Professional Documents
Culture Documents
IP CONVERGENCE CURRICULUM
Award Solutions' eBook is authorized for a single user only. Do not distribute.
IPC_203
2100 Lakeside Blvd., Suite 300
Richardson, TX 75082 USA
Phone: +1.972.664.0727
Website: www.awardsolutions.com
If you have any questions, concerns or comments regarding this course please write to us at:
friends@awardsolutions.com
This course book and the material and information contained in it are owned by Award Solutions, Inc. (“Award Solu-
tions”) and Award Solutions reserves for itself and successors and assigns all right, title and interest in and to the
Award Content, Award Solutions’ logos and other trademarks, including all copyrights, authorship rights, moral
rights, publication and distribution rights, trademarks and other intellectual property rights. Award grants no license
or other rights in the contents of the course book or course, except as may be expressly set forth in a duly executed
written agreement between Award Solutions and the authorized user of this course book or the user’s employee or
principal. This course book shall not be modified, reproduced, disseminated, or transmitted by or in any medium,
form or means, electronic or mechanical, including photocopying, recording or any information retrieval system, in
whole or in part, without Award Solutions, Inc.’s express, prior written consent signed by an authorized officer
whose authority is evidenced by a duly signed corporate resolution.
This course book was designed for use as a student guide with the subject matter course taught by Award Solu-
tions’ authorized employees and contractors. It was not designed to be a standalone textbook. Award Solutions
makes no representations or warranties and disclaims all implied warranties with respect to the information con-
tained herein or products derived from use of such information and Award Solutions undertakes no obligation to
update or otherwise modify the information or to notify the purchaser or any user of any update or obsolescence.
To the extent permitted by applicable law, Award’s total liability in connection with the course and/or course materi-
al is the amount actually received by Award from the purchaser/user for the purchase or license of the course and
course material. This course book is not made for publication or distribution in the public domain and shall not be
published or placed in the public domain, in whole or in part, without Award Solutions, Inc.’s express, prior written
consent signed by an authorized officer whose authority is evidenced by a duly signed corporate resolution.
The 3GPP, LTE and LTE-Advanced logos are the property of Third Generation Partnership Project (3GPP). The
3GPP2 logo is property of Third Generation Partnership Project (3GPP2) and its organization partners. The
content of this document is based on 3GPP/LTE and 3GPP2 specifications which are available at
www.3gpp.org, and www.3gpp2.org.
About Award Solutions
AWARD SOLUTIONS, INC. has over 18 years of We offer a multitude of delivery methods and services:
training excellence in advanced wireless, IP, and network
virtualization technologies. Our products and services ON-SITE TRAINING: Our Subject Matter Experts
provide our customers with innovative, flexible, and cost- travel to your facility to engage the students in
effective solutions that help rapidly boost workforce an interactive learning experience. This is a great
productivity to more quickly meet market demands. option for teams with 12 or more people.
Whether you are a training manager responsible for a large OUR PROMISE
organization, or a team lead responsible for enhancing your To continually demonstrate our core values: Integrity,
team’s skills, Award Solutions can meet your technology Expertise, Flexibility, Teamwork and Excellent Return on
training needs. Investment.
SOFTWARE-DEFINED NETWORKS
Orchestrating elastic network functions and
ser vices through software
CLOUD COMPUTING
Pooled computing resources accessed in a self-serve way
API SDN
[Application [Software-Defined
Program Interface] BIG Networking]
DATA NFV
A programmatic Making networking
interface that makes [Network Functions capabilities elastic
Finding insights ORCHESTRATION
resources Virtualization] through centralized
by analyzing
software-accessible Running virtualized control
volumes of Automating workflow
diverse data to coordinate network network nodes on
functions and services commoditized
hardware
Table of Contents
Chapter 1: Prologue 1
Chapter 2: IP Foundation for MPLS 9
Communications Overview 11
IP Routing and Forwarding 13
IP in ATM vs. MPLS Networks 19
Chapter 3: Introduction to MPLS 25
IP Routing and Forwarding 27
MPLS Label Switching 35
Chapter 4: MPLS Networks 49
MPLS Network Components 51
Label Switched Path 56
Chapter 5: MPLS Labels 63
MPLS Label Structure 65
MPLS Label Binding 69
MPLS Label Distribution 81
Label Swapping and Forwarding 89
Chapter 6: MPLS Protocols 97
New MPLS Protocols 99
LDP 101
RSVP 106
BGP and MP-BGP 110
Chapter 7: MPLS and QoS 115
Motivation for QoS 117
DiffServ in MPLS 120
Chapter 8: MPLS and Traffic Engineering 131
Motivation for Traffic Engineering 133
Traffic Engineering 137
Traffic Engineering Process 142
Fast Re-Route 148
Chapter 9: MPLS Virtual Private Networks 155
Virtual Private Networks Overview 157
L2VPN 160
L3VPN 163
Acronyms 173
References 177
Chapter 1:
Prologue
Award Solutions' eBook is authorized for a single user only. Do not distribute.
