Professional Documents
Culture Documents
By
Anwar Kade
Advisor
Technology Management
October 2020
Addis Ababa, Ethiopia
By
Anwar Kade
This thesis has been approved in partial fulfillment of the requirements for the Degree
Technology Management
October 2020
DECLARATION
Word Template by Friedman & Morgan 2014
2
I, the undersigned, declare that this thesis work is my original work, has not been presented
for a degree in this or any other universities, and all sources of materials used for the thesis
____________________
Signature
October 2020
Addis Ababa
Ethiopia
This thesis has been submitted for examination with my approval as an advisor.
__________________
Signature
October 2020
3
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Acknowledgment
First and foremost, my sincere gratitude goes to Almighty ALLAH for giving me the
enablement and capability physically, mentally and spiritually for the completion of this
thesis work.
I would like also to express my sincere thanks to my advisor Dr. Sreenivas Nune for his
unreserved encouragement, excellent advice, and continuous support during the work of this
thesis. Without his comment, information, guidance, and suggestion of several breakthroughs
I also want to thank EthioTelecom IP Quality of Service Management Section staffs for their
provision of necessary data to prepare this thesis. At last, I would also like to take this
opportunity to acknowledge Mr. Nuredin Mohammed for this support and encouragement. I
1
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Table of Contents
Acknowledgment................................................................................................................3
Table of Contents...............................................................................................................4
List of Acronyms................................................................................................................7
List of Tables....................................................................................................................10
List of Figures..................................................................................................................11
Abstract............................................................................................................................14
Chapter One.....................................................................................................................15
1 Introduction.................................................................................................................15
1.1 Background..........................................................................................................15
1.3 Objectives.............................................................................................................22
1.4 Methodology.........................................................................................................22
1.6 Contributions.......................................................................................................25
2
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Chapter Two.....................................................................................................................28
Chapter Three..................................................................................................................54
3.1 Introduction..........................................................................................................54
3.2.2 Interfaces..................................................................................................57
3.2.7 Creating EBGP peer relationship between the PE and CE routers. . .60
3
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
3.6 Discussions............................................................................................................77
Chapter Four....................................................................................................................86
4.1 Conclusions...........................................................................................................86
Reference..........................................................................................................................90
Appendices........................................................................................................................94
4
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
1 List of Acronyms
6
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
List of Tables
Table 1-1 Total BGP MPS VPN EthioTelecom SLA customers and Sample size [24]..........24
Table 3-5 5 the similarities and differences between existing and proposed network
architecture...............................................................................................................................78
Table 3-6 Exist and proposed network architecture numerical QoS results............................85
7
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
List of Figures
Figure 1:1 BGP MPLS VPN components and working principles [3]....................................18
Figure 3:1 Simplified Proposed BGP MPLS VPN network architecture with end-to-end QoS.
..................................................................................................................................................54
8
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:20 FTP response time with light load (Blue - MPLS, Red - MPLS /DiffServ).........80
Figure 3:21 FTP traffic response time with heavy Load (Blue - DiffServ; Red- MPLS).......80
Figure 3:22 End-to-end traffic delay Voice with light load (Blue MPLS; Red / DiffServ).....81
Figure 3:23 Delayed end-to-end traffic Voice with heavy load (Blue - MPLS / DiffServ; Red-
MPLS)......................................................................................................................................81
Figure 3:24 Variation of delay (jitter) of traffic Voice with light load (Blue - MPLS; Red -
MPLS / DiffServ).....................................................................................................................82
Figure 3:25 Variation of the Delay Delay (Jitter) of Voice heavy load traffic (Blue - MPLS,
Red-MPLS / DiffServ).............................................................................................................82
Figure 3:26 Video End-to-End Delay with Light Load (Blue - MPLS; Red - MPLS /
DiffServ)..................................................................................................................................83
9
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:27 Video End-to-End Delays with heavy Load (Blue - MPLS / DiffServ; Red-
MPLS)......................................................................................................................................83
Figure 3:28 Variation of the delay time (jitter) of video traffic with light load (Blue - MPLS;
Red - MPLS / DiffServ)...........................................................................................................84
Figure 3:29 Variation of delay of video traffic with heavy Load (Blue - MPLS / DiffServ;
Red - MPLS)............................................................................................................................84
10
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Abstract
The primary goals of Quality of Service are bandwidth management, controlled jitter,
latency, and improved packet loss characteristics to provide satisfactory services for users.
Shaping network optimization is crucial for the service provider. To implement the network
QoS, optimizing the current network physical and logical architectures is among the best
practice.
The approach used in this work was to design and build an operator network type backbone
to simulate a real scenario that conveys different types of traffic. The results of the work are
presented according to the simulation time and the network load. The results of the
comparison demonstrate the advantage over the performance of MPLS networks with
In this research work, an attempt has been made to investigate the end-to-end QoS parameters
of the Ethio-Telecom service level agreement (SLA) customer's network by using the
differentiated service (DiffServ) model, to manage end-to-end traffic delay, jitter, and packet
loss. The traffic is classified and marked depending on their priorities assigned. The proposed
network architecture has used weighted fair queuing (WFQ) for congestion management and
weighted random early detection (WRED) for the congestion avoidance method.
The eNSP and Wireshark have used been to design, demonstrate, and evaluate the existing
and proposed network architectures. Once the results of the existing network are compared
with the proposed network architecture that is designed using the DiffServ model; delay,
jitter, and packet loss have decreased whereas the traffic bandwidth utilization increased.
network simulator.
11
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Chapter One
2 Introduction
2.1 Background
The last decade has witnessed a major change in the types of traffic scaling with the
networks. Some of these challenges are better end-to-end bandwidth, delay, jitter, and packet
loss, etc. To combat these challenges, researchers have steered towards finding alternate
solutions. One of the alternate solutions found were to use Multiprotocol Label Switching
(MPLS) in the network[1]. MPLS architectures can be deployed on existing service provider
backbones reducing infrastructure costs and increase network performance. MPLS can also
be used to interconnect geographically diverse sites while at the same time, reduce the delay
Now a day because of a different kind of traffic such as voice, video, and data are sent over
the same network infrastructure quality of service is a big issue for enterprise. Multiprotocol
label switching (MPLS) virtual private networks (VPN) are the new alternatives to private
wide area networks (WAN) services[2] [3]. Due to the effectiveness of MPLS VPN
enterprise customers are moving to service providers that offer MPLS VPNs. The reason for
this shifting is the capability of MPLS VPN to provide built-in security features and end-to-
end connectivity. QoS is the most important factor for enterprise networks. Using the
Multiprotocol border gateway protocol (MP BGP) MPLS VPNs assures the quality of
services for these enterprises. To guarantee the quality of service for different types of traffic,
the differential service (DiffServ) QoS model can be used with MP BGP MPLS VPN[4] [5].
It provides a good performance service in terms of better end-to-end bandwidth, delay, jitter,
12
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
In the case of EthioTelecom SLA customers, MP BGP MPLS VPNs services subscription the
customers have a service level agreement (SLA) with the company on end-to-end QoS to
guarantee the quality and performance of service provided. To achieve the intended Qos the
Company is also working on it by setting SLA targets. But still, there is a gap between the
company's SLA targets and what SLA enterprise customers have been getting[6] [7].
users, which are necessary to achieve the required functionality of service[8] [9]. The users
delay or packet loss and the network commits its bandwidth making use of different QoS
schemes to satisfy the request. Each service model has its own QoS parameters. Its
parameters and measures are necessary to indicate how well a service is and therefore, is an
important point when selecting services offered by different service providers. If service
features price are similar, quality becomes the differentiator for users, as well as, service
providers can make use of quality to have an image of a “respected” provider[8] [10].
VPN is a network connection between devices that do not share a physical cable. Virtual
customer using a Service Provider backbone network in place of dedicated leased lines. Each
customer site is directly connected to the SP backbone[3]. The SP can offer a VPN service
more economically than if dedicated private WANs are built by each customer because the
SP can share the same backbone network resources (bandwidth, redundant links) between
many customers. The customer also gains by outsourcing the complex task of planning,
There are two different methods to construct VPNs across the IP backbone that is custom
premises equipment (CPE) based and network-based[11]. Most current VPN implementations
are based on CPE equipment. VPN capabilities are being integrated into a wide variety of
13
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
CPE devices, ranging from firewalls to WAN edge routers. On the other hand, there is a
significant interest in network-based VPNs where the operation of the VPN is outsourced to
Multiprotocol label switching (MPLS) is a versatile solution to address the problems faced by
networks. MPLS addresses issues related to scalability and routing (based on QoS and service
BGP is a standardized exterior gateway protocol (EGP), as opposed to RIP, OSPF, and
EIGRP which are interior gateway protocols (IGP’s) and considered as “Path Vector” routing
protocol. BGP is not built to route within an Autonomous System (AS), but rather to route
between AS's. BGP maintains a separate routing table based on the shortest AS Path and
various other attributes, as opposed to IGP metrics like distance or cost[13] [14].
BGP MPLS VPN is a layer 3 Provider-provisioned VPN where Enterprises have sites spread
across distant locations that need to be interconnected[15] [5]. Instead of having fully
dedicated links between their sites, many enterprises prefer to contract a Virtual Private
Network (VPN) service from a VPN service provider, thereby reducing the connection costs.
This service model is known as the provider-provisioned VPN service. In this model, the
VPN provider shares its physical network infrastructure among multiple enterprises,
guaranteeing isolation of virtual networks. This technology uses BGP as a control plane to
provide VPN routing and MPLS as a transport technique to achieve isolation between
customer traffic. Its popularity as a result of the high number of customers supported. The
key core network elements of a provider-provisioned BGP/MPLS VPN network are provider
edge (PE) and provider core (P) routers as shown in Fig 1.1[3], whereas the customer edge
14
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
(CE) router is not considered part of the provider’s core network. It acts as a peer of the PE
Figure 1:1 BGP MPLS VPN components and working principles [3].
