching enhanced with label or tags to aid in
this new way of relaying packets. MPLS takes advantage of all the
benefits of traditional IP switching and adds to it the benefits of network
quality assurance and security management.

Technically MPLS is nothing more than a label header encapsulated into
the IP packet header. This label is used to categorize the packet as it
travels across the physical network thus enabling the ability for it to be
monitored tracked. MPLS hardware transforms the standard IP packets
into MPLS packets adding and subtracting labeling information as they
enter and leave the network. This ensures compatibility to current
consumer computer equipment and eliminates the need for end users to
make hardware upgrades to take advantage of the benefits of MPLS.
How it works: MPLS

MPLS-equipped networks use MPLS-aware devices known as label edge
routers (LERs), positioned at the network’s edges. These devices are
designed to inspect IP packets entering the network and add MPLS
headers, as well as removing the headers from packets leaving the MPLS
network. Inside the boundaries of the MPLS network, devices known as
label switch routers (LSRs) look for an MPLS label on each packet as they
passes through them. By looking up and following the instructions
contained in those labels and routing them based on a list of instructions
we obtain the ability to control, monitor and direct packets to and from
network paths of our choice.




Diagram A - http://www.nwfusion.com/news/tech/0524tech.html

Benefits Derivations
  • Security
  • Quality of Service (QoS)
  • Routing Efficiency
  • Backward compatibility and Cost efficiency
  • Traffic Engineering
Applications: Where can MPLS thrive?

MPLS technology main thrives in large network implementations where
mass amounts of data needs to be transmitted through different physical
networks quickly, efficiently and securely. In many cases finding the
optimal path of information is not an easy task. Network administrators
need the flexibility to dictate where on the network specific packets of
information must flow based on technical or business criteria. MPLS
allows network administrators the ability to direct critical traffic thru only
secure networks and non critical data thru general network backbone
connections.

The greatest and simplest example of current technology that can use the
strengths of MPLS technology is VPN (Virtual private networking). VPN is
the establishment of a secure connection to a host severs thru insecure
networks (such as the internet) often known as tunneling.




Diagram B - http://www.helpdesk.umd.edu/topics/applications/vpn/3836
Diagram C - http://www.helpdesk.umd.edu/topics/applications/vpn/3836

As described in the diagrams above users create a “tunneled” secure
connection to specific host servers passing thru unknown physical
networks of the internet domain. Packets may very well travel thru
networks belonging to malicious hackers. Even though this information is
often encrypted hackers can and will find a way to intercept and decrypted
messages that pass thru their networks.

MPLS can mitigate this security threat completely. As network
administrator you may be required to establish a VPN connection between
two locations. The data sent maybe extremely sensitive. With MPLS and
VPN technology you will be able to establish a connection and ensure that
this information only travels via certain trusted networks. Doing so can
ensure data is transferred safely, securely and efficiently. In the diagrams
below you will see the concepts of VPN without MPLS and VPN with
MPLS illustrated. The main difference is VPN connection established via
MPSL will travel via Virtually Leased Lines (VLL). These lines are provided
by large network service providers which ensure the lines are secure and
always are of highest quality.
Diagram D - http://www.netcraftsmen.net/welcher/papers/mplsvpn.html




Diagram E - http://www.foundrynet.com/solutions/appNotes/PDFs/DM_VLL.pdf
Conclusion

Since the exponential like growth of the internet we have noticed
correlating phenomena that hardware limits are being pushed to
dangerously instable levels. By devising new and more cleaver ways to
route information to and from different locations we can accommodate the
increasing demands while postponing the changing of standards and
expenditure. We can use what we have now in smarter more efficient
ways postpone the need to expand or upgrade our current network
systems. MPLS is the solution to our ever expanding internet usage. By
use of cleaver routing techniques not only can we achieve more efficient
usage of our physical networks but we can also have the additional
benefits of security and flexibility.