1
1 | Prologue
Objectives
After completing this module you will be able to:
• Identify the issues that MPLS addresses
• Identify the functions of various elements in the
MPLS network
• Distinguish between different methods used to
distribute MPLS labels
• Explain how the Label Switch Path (LSP) is set up
and how packets are forwarded through it
• Describe the key MPLS Applications
• Explain how MPLS is applied to traffic engineering,
QoS, and VPNs
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2
1 | Prologue
Evolving Internet
More
Addresses New
Better
Applications
Security
New Routing
Mobility Architectures
More
Capacity for
Scalability
High Traffic
Manageability
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3
1 | Prologue
Role of MPLS
New Routing
Architectures
Fast Packet
Forwarding Guaranteed
QoS
More
Scalability Capacity for
High Traffic
Manageability
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4
1 | Prologue
Regional Regional
Network Network
Enterprise Enterprise
Network Network
IP
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5
1 | Prologue
MPLS Forwarding
MPLS
MPLS Forwarding
MPLS Regional Network
Regional Network
Pop or Dispose
Push or Impose
Enterprise
Enterprise IP Forwarding
IP Forwarding Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
6
1 | Prologue
MPLS
IP ATM, FR
Multi-Protocol Label Switching (MPLS) is a packet- The term “Multi-Protocol” means that MPLS is a
switching forwarding protocol designed to enhance the single solution that supports many different Layer 2
functionality of existing routing and switching and Layer 3 protocols.
technologies. MPLS does not function as a stand-alone
• MPLS Network Components: An MPLS Domain
protocol, but must couple with some other routing or
describes a network that is distinct from its
switching protocol (e.g., IP or ATM). Although MPLS may be
surrounding networks and has its own set of rules
used in an ATM or Frame Relay network, the primary focus
and nodes. At the edge of the MPLS domain, and
is to describe how MPLS and IP work together to deliver a
connecting to the outside world, are Label Edge
high quality packet switching service. As a result, the
Routers (LERs), also called Provider Edge (PE).
following MPLS topics will be covered:
Customers connect to the LER or PE MPLS routers
• Basic Tools and Concepts: Like most communication from a non-MPLS Customer Edge (CE) router in the
technologies, MPLS is based on separate control and customer domain. Special processes are required to
data planes. The control plane develops the define the communication between the CE and PE
foundation for packet forwarding and the data plane routers. In the core of the MPLS network are Label
simply forwards “labeled” packets. Using the labeling Switched Routers (LSRs), also called Provider (P). A
concepts, incoming traffic is classified into Forwarding Label Switched Path (LSP) is defined from one LER
Equivalency Classes (FECs) and the network across the MPLS P routers in the MPLS network to an
treatment depends upon which FEC the packet is LER on the other side of the MPLS domain. This is
assigned to. used to transport customer-labeled packets across
the MPLS network.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
7
1 | Prologue
MPLS
IP ATM, FR
• Key Protocols: A number of key protocols are needed One of the primary objectives for MPLS is to provide
to support MPLS services but they are not all new. Quality of Service (QoS) for real time applications such as
MPLS relies on existing and/or modified IP routing VoIP. We will discuss both the QoS techniques as well the
protocols to establish an information base required to ability to manage congestion through the use of Traffic
distribute labels. A protocol that is new for MPLS is Engineering (TE).
the Label Distribution Protocol (LDP). This protocol is
an alternative used to distribute labels within the
MPLS network to define the LSPs. When MPLS is
using Traffic Engineering the label distribution is done
using a Traffic Engineering extension to the Resource
Reservation Protocol (RSVP). The extended protocol is
called RSVP-TE.
• MPLS Applications: MPLS is designed to enhance the
packet switching experience. As a result, MPLS can
provide several special services or applications. For
instance, there are various ways that MPLS can be
used to provide Virtual Private Network (VPN)
services. We will elaborate on Layer 2 VPNs (L2VPN -
supporting Pseudowires), Virtual Private LAN Service
(VPLS) and Layer 3 VPNs (L3VPN).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
8
2 | IP Foundation for MPLS
Chapter 2:
IP Foundation for
MPLS
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
9
2 | IP Foundation for MPLS
Objectives
After completing this module you will be able
to:
• Describe how IP communication is established
• Explain the difference between routing and
forwarding
• Describe the role of the Autonomous System (AS)
in IP routing
• Explain how IP and MPLS interwork
Award Solutions' eBook is authorized for a single user only. Do not distribute.
10
2 | IP Foundation for MPLS
Communications
Overview
Award Solutions' eBook is authorized for a single user only. Do not distribute.
11
2 | IP Foundation for MPLS
Communication Networks
2. Can we be
3. Who is your
buddies?
plumber?
1. Hello.
One can begin to understand communication networks by As will be described in more detail later, the exchange of
understanding how a group of people communicate. If you information in the Internet requires that a well-defined set
have ever moved into a new neighborhood, you might of routes be defined in advance. Armed with these routing
recall how you tried to fit in with the group. You may have tables, the router receives packets through an ingress
considered who you wanted to meet first and the port, checks the ultimate destination of the packet,
appropriate way to introduce yourself. In communication matches the destination with information in the routing
networks this is done with protocols. table, and forwards the packet toward that destination.