The routers that link the customer sites to the provider network are called customer edge (CE)
routers, whereas the service provider routers to which the CE routers are connected are called
provider edge (PE) routers. In most cases, the provider network is made up of more than just
the PE routers; those other routers are called P devices [10].PE routers take the charge of both
accessing VPN service and forwarding packets from private intranet to the public internet,
whereas P routers only have basic forwarding and typically are not have directly connecting
customer access circuits[16] [17]. All PE and P routers run label switching so that they can
build MPLS label switched paths (LSPs) from each PE to each other PE. This is achieved
through the use of the label distribution protocol (LDP) in conjunction with the interior
When a PE forwards a VPN-addressed packet across the core it adds two MPLS labels, one
external which identifies the PE in the provider backbone, and the other internal which
identifies the interface inside the PE. Any intermediate P or PE routers switch the packet to
the egress PE using the outer label only[5] [3]. The inner label is used by the egress PE to
determine the VPN port to which the packet should be forwarded. Each PE router supports
multiple routing and forwarding tables called virtual route forwarding (VRF) tables. Every
site to which the PE is attached must be mapped to one of those forwarding tables. When a
15
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
packet is received from a particular site, the forwarding table associated with that site is
BGP MPLS VPN service models are provided for user services to ensure QoS according to
the user’s requirements and the quality of the network[15] [18]. The common service models
are as follows:
The Best Effort is a traditional Internet model, without any QoS guarantees. The IP networks
just route packets until they reach the destination. It is realized through the FIFO mechanism.
The integrated service model is the first standardized mechanism by IETF, which is based on
resource reservation in routers on the path by using signaling that means, does not send
packets until the arrival of confirmation that the network has reserved resources for it. It is an
end-to-end QoS mechanism[19]. The Differentiated service model is the most commonly
used method for traffic differentiation on the Internet, in which all packets are classified into
a limited number of classes, So routers have to store only information per class (not per
16
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The main goal of improving QoS is to guarantee end-to-end service delivery. QoS includes
Optimization of the network by using the different queuing algorithm is the best suit to
increase the network QoS. Increasing network performance increases end-user perception and
EthioTelecom is one of the enterprises that offer BGP MPLS VPN in Ethiopia for its SLA
customers. These services are widely used in IP MPLS networks for connecting customers’
remote VPN sites. According to the literature review done on the company's QoS level in[8]
[20] [21], service provider faced many challenges such as low bandwidth, high jitter, high
packet drops, and high packet delay which degrade the quality of service and overall network
from the company's BGP MPLS VPN SLA customers, 41 % of their connection has QoS
problems
EthioTelecom has done continuous optimization on MPLS VPN SLA customer’s network, to
provide QoS for its customers. Moreover, the company did continuous expansion projects in
its existing networks[21] [3]. For example, it has recently expanded the existing network of
IP backhaul, multiple service access gateways (MSAG), and multiple service access nodes
(MSAN) plantation projects for broadband VPN and Internet customers, and still an end-to-
There is a detailed analysis done by its IP QoS management team[2] [22] [20], on QoS of
BGP MPLS VPN of SLA customers. The analysis result shows that there are some gaps
between the company’s SLA targets and analysis results which what customers are getting.
This might be caused by improper network optimization and customer LAN side problems.
17
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Moreover, there are several VPN complaints from end-users across the country upon poor
bandwidth, high packet drops, high packet delay, and high jitter as suggested by the team in a
fixed access network, operation, and maintenance department of the company[22] [20]. It has
happened because there were QoS problems. The cause of these problems is EthioTelecom
Fig.1.3.In the existing network architecture of the company, there are three types of routers,
two P, four PE, and two CE routers. These routers have their functionalities in the
EthioTelecom Currently treaties all customers which are SLA, major and residential network
equally which lead to QoS and overall network performance problems. These problems arise
because of the company using the Best Effort QoS model, FIFO for congestion management,
and tail drop for congestion avoidance. Because of the above-mentioned gap, the research is
motivated to address the above problems by optimizing the network logically using a
18
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
2.3 Objectives
The general objective of this research study is to identify EthioTelecom BGP MPLS VPN of
SLA customer’s QoS complaints, analyze the result to the company's SLA targets and ITU
threshold values, design solution to improve the service, and evaluate the proposed solution.
Propose the solution to improve QoS of BGP MPLS VPN of the company's SLA
customer's problems.
Design, demonstrate, and evaluate the solution to improve the QoS of BGP MPLS
2.4 Methodology
For the sec of effectiveness, this section of the research thesis work includes the general
approach and specific method, type of data and source, sample size and sampling techniques,
instruments and procedures for data collection, process and analysis, methods of data analysis
Design science was chosen, as a research approach, because it was particularly suitable to
conduct “practical” research by combining Information System research with the process of
design and development[23]. Design science is a research method where the researcher
interacts with the participant through questionnaires to gather data regarding the current
status and conditions of the services. Moreover, literature review and related work have been
19
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
made to decide the state of art in the area. Then the design, development, demonstration, and
evaluation of improved QoS of MPLS VPN of EthioTelecom SLA customers have been
done.
The questionnaire approach helps to collect precise information concerning the status of QoS
the link between QoS of MPLS VPN and quality of service parameter (bandwidth, delay,
jitter, and packet loss ratio). A literature review is the best suit to compare and contrast the
QoS of EthioTelecom that has been promised in its SLA and what the customers are getting.
In general, a literature review is the best method to identify and analyze the existing
conditions of QoS of BGP MPLS VPN of SLA customers, compare the existing conditions
with SLA and ITU target values shortly and briefly. Because of this, the researcher was
The primary and secondary data sources were used for the study. Concerning the primary
source, data was collected randomly from seventeen EthioTelecom BGP MPLS VPN of SLA
customers out of one hundred seven as a sample from different parts of the country.
Additionally, secondary data was gathered from applicable documents such as SLA charter,
QoS guide, network element configuration guide, achieved configuration, and empirical
The total sample size involved in this study was seventeen EthioTelecom BGP MPLS VPN
of SLA customers from different parts of the country as shown in Table 1.1. The researcher
takes a sample of 16 % SLA customers from those that use different types of networks using
Table 1-1 Total BGP MPS VPN EthioTelecom SLA customers and Sample size [24].
ADSL/VDSL 3 2
EPON 31 4
GPON 23 4
DIRECT FIBER 29 4
AIRONET 17 3
TOTAL 107 17
The data for this study were collected from both primary and secondary sources. As a
primary source, a questionnaire was used. The questionnaire is a close-ended type. Before
distributing the questionnaire, to determine the quality and reliability of the questionnaire, the
researcher distributed the questionnaire to four participants who were not included in the
actual study to check if there is any unclear idea or statement. As a result, based on the
feedback obtained some questions were rephrased or rewritten which lacked clarity. The
secondary data was conducted from archived database management of EthioTelecom SLA
charter, QoS guide, network element configuration guide, and CPE configuration guide
The collected data through close-ended questionnaires were analyzed and compared against
QoS of EthioTelecom SLA targets and ITU threshold values then by taking the analyzed data
as input, the researcher has modeled the traffic flows which is traffic flow architecture by
Taking the gap of analyzed data as input, the researcher has modeled the QoS of
EthioTelecom BGP MPLS VPN of SLA customers. The researcher also used the DiffServ
model by giving priority to the class of services at network and data link layers. The
21
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
researcher used weighted fair queueing and weighted random early detection algorithms for
congestion management and congestion avoidance respectively. The traffic flows were
studied using computer network modeling and simulations tools such as Wire shark and
eNSP. The simulation process covered end-to-end QoS delivery. Bandwidth and other QoS
parameters latency, jitter, and packet delay have been reviewed to the QoS of EthioTelecom’s
This study has shown the analysis of QoS of BGP MPLS VPN of EthioTelecom SLA
customer’s status and the numerical result has compared with the SLA targets and ITU
standard threshold values. Taking the numerical results as input the study has proposed a way
of improving QoS of BGP MPLS VPN of the company's SLA customer’s network. For the
proposed solution practical modeling and demonstration of the EthioTelecom high speed and
optimized network usage have been conducted. Moreover, the study has designed,
demonstrated, and evaluated the solution to improve the QoS of BGP MPLS VPN of SLA
customer’s network.
2.6 Contributions
QoS of BGP MPLS VPN is one of the areas that need very strict follow up in the
telecommunication sector. This is because every SLA customer needs uninterrupted services
to support their day to day activities. This, in turn, demands end-to-end network traffic
optimization and attention must be given to improving QoS of BGP MPLS VPN. To exploit
the maximum possible capacity of the network and understand its usage after installing the
networks.
22
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
This research work contributed to improving the QoS of BGP MPLS VPN of EthioTelecom’s
SLA customer’s network connection. This is done by traffic classification, marking, shaping,
and policing using different KPIs by the Differentiated Service DiffServ QoS model. The
proposed solution has been designed, developed, demonstrated, and evaluated using
computer-aided tools.
This study has evaluated the existing quality of services of BGP MPLS VPN of seventeen
EthioTelecom SLA customer’s connection moreover compare the level of existing quality of
services to the company's SLA targets and ITU standard threshold values. After evaluation
and comparison, the study has taken the gap in existing QoS as input and developed a logical
architecture design to improve QoS. The proposed solution has been designed, demonstrated,
and evaluated using computer-aided tools in a detailed manner. However, the overall process
of improving the QoS of the existing infrastructure is done by using traffic management and
queuing algorithms.
Implementing end-to-end QoS of BGP MPLS VPN could be done by optimizing both the
current network physical and logical architectures. But this study has not focused on the
physical design architectures to improve the existing QoS of BGP MPLS VPN of SLA
customers. Moreover, the simulation has used the developed sample models and randomly
selected variables for the packet arrival rate. But on the real traffic, there is an additional
configuration such as for bidirectional forwarding, time synchronization, and fast route
recovery. These variables are generated after close inspection of the real network scenario.
23
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
This thesis paper contains four chapters. Chapter one deals with the introduction of the whole
contribution, scopes, and limitations. Chapter two presents the MPLS, BGP, VPN, and QoS
model used. It also showed some light on what other authors and researchers have forward
their ideas on the area of improving QoS of MP BGP MPLS VPNs were presented.