Bibliography

Author Unknown
Introduction to MPLS .. Explaining Multi-protocol Label Switching
Retrieved Feb 28th, 2004 from
http://findvpn.com/articles/mpls.php

Contenu connexe

Tendances (20)

Mpls
MplsMpls
Mpls
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
MPLS
MPLSMPLS
MPLS
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Mpls te
Mpls teMpls te
Mpls te
 
GMPLS (generalized mpls)
GMPLS (generalized mpls)GMPLS (generalized mpls)
GMPLS (generalized mpls)
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
gmpls
gmplsgmpls
gmpls
 
Mpls
MplsMpls
Mpls
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile Backhaul
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
Mpls101
Mpls101Mpls101
Mpls101
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
 
Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)
 

En vedette

Assessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba damAssessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba damAlexander Decker
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using aeSAT Publishing House
 
Biscuitville
BiscuitvilleBiscuitville
Biscuitvillebillybooe
 
Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007Metamorphosis
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parametersijsrd.com
 

En vedette (6)

Assessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba damAssessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba dam
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using a
 
Bgp
BgpBgp
Bgp
 
Biscuitville
BiscuitvilleBiscuitville
Biscuitville
 
Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 

Similaire à MPLS: MultiProtocol Label Switching

IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessReadWrite
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessReadWrite
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Erik Ginalick
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfHuynh MVT
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)mashiur
 
Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )Chinmay Upasani
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 

Similaire à MPLS: MultiProtocol Label Switching (20)

IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
L347176
L347176L347176
L347176
 
dissertation
dissertationdissertation
dissertation
 
my project publication
my project publicationmy project publication
my project publication
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term Success
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term Success
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications
 
Vp ns
Vp nsVp ns
Vp ns
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdf
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
 
Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )
 
G010314853
G010314853G010314853
G010314853
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