The proposed network architecture was presented in chapter three. This includes how BGP,
MPLS, VPN, and QoS were designed, demonstrated, and evaluated with the DiffServ model.
The experimental results and discussions were also presented. Finally, the chapter four
24
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Chapter Two
rough review of the study. This review leads to a better understanding of the thesis contents.
This section of the study reviews former contributions on improving QoS of BGP MPLS
VPN using different approaches and different models such as best effort, integrated service,
differential service models. The goal of this section is to understand the problem and
emphasize the research gap related to the study. Moreover, a brief review has been made on
BGP, MPLS, VPN, QoS threshold and model, and traffic shaping (policing), and congestion
management.
QoS technologies refer to the set of tools and techniques to manage network resources and
are considered as the key enabling technology for network convergence. The objective of
QoS technologies is to make voice, video, and data convergence appear transparent to end-
users [25] [26]. QoS technologies allow different types of traffic to contend inequitably for
network resources. Voice, video, and critical data applications may be granted priority or
preferential services from network devices so that the quality of these strategic applications
does not degrade to the point of being unusable. Therefore, QoS is a critical, intrinsic element
QoS of any service is acceptable when they fulfill SLA and leads to proper customer
satisfaction [7]. To guarantee the full throughput, a specific level of assurance is required
over the traffic load to reduce losses, jitters, and delays. QoS has several tools which include
[8] [27]
Scheduling tools.
Border Gateway Protocol (BGP) is the prevalent wide-area routing protocol, the internet
composed of Autonomous System (AS's) that use BGP to implement inter-AS and intra-AS
Origin, AS path, Next-hop, Community). Routing involves two basic tasks, the first task is
the determination of optimal routing paths, which is the complex, and the second is the
transport of information groups (Packets) through an internetwork, here the researcher uses
BGP design motivated by three important goals, first one is scalability through dividing
implement and enforce various forms of routing policies, and the last one is cooperation
under competitive circumstances in which the structure allow AS to determine among any set
of choices [13].
policies in deciding how to route its packets to the rest of the Internet, and how to export its
routes to other AS, and identified by a unique 16-bit number (the new is a 32-bit number).
Inside AS operates different routing protocols (Interior Gateway Protocols – IGPs) which
includes (RIP, OSPF, IS-IS, E-IGRP), and in contrast inter-domain protocols like BGP are
information about a list of AS paths with other BGP systems. From this information it
constructs AS connectivity graph so loops pruned and AS policy decisions enforced, each
BGP router maintains a routing table that lists all feasible paths to a particular network,
routing in [15] formation received from peer routers is retained until an incremental update is
26
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
received, BGP routers exchange routing information upon initial data exchange and after
incremental updates, when an update occurs routers send the portion of their routing table
MPLS is an Internet Engineering Task Force specified framework that provides efficient,
routing, and switching of traffic flow through the network. It is a technology for the delivery
of IP services. It gives the ability to offer highly scalable, advanced IP services end-to-end
with simpler configuration and management for both service providers and customers.
Enterprises and corporations use these technologies to create their service simple and price
economical. Instead of the IP address or MAC address, MPLS works on small labels. These
labels are inserted between layer 2 and layer 3 of OSI. Forwarding decisions are based on
these labels instead of having to look at complex IP tables [1] [17] [12].
MPLS is either layer 2 or layer 3 technology. It is referred to as layer 2.5. It gives the speed
of layer 2 and the dynamics of layer 3 technologies. The interesting factor is its flexibility of
use as completely layer 2 or layer 3 technologies. It can also be used as a combination of both
layers. In MPLS VPN it is solely used as layer 3 technology making labels based on IP
addresses. In the case of VPLS, it makes labels based on MAC addresses, making it a layer 2
technology. Thus, the adaptability of MPLS makes it charismatic for professionals. The
MPLS label position in different types of technologies can be seen in Figure 2.1 [29].
27
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Experimental: 3 bits
In an MPLS network, each packet gets labeled on entry into the service provider's network by
the ingress router, also known as the label edge router (LER). This is also the router that
decides the LSP the packet will take until it reaches its destination address. All the
subsequent label-switching routers (LSRs) perform packet forwarding based only on those
MPLS labels. Finally, the egress router removes the labels and forwards the original IP
packet toward its final destination. When an LSR receives a packet, it performs one or more
Swap: Replaces a label. This is usually performed by LSRs between the ingress and egress
routers.
Pop: Removes a label. This is most often done by the egress router.
28
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The MPLS architecture describes the mechanisms to perform label switching, which
combines the benefits of packet forwarding based on Layer 2 switching with the benefits of
Layer 3 routing [17]. MPLS assigns labels to packets for transport across packet- or cell-
based networks. The forwarding mechanism throughout the network is label swapping, in
which units of data (for example, a packet or a cell) carry a short, fixed-length label that tells
switching nodes along the path of the packet how to process and forward the data [32].
Control Plane collects the information that is used to forward the incoming packets; While
Forwarding Plane decides how to switch the incoming packets after being received at the
devices by the use of different protocols namely routing protocols (e.g., RIP, EIGRP, OSPF,
and BGP) and label exchange information protocols (e.g., LDP, TDP, RSVP, etc.) [16] [17].
Data Plane has a forwarding plane that is based on the information attached to labels. There
are two types of tables, namely LIB and LFIB. Label Forwarding Information Base (LFIB) is
used by the data plane to forward the labeled packets. The Local Information Base (LIB)
table contains all the local labels and the mapping of the labels which is received from the
adjacent routers. The information in LFIB and label value is used by the MPLS-enabled
29
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
So that LSPs can be used, the forwarding tables at each LSR must be populated with the
mappings from {incoming interface, label value} to {outgoing interface, label value}. This
The packet in the MPLS network that must pass through the network is forwarded over the
label switch path (LSP) tunnel. When the packet reaches the MPLS network then the Ingress
router receives the packet and puts the MPLS label in the packet and sends it to the next hop
according to the destination address in the packet. There can be many LSRs between Ingress
and Egress routers, so when the packet reaches an LSR it swaps the labels and sends it to the
next LSR. When the packet reaches the egress router, it strips off all the labels and sends it to
the outgo. All the LSRs have interior gateway routing (IGP) [17] [12].
MPLS VPN is a network that connects private networks over the public network.
Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) technology has
enabled the service provider network and enterprise network to agree on common terms for
the provision of end-to-end service levels [5] [16]. Service providers use VPNs to
interconnect different sites that belong to the same corporation. At the IP layer, VPN models
might require that different VPNs are required to connect and also provide connectivity to the
L2VPN and
L3VPN
There are some basic building blocks for the MPLS VPN at Provider edge routers. These are
The combination of the VPN IP routing table and the associated VPN IP forwarding table is
called the VPN routing and forwarding instance (VRF) [5]. VRF is used to make the MPLS
VPN networks private. The VRF makes sure that the routing information is kept separate
from different customers and that the backbone of the MPLS network makes sure that the
packet forwarding is based on label information and not on the information in the IP header.
On PE routers each VPN has its separate routing table and this routing table is called the VRF
routing table. A PE router interface that is towards the CE router only has one VRF, so that
all IP packets coming to that interface will be considered as they are belonging to that VRF. It
is because there is a separate routing table per VPN. An interface can only assign to one
VRF, but several interfaces can be assigned to the same VRF [17] [4].
Multiprotocol BGP (MP-BGP) is used by the VPN to propagate its prefixes over the MPLS
VPN networks. The IPv4 prefixes carried by BGP across the service providers' network
problem in routing. To overcome this problem, the route distinguisher concept was developed
to make IPv4 prefixes unique. The idea is that a unique identifier is received from each
customer with each prefix to differentiate the same prefix from other customers. The IPv4
prefix and RD combine to give the vpnv4 prefix. VPNv4 prefixes are carried by MP-BGP
31
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The route distinguisher (RD) is a 64-bit field that makes the VRF prefixes unique [31]. This
64-bit value can be in two formats: ASN: xx or IP-address: xx where xx is a number, and
ASN stands for autonomous system number. ASN: xx is the popular format used by most
service providers. Internet Assigned Numbers Authority (IANA) assigns ASN to the service
providers, and xx is the number uniquely assigned to VRF by the service provider. RD
combines with IPv4 prefixes to form a VPNv4 prefix that is 96 bit long [17].
A Route Target is the feature of MPLS VPN which controls the communication between
different VPN sites. The Route Target (RT) was introduced to overcome the drawbacks of the
route distinguisher (RD) since the RD can only communicate with one VPN; whereas RT can
Route Target (RT) is the BGP extended member which indicates the route that should be
imported from MPLS BGP into VRF. The RT attached with the vpnv4 route is called the
exported route and configured under the IP vrf command separately for each virtual routing
table on the PE router. The vpnv4 route received from MPLS BGP is examined for a
matching extended community which is the route-target. This procedure is called importing
an RT. If the result matches, the prefix is inserted into the VRF routing table as the vpnv4
different types of addresses besides IPv4 unicast [15]. MP-BGP supports IPv4 and IPv6
unicast, IPv4, and IPv6 multicast and also VPN labels that are used in MPLS-VPN. MP-BGP
is required only within the service provider's backbone. Therefore, all MP-BGP sessions are
internal BGP sessions, internal because the session is between two routers that belong to the
specific network traffic using different technologies like ATM, SONET, and MPLS, etc. The
main purpose of QoS is to prioritize specific traffic over another i.e. to take into consideration
Jitter, Latency, Packet Loss, and Burst of Jitter and Loss and minimize all these factors for
that flow specifically. It should also be considered that prioritizing one traffic flow must not
make another fail. QoS of any service is acceptable when they fulfill SLA and leads to proper
It provides a different level of treatment to the different types of traffic or applications that
flow over the network. QoS is required to provide the good management of network
resources that makes the sophisticated usage of resources and gives comfort to the network
user. There are mainly four measurement units for QoS [8]:
1. Available Bandwidth
2. Latency
4. Packet Loss
3.1.5.1 Bandwidth
transmit the maximum amount of data from one point to another over a computer network or
internet connection in a given amount of time. On the network, IP Packets travel through the
The bandwidth requirements are met for those applications which need it. If the network
contains low bandwidth and voice traffic is transported over it then users will experience
broken sentences. Similarly, when the video traffic is transported over the low bandwidth
33
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
network then the picture will start sticking and the enjoyment of the video is adversely
affected. Therefore, proper network planning and other factors need to be considered while
Classify and mark traffic and apply to the queue: - Forward important packet first.
Use Compression technique: - Layer 2 payload compression, TCP header compression, and
compressed RTP (cRTP) are some examples. Usage of hardware compression is preferable
over software-based compression because compressions are CPU intensive and create a
delay.
3.1.5.2 Latency
Latency is a time that a packet takes in traveling from a sender node to a receiver node.
Sometimes, it is also considered a time a packet takes to make a round trip from the source to
the destination and back to the source. Various parameters, such as propagation time,
transmission media, and processing time at each network node, affect the delay. The voice
and video data are very sensitive to latency. Little more delay in transporting voice and video
data harms the Quality of Service to the application. End-to-end delay is the sum of all the
Processing delay
Queuing delay
Propagation delay.
3.1.5.3 Jitter
Jitter is a delay between two packets at the receiving end. When there is a heavy load in the
network, the data must be buffered and queued in any given network node. As a result, the
34
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
amount of delay between two packets is inconsistent (variable). This variable delay is called
Jitter. The voice traffic is very sensitive to Jitter because the inconsistent delay will cause a
In a data network, packets may get lost or dropped due to so several reasons. One common
reason is higher network utilization or congestion. In this case, the drop in voice or video
Packet loss occurs due to the low buffer space. When the buffers space of the interface full
then packets are dropped. In queue scheduling, packet loss will occur if the queue is full.
Packet loss creates extended delays and jitter. Packet loss can be controlled by applying some
techniques such as tail drop, random early detection, weighted random early detection, and
QoS is technically dependent on the four-pillar which are bandwidth, delay, packet loss, and
trends, advertising, tariffs, and costs which are interrelated to the customer expectation of the
QoS [5].
35
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
QoS can be divided into two viewpoints Customer viewpoints and Service provider
viewpoints. Customer viewpoints include QoS requirements and perception whereas service
provider viewpoints include QoS offered and QoS achieved as shown in detail in the below
framework.
Network QoS is not well defined by itself. It is best described by including network
performance and quality of experience. For example, quality of experience impacts QoS and
Generally, the network performance and quality of experience are very much interrelated. If
network performance was well optimized, the service provider viewpoint reaches a high
level. If a Service provider affords quality services to its customer, the customer viewpoint
was reached at a high level which increases the quality of experience [33] [26].
This Recommendation defines classes of network Quality of Service (QoS) and specifies
provisional objectives for Internet Protocol network performance parameters [34]. These
classes are intended to be the basis for agreements among network providers and between
end-users and their network providers. By considering a range of applications involving the
media such as, voice, video, image, and data the parameters that govern end-user satisfaction
for these applications and a broad classification of end-user QoS categories are determined. It
36
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
is intended that these categories are used as the basis for deriving realistic QoS classes and
A typical user is not concerned with how a particular service is implemented. However, the
user is interested in comparing the same service offered by different providers in terms of
expressed by parameters.
values
Delay variation
Information loss
The typical amount of data
Acceptable < 4 s
37
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
QoS is a configuration that prioritizes data traffic based on a traffic type or destination. So
that in the event of congestion on a network, a site's critical traffic has higher priority over
other traffic [22] [20] [35]. Currently, in the EthioTelecom network, all packets from all
customers are treated equitably; thereby generalized IP network performance targets are set
subscribed BW
QoS Models Describes a set of end-to-end QoS capabilities. End-to-end QoS is the ability of
the network to deliver service required by specific network traffic from one end of the
Service models are used to provide an end-to-end QoS guarantee based on specific
Best-Effort Model
The best effort is a single service model in which an application sends data whenever it must,
in any quantity, and without requesting permission or first informing the network [7]. For
best-effort service, the network delivers data if it can, without any assurance of reliability,
delay bounds, or throughput. Best-effort service is suitable for a wide range of networked
applications such as general file transfers or e-mail. It can be concluded by the various
analysis of performance evaluation that best-effort service is not best suited for the
Integrated service is a multiple service model that can accommodate multiple QoS
requirements [10]. In this model, the application requests a specific kind of service from the
network before it sends data. The request is made by explicit signaling; the application
informs the network of its traffic profile and requests a particular kind of service that can
encompass its bandwidth and delay requirements. The application is expected to send data
only after it gets a confirmation from the network. It is also expected to send data that lies
Differentiated service is a multiple service model that can satisfy differing QoS requirements.
However, unlike in the integrated service model, an application using differentiated service
does not explicitly signal the router before sending data [30].
For differentiated service, the network tries to deliver a particular kind of service based on the
QoS specified by each packet. This specification can occur in different ways. Using the IP
Precedence bit settings in IP packets or source and destination addresses. The network uses
39
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
the QoS specification to classify, mark, shape, and police traffic and to perform intelligent
queuing [5].
The differentiated service model is used for several mission-critical applications and for
providing end-to-end QoS. Typically, this service model is appropriate for aggregate flows
The differentiated service model QoS includes the following features that support [4] [30]:
Committed access rate (CAR), which performs metering and policing of traffic, providing
bandwidth management.
Intelligent queuing schemes such as WRED and WFQ and their equivalent features on the
Versatile Interface Processor (VIP), which are distributed WRED (DWRED) and distributed
WFQ. These features can be used with CAR to deliver differentiated services.
Differentiated Service Model comes after the IntServ QoS model. It overcomes the limitation
of the IntServ model. DiffServ is also called the “Soft QoS” model. IntServ model guarantees
for the end-to-end resource reservation before the application takes the start. It uses the RSVP
The DiffServ model is aimed at supporting service differentiation for aggregated traffic in a
scalable manner and to achieve service quality in the MPLS VPN environment. DiffServ QoS
model is widely used in industry due to its scalability [33]. DiffServ model consists of four
avoidance. These were used to control network traffic, resource allocation in different ways,
40
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Classification tools sort packets into different traffic types, to which different policies can be
applied. Classification can be done at every node in the network or be implemented at the
edge of the network when the packet enters the network [16]. Classification of packets can
happen without marking the packets. Classification inspects one or more fields in the packet
to identify the type of traffic that the packet is carrying. After the identification process, the
traffic is handed to the treatment application such as marking, remarking, queuing, policing,
Incoming interface
IP precedence
QoS classification is implemented by marking the type of service (TOS) field in the IP packet
precedence as shown in fig.2.7. IP data stream can be classified based on the different RFC
standards. RFC 791 defines the IP precedence field to divide the IP application into 8
categories. The TOS field is divided into 16 categories. RFC 2472 redefines TOS to divide
RFC 1349 defines bits in the TOS; bits 0 to 2 refer to precedence. The value ranges from 0 to
7. The larger the value is the higher the precedence. The D bit refers to the delay, T bit refers
41
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
to the throughput, R bit refers to the reliability, and C bit refers to the monetary cost. Bits 6
Marking writes a field within the packet, frame, cell, or label to preserve the classification
decision that was reached during the classification process. Marking is also known as
coloring the packet, which involves marking each packet as a member of a network class so
all devices throughout the rest of the network can quickly recognize the packet class. The
marking process sets bits in the DSCP or IP Precedence field of each IP packet according to
the class that the packet is in. Packets that are marked as a high priority, such as a voice
packet, will generally never be dropped by congestion avoidance mechanisms. On the other
hand, if packets are marked as a low priority they will be dropped when congestion occurs
[25] [9].
In Diffserv terminology, the forwarding behavior that is assigned to a DSCP is called the per-
hop behavior (PHB) [3]. The PHB defines the forwarding precedence that a marked packet
receives with other traffic on the Diffserv-aware system. This precedence ultimately
determines whether the IPQoS-enabled system or Diffserv router forwards or drops the
marked packet.
The goal of a PHB is to provide a specified amount of network resources to a class of traffic
on the contiguous network. In the QoS policy, DSCPs indicate the precedence levels for
traffic classes when the traffic flows leave the IPQoS-enabled system. Precedence can range
Best Effort (BE) PHB: Default PHB, which is used for best-effort service.
Class-selector (CS) PHB: Used for backward compatibility with the non-DiffServ
compliant device.
These methods are often necessary on the edge separating a customer's network from a
provider's network. Providers often force the customer to adhere to a specific policy of
service (or committed rate). This policy is referred to as the Service Level Agreement (SLA)
between the customer and the provider. Shaping and policing mechanisms differ in how each
handles violations of the SLA. There are two methods for managing traffic that exceeds a
Traffic shaping
Traffic policing
Shaping is usually implemented on the customer side and will buffer traffic that exceeds the
provider's committed rate. Thus, shaping can slow the traffic rate and siphon out traffic in
compliance with the provider's SLA. Buffering traffic will often create delay and jitter, which
can negatively impact sensitive traffic types [18]. Shaping also requires sufficient memory to
queue buffered traffic. Shaping provides no mechanism to re-mark traffic that exceeds the
committed rate. Policing is usually implemented on the provider side, and will either drop or
Transfer rate or a token bucket system, which is comprised of three parts [11] [14]:
1. Committed Information Rate (CIR) – specifies the traffic rate dictated by the SLA,
43
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
2. Burst Rate (Bc) – specifies the amount of traffic to be sent within a given time
3. Time Interval (Tc) – identifies the time interval for each burst, measured in seconds or
sometimes milliseconds.
The CIR is calculated using the formula: CIR (bps) = Bc (bits) / Tc (seconds)
Both, policing and shaping, use a token bucket as a traffic meter. The token bucket usually
Each token contains the length of the packet (in bits) that it allows the node to send.
The traffic meter checks the packet size and then pulls out the number of tokens required to
If the bucket does not contain enough tokens to send a packet, according to traffic policing,
the packet is dropped. However, in the same situation, the traffic shaping mechanism stores
the excess packets into a buffer and wait for enough tokens to send out the packets.