MPLS: MultiProtocol Label Switching

  • 1. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised: March 29th, 2004
  • 2. 4C03 Project Proposal Objective As computer networks become more and more a basic staple asset for both businesses and in general human communication. Since the adoption of the internet as a main medium of communication, we have noticed a correlating burden on the existing hardware and software system supporting these operations. We are beginning to see that our current IP switching router configurations struggle to satisfy all the bandwidth and network throughput requirements. In addition with the growth of online businesses, there is a push for added security measures to allow for transmission of sensitive data. MPLS is a hardware and software solution to this problem. By using newer networking hardware and smarter software algorithms to direct network data we can achieve more efficient, flexible and secure network communications. Approach In this report we will briefly describe what MPLS is and how it works. Moreover, we will discuss how MPLS features can improve current network conditions and lastly we will see an example of how MPLS impacts current technology. General knowledge about IP based routing and switching is assumed as we have studied these in our 4C03 Networking & Security course in great detail. Impact This report is intended to give this audience a brief introduction in the developing networking technology due to be released sometime in the summer of 2004. From this presentation the audience should be able to gain insight into the growth of network usage and the necessity for more efficient ways route information. It should be clear that newer technology is needed to replace the current technology if we wish to continue supporting increasing numbers of networked users and devices. Hence the need for new and cleaver ways to do the things we do on a daily basis. We will show that MPLS offers many different benefits in addition to the current IP network. It allows for network traffic engineering to ensure quality of service (QoS), reliability, security and data transfer efficiency. This list is only a mere fraction of the list of benefits MPLS brings to the IP based networking domain. In depth research is needed for one to understand the depth and breadth of the benefits MPLS brings to our current networking architecture.
  • 3. What is wrong with what we have now? As the internet becomes the standard medium to carry information to and from their destination we will see traditional protocols and hardware be pushed to their operating thresholds. How do we solve the problem of increased demands for quality network bandwidth? How do we guarantee our packets will get from our sources to our intended destinations without loss delay and most importantly of all how can we know that are packets are traveling thru authorized secure networks? Traditional networking infrastructure relay packets of information via routers that determine the next best path each packet was to take. Based on different routing algorithms each packet was sent down the shortest path or quickest path whichever is deemed to be the priority. Each time a packet arrived at a router their fate would be determined by a routing table governed by complex algorithms. The most basic constructs of IP routing do not include considerations to the quality of network that the packet will travel nor does it take into account what is the most secure path a packet can take. It is only concerned with how it can get a packet to its destination while minimizing the distance (hops). MPLS or Multi Protocol Label switch is the answer to our concerns above. Since traditional IP networks have no means of labeling, categorizing or monitoring the packets that traverse them it is nearly impossible to track and direct specific packets to ensure that priority packets get to their destination via the right channels. MPLS technology works to solve these IP shortcomings. What is MPLS MPLS is an “overlay” protocol, meaning that MPLS uses the existing structure of traditional IP switching enhanced with label or tags to aid in this new way of relaying packets. MPLS takes advantage of all the benefits of traditional IP switching and adds to it the benefits of network quality assurance and security management. Technically MPLS is nothing more than a label header encapsulated into the IP packet header. This label is used to categorize the packet as it travels across the physical network thus enabling the ability for it to be monitored tracked. MPLS hardware transforms the standard IP packets into MPLS packets adding and subtracting labeling information as they enter and leave the network. This ensures compatibility to current consumer computer equipment and eliminates the need for end users to make hardware upgrades to take advantage of the benefits of MPLS.
  • 4. How it works: MPLS MPLS-equipped networks use MPLS-aware devices known as label edge routers (LERs), positioned at the network’s edges. These devices are designed to inspect IP packets entering the network and add MPLS headers, as well as removing the headers from packets leaving the MPLS network. Inside the boundaries of the MPLS network, devices known as label switch routers (LSRs) look for an MPLS label on each packet as they passes through them. By looking up and following the instructions contained in those labels and routing them based on a list of instructions we obtain the ability to control, monitor and direct packets to and from network paths of our choice. Diagram A - http://www.nwfusion.com/news/tech/0524tech.html Benefits Derivations • Security • Quality of Service (QoS) • Routing Efficiency • Backward compatibility and Cost efficiency • Traffic Engineering
  • 5. Applications: Where can MPLS thrive? MPLS technology main thrives in large network implementations where mass amounts of data needs to be transmitted through different physical networks quickly, efficiently and securely. In many cases finding the optimal path of information is not an easy task. Network administrators need the flexibility to dictate where on the network specific packets of information must flow based on technical or business criteria. MPLS allows network administrators the ability to direct critical traffic thru only secure networks and non critical data thru general network backbone connections. The greatest and simplest example of current technology that can use the strengths of MPLS technology is VPN (Virtual private networking). VPN is the establishment of a secure connection to a host severs thru insecure networks (such as the internet) often known as tunneling. Diagram B - http://www.helpdesk.umd.edu/topics/applications/vpn/3836
  • 6. Diagram C - http://www.helpdesk.umd.edu/topics/applications/vpn/3836 As described in the diagrams above users create a “tunneled” secure connection to specific host servers passing thru unknown physical networks of the internet domain. Packets may very well travel thru networks belonging to malicious hackers. Even though this information is often encrypted hackers can and will find a way to intercept and decrypted messages that pass thru their networks. MPLS can mitigate this security threat completely. As network administrator you may be required to establish a VPN connection between two locations. The data sent maybe extremely sensitive. With MPLS and VPN technology you will be able to establish a connection and ensure that this information only travels via certain trusted networks. Doing so can ensure data is transferred safely, securely and efficiently. In the diagrams below you will see the concepts of VPN without MPLS and VPN with MPLS illustrated. The main difference is VPN connection established via MPSL will travel via Virtually Leased Lines (VLL). These lines are provided by large network service providers which ensure the lines are secure and always are of highest quality.
  • 7. Diagram D - http://www.netcraftsmen.net/welcher/papers/mplsvpn.html Diagram E - http://www.foundrynet.com/solutions/appNotes/PDFs/DM_VLL.pdf
  • 8. Conclusion Since the exponential like growth of the internet we have noticed correlating phenomena that hardware limits are being pushed to dangerously instable levels. By devising new and more cleaver ways to route information to and from different locations we can accommodate the increasing demands while postponing the changing of standards and expenditure. We can use what we have now in smarter more efficient ways postpone the need to expand or upgrade our current network systems. MPLS is the solution to our ever expanding internet usage. By use of cleaver routing techniques not only can we achieve more efficient usage of our physical networks but we can also have the additional benefits of security and flexibility. Bibliography Author Unknown Introduction to MPLS .. Explaining Multi-protocol Label Switching Retrieved Feb 28th, 2004 from http://findvpn.com/articles/mpls.php