In the case when the token bucket is full of tokens than more tokens are discarded.
Congestion can happen in computer networks when the offered load and the demands for
network resources exceed the network capacity. During congestion, router buffers are
44
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
overflowed causing large queuing delays, and high packet loss. Congestion reduces the
Congestion management tools are implemented on all output interfaces in a QoS enabled
network the following congestion management queuing methods are used: provide the
First-In-First-Out (FIFO) is the simplest modality of queuing. The incoming packets are put
in a single queue and are processed in the order of receiving them. (Figure 2) Packets are
dropped when the FIFO queue is full (tail drop). This queuing type requires little computation
and its behavior is very predictable, i.e. the delay of the packet is a direct function of the
queue size FIFO the packet arriving first is always processed first [1] [28]. When the capacity
In PQ In the priority queuing, each packet is assigned a priority based on the level of service
requested. All the packets marked with higher priority go in the different queues then the
packets marked as a lower priority. There could be many priority queues. All of the packets
45
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
in the higher priority queue are attended first. The packets in the lower priority queue are
processed only when there are no packets in the higher priority queue.
WFQ is a type of queuing methodology having the purpose to allow fair access for each
incoming flow and to prevent a burst flow from consuming all the output bandwidth. WFQ
includes a queue for each distinct flow and packets from each flow is put into its appropriate
queue [29]. ‘Weighted Fair Queuing (WFQ) supports flows with different bandwidth
requirements. Most obviously we can mention that WFQ does not allow classification options
to be configured. Based on flows, WFQ classifies packets automatically, with each flow
For WFQ, a flow can be described as all packets with the same values for source IP address,
destination IP address, transport layer protocol, TCP or UDP source port, TCP or UDP
destination port, and IP Precedence. Because WFQ puts packets of different flows in different
queues, must have a greater number of queues than all of the non-flow-based queuing
Congestion is said to occur in the network when the resource demands exceed the capacity
and packets are lost due to too much queuing in the network [10]. During congestion, the
network throughput may drop to zero and the path delay may become very high. A
congestion control scheme helps the network to recover from the congestion state [25].
46
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Congestion avoidance is a traffic control mechanism that uses traffic scheduling to prevent
the network from being overloaded. With this mechanism, the device can monitor the usage
of network resources such as queues and buffer areas in the memory and discard packets
when network congestion is intensifying. To avoid congestion, the following algorithms are
Tail Drop
Traditionally, when the queue is reached to its limit and the buffer is full, the tail drop occurs
and all the additional packets are dropped [7] [2]. Due to packet drops, the TCP hosts in the
network will reduce the transmission rate and try to synchronize with each other. All TCP
hosts slow down the transmission rate until the congestion is completely cleared. Once the
congestion is cleared, all TCP hosts start increasing transmission rates. As a result, the
transmission rate is going up and down which leaves the transmission links underutilized
RED works with the TCP transport protocol [37]. The main goal of RED is to
All traffic below MinTh is transmitted without observing any drop packets. All traffic above
MaxTh is dropped. The probability of traffic between MinTh and MaxTh being dropped is
based on the number of packet increases. RED randomly drops the packets without
47
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
considering the QoS parameters of the packet to protect the queue from being fully utilized.
As a result, it is not useful for traffic with hard QoS requirements [17] [28].
WRED discards packets based on its QoS requirements and importance. WRED considers the
MPLS EXP bits to prioritize the packets. The packet with bits 000 in EXP bits (or IP
precedence bits) is considered as lower priority traffic and is more likely to be discarded. The
packet with bits 111 is considered as higher priority traffic and is less likely to be discarded.
The bits in the voice and video packets can be set to 1 1 1 to minimize the probability of
Multiprotocol Label Switching Virtual Private Network is extensive, relatively little work has
been done on developing solution methodologies directly related to improving end- to -end
QoS of MP BGP MPLS VPN traffic using the DiffServ model in Ethio Telecom in general.
BGP MPLS VPN traffic using DiffServ research addressing a variety of QoS related issues,
and provide references to point out interested readers to appropriate sources of additional
information. Most QoS of MP BGP MPLS VPN traffic-related literature focuses on traffic
classification and architectural or protocol related topics associated with MP BGP MPLS
VPN traffic, and Some of them have tried to describe the QoS of MPLS VPN from the
customer LAN side, provider edge (PE) to the customer side, network backbone, and others
end-to-end QoS perspectives. In this chapter, notable related works are reviewed to lay down
D. Adami et al., [38] proposed a new ns-2 module to speed-up the design, development, and
48
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
operators to provide services that require strict QoS performance guarantees. The new
software module is used to simulate the RSVP-TE protocol using the ns-2 simulator.
topology is designed and a MATLAB based simulation tool is used to send bulk data within a
network. Network performance is measured with MPLS enabled or disabled. The author
illustrates that MPLS network may perform better than the traditional IP networks. Sending
data file from a source to destination does not require traffic engineering.
D. Adami et al., [40] presented an overview of MPLS networks and compared performance
of IP routing and the MPLS forwarding mechanism. The authors did not discuss TE, which is
Sebastian N. and Desta D., in [41] worked on quality of service of access layer networks.
They have optimized the network through physical and logical architectures to improve the
end-to-end QoS. They have used weighted random early detection (WRED) algorithms for
the logical architecture and minimum spanning tree for the physical and data link layers’
the networks. According to their result, VPN technology can be used to improving the quality
of service for customers. They advocated that the BGP MPLS protocol has its own benefits in
network speed, stability, quality of services. They indicated that it can be used to detect
Farsin S. et al., in [42], articulated that VPN in MPLS network with MP BGP to assure end-
to-end QoS. They conducted simulation using GNS3 by configuring two companies with
different VPN sites on the same backbone. They used Wireshark to monitor the traffic flow
and quality of service. From their investigation, they identified that MP BGP MPLS VPN is
the most popular standard [23]. This technology uses BGP as a control plane to provide VPN
routing and MPLS as a transport technique to achieve isolation between customers traffic. Its
49
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
popularity is from the fact that its capability to support quality of service, traffic engineering
and a high number of customer’s support (thousands of customers and hundreds of thousands
of VPNs sites).
A detailed review was done by Kanchan D. and Alam S. in [43] on quality of service
improvement with MPLS mechanism in the next generation networks (NGNs). It is stated
that the increased demand for new and broaden network in terms of quality of service plays
an important role in providing better services for consumers. Hence, MPLS VPN techniques
enabled to improve the quality of service. MPLS VPN is one of the simplest, scalable,
flexible and dynamic ways to provide a better quality of service to users in a degraded
condition, with fast failure node recovery and traffic engineering. These improved network
According to the literature reviewed, the researcher tried to combine different methods and
procedures that are used in the above-mentioned studies as input and tries to work on
improving the end-to-end quality of services of EthioTelecom MP BGP MPLS VPN SLA
50
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Chapter Three
4.1 Introduction
This section of the study covers the main steps in designing QoS of BGP MPLS VPN
connections, and configuration, as well as the QOS have been applied on the proposed
network. The configuration of DiffServ QoS model over MPLS VPNs on the proposed
network been achieved by using the network topology shown in figure 3.1.The eNSP network
architecture was chosen according to the requirements for the design of networks with service
provisioning and implemented end-to-end QoS. The proposed eNSP network architecture can
There are two types of routers in the service providers’ network, i.e., Provider Edge (PE) and
Provide (P) routers. The Provider Edge router is directly connected to the Customer Edge
(CE) router of the customer networks. Both Provider Edge (PE) and Provider (P) routers
should run MPLS so that they can distribute labels to each other and forward labeled packets
to subsequent routers.
Figure 3:12 Simplified Proposed BGP MPLS VPN network architecture end-to-end
QoS.
51
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The proposed network model is slightly modified for the purposes of evaluating VPNs and
testing congestion analysis. The VPN A and VPN B routers are used as traffic generators.
Both VPN are MPLS based with RSVP-TE signaling and tunneling and uses OSPF for IGP
interconnection and use the same networking equipment. The interconnection links and
interfaces are similar in both VPN models including The QoS applied to the traffic running
The core network is realized as a core router and route reflector. The core device is logically
divided into two logical systems and acting like separate routers; as well they have full
functional capabilities of two separate hardware devices. Peering interfaces is used in the
connections between the two logical systems. The links with the other devices in the network
IP addressing scheme in the proposed network uses different private IP address. The class A
network is assigned for the connections between provider routers, between provider and
provider edge routers, between PE and PE routers, between PE and CE routers and for users in
VPN A and VPN B interconnection. This address space is split into IP address spaces
between different interfaces of the core, aggregation and access device and Loopback IP
Addresses.
IP address spaces between provider, provider edge and customer edge routers
LoopBack IP Address
P1 Loopback 10.0.1.1/32
P2 Loopback 10.0.2.2/32
4.2.2 Interfaces
The configuration of the interfaces in the proposed network architecture is almost common
for all interfaces. Only loopback have distinct differences in the way of their configuration
and it can’t contain Mpls, Mpls LDP, Mpls te and Mpls rsvp-te configuration. The following
An interior gateway protocol (IGP) is a routing protocol that is used to exchange routing
information within an autonomous system (AS). The OSPF protocol has been used. This is
because of OSPF protocol is more convergent and secure. The following command is the
[PE1] ospf
[PE1-ospf-1-area-0.0.0.0] quit
MPLS protocol is used for label switching and distribution. The following command is the
[PE1] mpls
[PE1-mpls] quit
[LSRA-mpls-ldp] quit
MP BGP protocol is used to create the peer relationship between different types of routers.
[PE1-bgp-af-vpnv4] quit
[PE1-bgp] quit
MPLS RSVP-TE is used to establish a TE tunnel from one router to another. It limits the
maximum receivable bandwidth for links along the tunnel. TE tunnel has bandwidth
To configure TE tunnel firstly enable MPLS, MPLS TE, and RSVP-TE globally on each
router, enable MPLS, MPLS TE, and RSVP-TE on all tunnel interfaces, and enable CSPF in
the system on the ingress routers. The following command is the most common format to
[PE1] mpls
[PE1-mpls] mpls te
[PE1-mpls] quit
Configure OSPF TE and maximum receivable bandwidth and the maximum usable (BC0)
bandwidth, creates the TE tunnel and limits the maximum receivable bandwidth on all tunnel
interfaces. The following command is the most common format to configure OSPF TE and
[PE1-GigabitEthernet0/0/1] quit
55
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
TO create tunnel interfaces on the ingress routers the following command is the most
common format to create a tunnel and configure IP addresses for the tunnel.
[PE1-Tunnel0/0/0] quit
information of the local VPN. Such an instance is called a VPN instance or VPN routing and
The following command is the most common format to configure VPN instance and bind the
[PE1-vpn-instance-vpna] ipv4-family
[PE1-vpn-instance-vpna-af-ipv4] quit
[PE1-vpn-instance-vpnb] ipv4-family
56
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
[PE1-vpn-instance-vpnb-af-ipv4] quit
[PE1-vpn-instance-vpnb] quit
and a CE to allow them to communicate and allow the CE to obtain routes to other CEs. The
routing protocol can be EBGP (External/Exterior BGP), IBGP (Internal/Interior BGP), RIP
(Routing Information Protocol), OSPF (Open Shortest Path First), or IS-IS (Intermediate
System to Intermediate System). For the proposed system OSPF is chosen to establish the
EBGP peer relationship between the PE and CE to import VPN routes on CEs routers and
PEs routers. The following commands are the most common format to enable EBGP peer
relationship.
[CE1-bgp] quit
[PE1-bgp-vpna] quit
[PE1-bgp-vpna] quit
57
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The designed QoS is to provide different levels of service quality based on different
requirements to meet SLA targets and ITU threshold quality requirements of different VPNs.
delay, managing jitter and packet loss are the main focuses of the design.
Quality of service assurance is designed based on the existing resources by using rational
scheduling and congestion avoidance methods. Differentiated service model (DiffServ) have
been used to classify, mark and shape the networks based on the existing SLA agreements.
ACLs are used specify which VPNs are granted to guarantee the required services quality
within the time. Define ACL rules Configure complex traffic classification on CE routers to
control the traffic that accesses CEs from the local networks. The following command is the
[CE1-acl-basic-2001] quit
[CE1-acl-basic-2002] quit
[CE1-acl-basic-2003] quit
[CE1-acl-basic-3001] quit
[CE1-acl-basic-3002] qui
In the proposed network QoS classification is implemented by marking types of the services.
Classification classifies the packets while packets unchanged. It is based on the DiffServ
Code Point (DSCP) values of IP packets. The traffic of different service level can be
identified. Then the defined ACL can have applied to it. The following command is the most
[CE1-classifier-a] quit
[CE1-classifier-b] quit
59
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
[CE1-classifier-udplimit] quit
[CE1-classifier-udplimit1] quit
In the proposed network traffic behavior is used to ensure the capability of the devices
support DSCP. It includes configuring traffic policing and re-marks DSCP values.
Committed information rate (CIR) indicates the rate at which the tokens are placed into the
bucket. Committed burst size (CBS) indicates the capacity of the bucket, whereas packet
burst size (PBS), shows the maximum volume of the traffic that can the interface allows
passing through the traffic burst. Then the Committed access rate (CAR) used to policing
specific excess traffics are dropped or remarked. All packets are marked according to
predefined traffic classifier match rule. The following command is the most common format
[CE1-behavior-e] quit
[CE1-behavior-f] quit
[CE1-behavior-g] quit
[CE1-behavior-udplimit] permit
[CE1-behavior-udplimit] quit
[CE1-behavior-udplimit1] car 5000 CBS 100000 PBS 150000 green pass yellow discard red discard
[CE1-behavior-udplimit1] quit
Traffic policing control the rate of the incoming packet to ensure the network resources are
properly allocated. When the traffic rate of the connection exceeds the specification on an
interface, it allows remarking the excess packet depending on the priority to maximize the
Traffic policy implements on the QoS requirement defined in the SLA. The SLA contains
parameters such as CIR, CAR, PBS and CBS which are predefined on the traffic behavior.
The following command is the most common format to define traffic policies.
[CE1-trafficpolicy-1] quit
[CE1-trafficpolicy-2] quit
[CE1-trafficpolicy-3] quit
61
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
[CE1-trafficpolicy-3] quit
The predefined policies are used to guarantee the service requirements of SLA. The following
command is the most common format to apply traffic policies to the inbound interfaces.
[CE1-GigabitEthernet0/0/0] quit
[CE1-GigabitEthernet0/0/1] quit
The proper functioning of the designed end to end QoS of BGP MPLS VPN network
architectures include:
The necessities for fulfilling these requirements have discussed with the relevant tests for
each of them. To be entrusted the proper functioning of the network first the basic
In proposed architectures, since it is one of the basic components of the designed models
OSPF operation is checked first. Checking OSPF routing protocol involves testing the routing
information, established neighbors, link state database, and interface enabled with OSPF
protocol.
To check the OSPF routing information “ip routing –table protocol ospf” command is used. It
checks whether routes are learned by other routers. Route information includes all direct
63
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
To check the OSPF neighbor relationship information “display OSPF peer” command is
To check the OSPF link state database information “display OSPF lsdb” command is used.\
64
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
65
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
To check the OSPF overall information “display OSPF brief” command is used.
From the output of these commands, each router is connected to the other devices loopback
addresses which are an important prerequisite for the proper functioning of the other
The outcome of the routers in Fig.3.2 means that the OSPF protocol successfully established
its link-state database of the network and built its routing table. The information about OSPF
interfaces (Fig.3.3) is important for updating routing information when there is a change of
The outcome of the routers shows that the routers made a neighbor relationship with each
other, and the links between them are functioning normally. From the brief information of the
protocol (Fig.3.4) can be seen that the establishment of the routing table has passed. It is
further understood that the protocol is configured to work with the signaling protocol RSVP-
66
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Resource reservation setup protocol with traffic engineering is used for signaling in the
proposed architectures. To check the RSVP-TE overall information “display Mpls rsvp-te”
command is used.
4.5.3 MPLS TE Tunnel
67
To check the MPLS TE tunnel status “display Mpls te tunnel-interface tunnel 0/0/0”
command is used.
To check the MPLS TE constraint shortest path database “display Mpls te cspf tedb all”
command is used.
4.5.4
Operation
Checking the operation of MPLS involves testing its routing information, MPLS link state
protocol, and MPLS adjacency. To check the MPLS routing information “display Mpls route-
68
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
link state protocol “display Mpls LDP LSP all” command is used.
To check the MPLS adjacency “display Mpls LDP adjacency” command is used.
69
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
To check the BGP neighbor relationship information “display BGP peer” command is used.
70
Fig.3.14 shows that BGP is fully operational and has established a neighbor relationship.
BGP sessions are established. The L3VPN groups are properly signaled. The end routers
traffic is properly forwarded and there is communication between the routers in the L3VPN
services.
The two L3VPN services are fully functional. To check detail routing information of the two
71
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
When the interfaces on routers are bound to the same VPN instance can exchange the
information. The same VPN instance can ping each other. To check the reachability of the
The applied QoS in proposed network architectures is fully functional. to view the traffic
policies, traffic classifiers defined in the traffic policies, and the traffic behaviors associated
with the traffic classifiers “display traffic policy user-defined” command is used.
72
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
When the QoS of the proposed network architecture was verified from Wireshark, different
parameters such as a frame, Ethernet, MPLS, TCP, BGP, and IP are functioning fully. Under
IP the defined QoS, differentiated service field is operational with its parameter.
4.6 Discussions
In this study, the researcher evaluated the QOS performance metrics such as delay variation,
delay, response time ,throughput for different traffic types (voice, data and video) for both
The existing and proposed network architectures are the same in physical devices used and
Source of traffic
FTP AF11
VOICE AF31
VIDEO AF41
Table 3.5 shows the similarities and differences between existing and
Table 3-8 5 the similarities and differences between existing and proposed network
architecture.
The researcher approach in this study is to design and build an operator network type back
bone to simulate a real scenario that convey different types of traffic (voice, data and
video).the result of the work are presented according to the simulation time and the network
load. The result of the comparison demonstrates the advantage over the performance of
QoS in the proposed network architectures is tested using Wireshark modeler, using latest
simulation technique, where different QOS parameters can be measured to compare the
performance of networks. A couple of network simulation scenarios (Fig.1:3 and Fig.3.1) are
tested with different types of traffic (voice, data and video) with different parameters and
speeds. In the first scenario, the existing network (Fig.1:3) performance is tested. The
existing network architecture uses the best effort QoS model; which means all traffic has
equal priorities. The architecture uses a FIFO algorithm for congestion management and tail
74
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
drop algorithm for congestion avoidance. In this scenario, the generated traffic consists of
two VPN instance application traffic streams. The traffic sources are generated by the client
nodes of the objects (node) from which we associate the application profile that presents the
In the second scenario (Fig.3:1) the proposed network architecture uses DiffServ QoS. The
traffic has different priorities. The higher the traffic processed first. The architecture uses a
LLWFQ queuing algorithm for congestion management and weighted random early detection
algorithm for congestion avoidance. In this case, the traffics were classified and priority is
given to it depending on their SLA levels. Then traffic policies were defined and applied on
an aggregation router outbound interface. In this case, the generated traffic consists of two
VPN instance application traffic streams. The traffic sources are generated by the client nodes
of the objects (node) from which we associate the application profile that presents the
configuration of multiple applications. We used Ftp, voice and video in our simulation. The
first test is made between CE1 and CE3 and the second test made between CE2 and CE4
routers. The results of both experiments are given as the following parameter comparison
75
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:31 FTP response time with light load (Blue - MPLS, Red - MPLS
/DiffServ)
The MPLS response time is higher than the MPLS / DiffServ network. We notice that the
MPLS network with DiffServ provides better performance in response times for FTP based
traffic.
Figure 3:32 FTP traffic response time with heavy Load (Blue - DiffServ; Red-
MPLS)
After increasing the load on the network (heavy load), the response time for MPLS changes
to a very high value, but DiffServ remains about the same as shown in Figure 3:21.
We will compare between the two scenarios MPLS and MPLS_ DiffServ. Figure 3:22 and
Figure 3:23 illustrate the end-to-end delay parameters for light load and heavy load traffic.
Figure 3:33 End-to-end traffic delay Voice with light load (Blue MPLS; Red /
DiffServ)
Figures 3:24 and 3:25, shows the delay (jitter) and variations of voice traffic for light load
Figure 3:34 Delayed end-to-end traffic Voice with heavy load (Blue - MPLS /
DiffServ; Red-MPLS)
and heavy load traffic
77
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:35 Variation of delay (jitter) of traffic Voice with light load (Blue - MPLS;
Red - MPLS / DiffServ)
Figure 3:36 Variation of the Delay Delay (Jitter) of Voice heavy load traffic (Blue -
MPLS, Red-MPLS / DiffServ)
Then we study the performance of the network when the traffic is the Video. We will
compare between the two scenarios MPLS and MPLS_ DiffServ. Below, illustrate the end-to-
end delay settings for light load and heavy load traffic.
78
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:37 Video End-to-End Delay with Light Load (Blue - MPLS; Red - MPLS /
DiffServ)
Figure 3:38 Video End-to-End Delays with heavy Load (Blue - MPLS / DiffServ;
Red- MPLS)
The end-to-end delay for video stream is higher for MPLS than MPLS / DiffServ. After the
load increases, the end-to-end delay for MPLS becomes very high and keeps increasing.
While the MPLS / DiffServ delay remains at a low level. This shows that MPLS / DiffServ
offers better quality even in congested network with higher loads, while in MPLS, the delay
79
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Figure 3:39 Variation of the delay time (jitter) of video traffic with light load (Blue -
MPLS; Red - MPLS / DiffServ)
The variation of the delay in FIG. 13 demonstrates the best quality of the MPLS /
The variation of the delay in FIG.3:29 demonstrate the best quality of the MPLS / DiffServ
service.
80
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
After the
increase in
traffic load,
the results of
evident that
Figure 3:40 Variation of delay of video traffic with heavy Load (Blue - MPLS /
DiffServ; Red - MPLS)
the delay variation has increased to a very high value for MPLS, while the variation of the
MPLS_ DiffServ delay has remained at a very low value, keeping the quality of service
When we look at the numerical results obtained from both the existing and proposed network
is shown in Table 3.1. Most of the results were as expected. The difference between packet
loss and bandwidth in existing and proposed network architecture was visible. But the
difference between end-to-end delay and jitter was not that much visible. This happened
because we have used ten routers only on both network architectures. This reduces the
transmission, serialization, queuing and processing delay. The difference was visible if the
Table 3-9 Exist and proposed network architecture numerical QoS results
Parameters Result SLA Targets ITU threshold Result SLA Targets ITU threshold
Packet loss (%) 1.897% Out of Range Out of Range 0.026% Within Range Out of Range
Delay(sec) 0.169 Within Range Out of Range 0.14132 Within Range Within Range
Jitter (sec) 0.001 Within Range Out of Range 0.0007747 Within Range Within Range
Bandwidth (bit/sec) 15068 Out of Range Out of Range 15320 Within Range Out of Range
81
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Chapter Four
5.1 Conclusions
In this thesis quality of service (QOS) analysis of an end-to-end MPLS BGP VPN network
architecture with the DiffServ model is done in comparison with the existing MPLS network
with the Best-effort model against four QoS parameters (Bandwidth utilization, packet loss,
latency, and jitter). This work has investigated the limitations with the existing network
architecture of ETHIO Telecom and explores the possibility of optimizing the end to end
quality of service (QOS) using the DiffServ model and OSPF routing protocol. Simplified
network topology was created and two network architectures were designed, built, and
evaluated with generic telecommunication equipment. Firstly, the existing BGP MPLS VPN
network which used the best-effort QoS model was implemented and tested. Secondly, the
proposed BGP MPLS VPN architecture which used the DiffServ QoS model was designed
and tested. End-to-end QoS was designed and implemented in both network models. The
implemented services were Layer 3 VPN services to handle traffic from end nodes in the
proposed architecture. From the study and simulation results the following conclusions can
be drawn:
Both network architectures were fully functional and Verification of the applied end-
The proposed BGP MPLS VPN network architecture has many more benefits than the
existing BGP MPLS VPN network architecture. This is due to the opportunity for the
class of services and traffic-engineering in the network, which helps for better traffic
82
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
The proposed BGP MPLS VPN architecture which used DiffServ QoS model
easy scalability of the network is in great help in today's rapidly growing VPN
networks. This approach is suitable for higher-priority services, because of the low
The designed BGP MPLS VPN architecture which used DiffServ QoS model network
architecture is easy to scale and troubleshoot. The problem with the fast ceasing
number of available ASs is evaded by using a single AS number in the core network
the impact on network flow is ceased. The traffic which entered the network is
delivered through backup routes to minimize the traffic loss, while new paths are
built. With the careful design of the applied QoS, the traffic requirements of the
In the proposed BGP MPLS VPN architecture, which used DiffServ QoS model
architecture, all services got the required traffic handling. End-to-end MPLS solutions
The proposed approach provides more efficient use of network resources and a
in the network. This way of service provisioning offers simplicity to the end nodes
and depends more on the intelligent nodes in the core network. At the same time, its
implementation and maintenance are also simplified. The designed BGP MPLS VPN
network can easily have implemented in the operator core network. Then the
83
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
architecture is simply managed, configured, and scaled with the least efforts and
Generally, based on the analysis and results gained, we conclude that the DiffServ QoS
model was more reliable than the best effort QoS model for the EthioTelecom BGP MPLS
VPN network. As the whole research process, the main work goes through traffic
engineering, network optimization, and proper network utilization. The designed QoS used
the DiffServ model that has been guaranteeing all company's SLA QoS threshold. In a
conclusion, the designed network provides a way of increasing network performance based
on the DiffServ QoS model. High network performance indicates a high QoS service
provider. A high QoS service provider creates a satisfied and high quality of experience’s
customers.
Although the thesis has achieved the objectives set in Chapter one and the QoS has been a
guarantee for the company's SLA QoS target, there are some issues related to the network
extendibility with more reliability functions to be addressed in the future. These issues are:
features and implementation of LDP for MPLS label down streaming on demand.
Layer 2 VPNs and VPLS can be included as a service in the network architecture.
This can increase the scalability, availability, and security of layer 2 VPNs.
algorithms for prediction. Algorithms for adaptive training of the network such as the
84
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
networks [40] [41]. This way the designed proposed BGP MPLS VPN architecture
which used DiffServ QoS model network architecture can become optimal, which
85
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Reference
Africa, vol. 1026, F. Mekuria, E. Nigussie, and T. Tegegne, Eds. Cham: Springer
[4] S. Maheshwarn, S. Lillypet, and C. Vennila, “QOS Capabilities for Building MPLS
[5] R. Kumar CV, D. C, B. A, and B. Kp, “Architecture for MPLS L3 VPN Deployment
in Service Provider Network,” J. Telecommun. Syst. Manag., vol. 06, no. 01, 2017,
[6] EthioTelecom, “QoS Document” MPLS VPN Services Quality and Customer
[8] A. El-Atawy and T. Samak, “End-to-end verification of QoS policies,” in 2012 IEEE
Network Operations and Management Symposium, Maui, HI, Apr. 2012, pp. 426–434,
86
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
[10] T. Szigeti and C. Hattingh, End-to-end QoS network design. Indianapolis, IN: Cisco
Press, 2005.
30.
Service based QoS Model for Real-Time Interactive Traffic on Constrained Bandwidth IP
Networks,” p. 108.
[16] J. Guichard, I. Pepelnjak, and J. Apcar, MPLS, and VPN architectures. Indianapolis,
[18] M. Kolhar, M. M Abualhaj, and F. Rizwan, “QoS Design Consideration for Enterprise
and Provider’s Network at Ingress and Egress Router for VoIP protocols,” Int. J. Electr.
[19] L. Cittadini and G. D. Battista, “Design of Virtual Private Networks with MPLS,” p.
29.
[20] Solomon T. and Hilina T., "EthioTelecom IP QoS parameters”, Recommended IP-
[22] Ethio Telecom, ”High-Level Design for NGN”, designed network, vol. I. 2006.
Research Methodology for Information Systems Research,” J. Manag. Inf. Syst., vol. 24, no.
[28] A. Srikitja and D. Tipper, “QoS-based Virtual Private Network Design for an MPLS
network,” p. 7.
[30] A. S. Khan and B. Afzal, “MPLS VPNs with DiffServ – A QoS Performance study,”
p. 82.
88
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
[33] N.-E. Rikli and S. Almogari, “Efficient priority schemes for the provision of end-to-
end quality of service for multimedia traffic over MPLS VPN networks,” J. King Saud Univ.
- Comput. Inf. Sci., vol. 25, no. 1, pp. 89–98, Jan. 2013,
[34] ITU, “QoS Parameters”, ITU-T Y.1541 Recommended QoS Target. 2012.
[36] S. K. Nair and D. C. Novak, “A traffic shaping model for optimizing network
operations,” Eur. J. Oper. Res., vol. 180, no. 3, pp. 1358–1380, Aug. 2007.
Implementation of RSVP-TE network simulator,”,” St. Louis, MO, USA, pp. 792–796.
[39] N. Aslam, “Traffic engineering with MPLS,” Master Thesis, School of Engineering
[40] D. Adami, "A new ns2 module for the simulation of MPLS networks with point-to-
Dresden, Germany,. .
[41] Dr. Sebastian N. and Desta D. “‘Modeling Network Optimization by Optimize the
Current Network by physical and logical architectures to improve the QoS’, International
[42] Farsin S.et al. “VPN in MPLS network with MP BGP”, International Journal of
[43] K. D. and A. S., “‘Review on QoS Improvement with MPLS Mechanism in NGN’,
89
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Appendices
# #
clock timezone China-Standard-Time minus 08:00:00 clock timezone China-Standard-Time minus 08:00:00
# #
portal local-server load flash:/portalpage.zip portal local-server load flash:/portalpage.zip
# #
drop illegal-mac alarm drop illegal-mac alarm
# #
wlan ac-global carrier id other ac id 0 wlan ac-global carrier id other ac id 0
# #
set cpu-usage threshold 80 restore 75 set cpu-usage threshold 80 restore 75
# #
ip vpn-instance vpnaa ip vpn-instance vpnaa
ipv4-family ipv4-family
route-distinguisher 100:1 route-distinguisher 200:1
vpn-target 111:1 export-extcommunity vpn-target 111:1 export-extcommunity
vpn-target 111:1 import-extcommunity vpn-target 111:1 import-extcommunity
# #
ip vpn-instance vpnbb ip vpn-instance vpnbb
ipv4-family ipv4-family
route-distinguisher 100:2 route-distinguisher 200:2
vpn-target 222:2 export-extcommunity vpn-target 222:2 export-extcommunity
vpn-target 222:2 import-extcommunity vpn-target 222:2 import-extcommunity
# #
mpls lsr-id 10.0.3.3 mpls lsr-id 10.0.5.5
mpls mpls
mpls te mpls te
mpls rsvp-te mpls rsvp-te
mpls te cspf mpls te cspf
# #
mpls ldp mpls ldp
# #
# #
acl number 2001 acl number 2001
rule 5 permit source 10.0.20.0 0.0.0.255 rule 5 permit source 10.0.40.0 0.0.0.255
acl number 2002 acl number 2002
rule 5 permit source 10.0.30.0 0.0.0.255 rule 5 permit source 10.0.50.0 0.0.0.255
# #
traffic classifier pe operator or traffic classifier pe operator or
if-match any if-match any
# #
traffic behavior pe traffic behavior pe
car cir 15000 pir 20000 cbs 300000 pbs 500000 car cir 15000 pir 20000 cbs 300000 pbs 500000
green pass yellow pass red discard green pass yellow pass red discard
90
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
# #
traffic policy pe traffic policy pe
classifier pe behavior pe classifier pe behavior pe
# #
aaa aaa
authentication-scheme default authentication-scheme default
authorization-scheme default authorization-scheme default
accounting-scheme default accounting-scheme default
domain default domain default
domain default_admin domain default_admin
local-user admin password cipher %$% local-user admin password cipher %$%
$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$ $K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http local-user admin service-type http
# #
firewall zone Local firewall zone Local
priority 15 priority 15
# #
interface GigabitEthernet0/0/0 interface GigabitEthernet0/0/0
ip address 10.0.11.2 255.255.255.0 ip address 10.0.15.2 255.255.255.0
mpls traffic-policy pe inbound
mpls te mpls
mpls te bandwidth max-reservable-bandwidth mpls te
100000 mpls te bandwidth max-reservable-bandwidth
mpls te bandwidth bc0 100000 100000
mpls rsvp-te mpls te bandwidth bc0 100000
mpls ldp mpls rsvp-te
# mpls ldp
interface GigabitEthernet0/0/1 #
ip address 10.0.10.1 255.255.255.0 interface GigabitEthernet0/0/1
mpls ip address 10.0.17.1 255.255.255.0
mpls te mpls
mpls te bandwidth max-reservable-bandwidth mpls te
100000 mpls te bandwidth max-reservable-bandwidth
mpls te bandwidth bc0 100000 100000
mpls rsvp-te mpls te bandwidth bc0 100000
mpls ldp mpls rsvp-te
# mpls ldp
interface GigabitEthernet0/0/2 #
ip binding vpn-instance vpnaa interface GigabitEthernet0/0/2
ip address 10.0.20.1 255.255.255.0 ip binding vpn-instance vpnaa
traffic-policy pe inbound ip address 10.0.20.1 255.255.255.0
# #
interface GigabitEthernet10/0/0 interface GigabitEthernet10/0/0
ip binding vpn-instance vpnbb ip binding vpn-instance vpnbb
ip address 10.0.30.1 255.255.255.0 ip address 10.0.30.1 255.255.255.0
# #
interface LoopBack1 interface LoopBack1
ip address 10.0.3.3 255.255.255.255 ip address 10.0.5.5 255.255.255.255
# #
interface Tunnel0/0/0 interface Tunnel0/0/0
91
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
92
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
800007DB03000000000000 800007DB03000000000000
snmp-agent snmp-agent
# #
clock timezone China-Standard-Time minus 08:00:00 clock timezone China-Standard-Time minus 08:00:00
# #
portal local-server load flash:/portalpage.zip portal local-server load flash:/portalpage.zip
# #
drop illegal-mac alarm drop illegal-mac alarm
# #
wlan ac-global carrier id other ac id 0 wlan ac-global carrier id other ac id 0
# #
set cpu-usage threshold 80 restore 75 set cpu-usage threshold 80 restore 75
# #
mpls lsr-id 10.0.1.1 mpls lsr-id 10.0.2.2
mpls mpls
mpls te mpls te
mpls rsvp-te mpls rsvp-te
# mpls te cspf
mpls ldp #
# mpls ldp
# #
aaa #
authentication-scheme default aaa
authorization-scheme default authentication-scheme default
accounting-scheme default authorization-scheme default
domain default accounting-scheme default
domain default_admin domain default
local-user admin password cipher %$% domain default_admin
$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$ local-user admin password cipher %$%
local-user admin service-type http $K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
# local-user admin service-type http
firewall zone Local #
priority 15 firewall zone Local
# priority 15
interface GigabitEthernet0/0/0 #
ip address 10.0.11.1 255.255.255.0 interface GigabitEthernet0/0/0
mpls ip address 10.0.13.2 255.255.255.0
mpls te mpls
mpls te bandwidth max-reservable-bandwidth mpls te
100000 mpls te bandwidth max-reservable-bandwidth
mpls te bandwidth bc0 100000 100000
mpls rsvp-te mpls te bandwidth bc0 100000
# mpls rsvp-te
interface GigabitEthernet0/0/1 #
ip address 10.0.13.1 255.255.255.0 interface GigabitEthernet0/0/1
mpls ip address 10.0.16.2 255.255.255.0
mpls te mpls
mpls te bandwidth max-reservable-bandwidth mpls te
100000 mpls te bandwidth max-reservable-bandwidth
mpls te bandwidth bc0 100000 100000
93
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
94
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
95
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
# #
ipv4-family unicast ipv4-family unicast
undo synchronization undo synchronization
peer 10.0.3.3 enable peer 10.0.3.3 enable
peer 10.0.5.5 enable peer 10.0.5.5 enable
peer 10.0.6.6 enable peer 10.0.6.6 enable
# #
ipv4-family vpnv4 ipv4-family vpnv4
policy vpn-target policy vpn-target
peer 10.0.3.3 enable peer 10.0.3.3 enable
peer 10.0.5.5 enable peer 10.0.5.5 enable
peer 10.0.6.6 enable peer 10.0.6.6 enable
# #
ospf 1 ospf 1
opaque-capability enable opaque-capability enable
area 0.0.0.0 area 0.0.0.0
network 10.0.4.4 0.0.0.0 network 10.0.4.4 0.0.0.0
network 10.0.10.0 0.0.0.255 network 10.0.10.0 0.0.0.255
network 10.0.12.0 0.0.0.255 network 10.0.12.0 0.0.0.255
# #
Return return
96
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
97
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
98
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
# #
wlan ac-global carrier id other ac id 0 wlan ac-global carrier id other ac id 0
# #
set cpu-usage threshold 80 restore 75 set cpu-usage threshold 80 restore 75
# #
aaa aaa
authentication-scheme default authentication-scheme default
authorization-scheme default authorization-scheme default
accounting-scheme default accounting-scheme default
domain default domain default
domain default_admin domain default_admin
local-user admin password cipher %$% local-user admin password cipher %$%
$K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$ $K8m.Nt84DZ}e#<0`8bmE3Uw}%$%$
local-user admin service-type http local-user admin service-type http
# #
firewall zone Local firewall zone Local
priority 15 priority 15
# #
interface GigabitEthernet0/0/0 interface GigabitEthernet0/0/0
ip address 10.0.30.2 255.255.255.0 ip address 10.0.50.2 255.255.255.0
# #
bgp 65420 bgp 65440
peer 10.0.30.1 as-number 100 peer 10.0.50.1 as-number 100
# #
ipv4-family unicast ipv4-family unicast
undo synchronization undo synchronization
import-route direct import-route direct
peer 10.0.30.1 enable peer 10.0.50.1 enable
# #
return return
99
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Please fill out the provided questionnaire so that we may better understand the VPN service
that you are using. The more information you are able to provide about your VPN services
and the services that Ethio Telecom offered, the better understanding about the quality of
your VPN performance will be. Please answer all questions as completely as possible then
submit the completed form to us directly.
Company Name
Contact information.
Job
Name Title
Phone Fax Email
Address
Q1. How satisfied or dissatisfied are you the overall quality of VPN service?
Q2. How satisfied or dissatisfied are you when you download file or video /music?
Q3. How satisfied or dissatisfied are you when you upload file or video/music?
100
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Q5. How satisfied or dissatisfied are you with the quality of video?(in YouTube or
video chatting)?
Q6. Choose two locations where you can get the best VPN connection speed
Q7. Choose two locations where you can get the worst VPN connection speed
Q8. Choose two time period in which you can get the best VPN connection speed
Q9. Choose two time period in which you can get the worst VPN connection speed
Q10. If your answer is yes for the above question, why do you choose it?
To get faster download for file/videos To get faster upload for file /videos
101
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
Q11. If a new service provider or operator launches a new VPN service in Ethiopia,
will you switch to the new service provider?
Q12. If you have ever called ethio telecom contact center for VPN service quality
problem, how do you rate the response?
Q13. How do you access VPN service?(you can choose more than one )
Male Female
102
Enhancing end-to- end Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual
Private Network of EthioTelecom Service Level Agreements
103