Routing protocols are used to learn the makeup and In summary, the router has two distinct responsibilities:
connectivity of the network. They generally begin with a routing and forwarding. Routing is a relatively slow process
simple “Hello.” A router sends this simple message to all and must be performed before forwarding can begin.
of its immediate neighbors to find out which ones are When a change occurs to the network, it may take several
willing to talk. minutes before the routing protocols produce a new stable
set of routes. Once routes are in place, they are typically
After learning who the neighbors are, the router
valid for some extended period of time. Forwarding is a
establishes a separate relationship, called a session (“Can
simple process and must be done as quickly as possible.
we be buddies?”), with each neighbor before soliciting any
Barring router congestion the packet is forwarded through
specific assistance from them.
the router in microseconds.
After these sessions are established, it is time find out
how to locate a plumber (“Who is your plumber?”), a yard
man, etc. In router speak, the router publicizes to its
neighbors any network to which it can connect, and asks
the same from each neighbor.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
12
2 | IP Foundation for MPLS
IP Routing and
Forwarding
Award Solutions' eBook is authorized for a single user only. Do not distribute.
13
2 | IP Foundation for MPLS
IP Communication
2. Can we be
Can we be buddies? (Peer
buddies? TCP Sessions)
Routing
1. Hello 3. Link State
Hello. “Discovery” Advertisement
(LSA) “I’m
connected to
5. Forwarding 10.1.2.x”
IP Network
Award
Router
FIB FIB 10.1.2.x
4. FIB
Routing Table
Hello.
FIB
Hello. Hello. Can we be
Can we be
Can we be buddies?
buddies?
buddies?
If we replace the people with routers and the dialogs with The process used to build the routing tables is called
physical links we have an IP network. As with human “routing.” With the routing tables in place the process to
communication the IP routers must become acquainted by transport packets across the network using information
exchanging a “Hello” message across the links. What they from the routing tables is called “forwarding.”
are really doing is determining which of their directly
connected neighbors speak their routing protocol (e.g.,
OSPF). After this, they establish a working relationship by
creating ongoing TCP sessions with each other. “Can we
be buddies?” They are now ready to exchange routing
advertisements and build routing tables.
The router has two distinct responsibilities: routing and
forwarding. As will be described in more detail later, the
exchange of information on the Internet between remote
routers requires that a well-defined set of routes be
defined in advance. Although each router does not
maintain a local set of all routes, it does maintain tables
(routing tables or Forwarding Information Bases (FIB)) that
tell it how to forward the packet on the next hop along the
desired routes.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
14
2 | IP Foundation for MPLS
C
Autonomous
System L
B
IGP (e.g. OSPF)
To route within an AS
EGP (e.g. BGP-4)
Autonomous To route between ASs
System M D
Autonomous
System L
Service Provider’s Customer
IP network Network 2
One characteristic of an IP network is the span of authority Therefore the IGP (OSPF) routing protocol is adequate to
for the network. This is called a domain, more formally establish this connection.
known as an Autonomous System (AS). Globally unique
On the other hand, let’s say host C in customer network 1
identifiers called Autonomous System Numbers (ASN) are
wishes to communicate with host D in customer network
assigned to autonomous systems to distinguish them from
2. This is achieved only by connecting through the service
each other. Routing protocols fall into two classes, those
provider’s network. First, a local path must be found from
that are used for routing strictly within an AS, called
C to a boundary router between customer network 1 and
Interior Gateway routing Protocols (IGP), and those for
the service provider’s network. Next, a jump takes place to
routing between ASs called Exterior Gateway routing
another border router at the boundary between the
Protocols (EGP). Although there are a number of IGPs and
service provider and customer network 2 completing the
EGPs we are most interested in the IGP known as Open
path to D. EGP (BGP) is needed to determine which border
Shortest Path First (OSPF) and the EGP called Border
router to jump to at the border of the service provider and
Gateway Protocol Version 4 (BGP-4 or just BGP).
customer network 2; therefore, paths that include multiple
In our example we demonstrate three different ASs, one ASs require the use of both IGPs and EGPs.
that belongs to a major service provider and two that
belong to a customer of the service provider (although the
customer network can be a single AS). The service
provider and the customers must first run the IGP protocol
to learn of paths internal to their AS. Let’s assume that
host A now wants to communicate with host B.
A path can be defined strictly within the domain of the
service provider establishing this communication.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
15
2 | IP Foundation for MPLS
OSPF
LSA LSA
2
1 3
LSA 4
5
Autonomous System (AS)
Probably the most important routing protocol for our It should be noted that the exchange of LSA messages
discussion is Open Shortest Path First (OSPF). OSPF is an consumes network resources at the expense of revenue
Interior Gateway Protocol (IGP) operating strictly within the generating traffic, so it is important not to do this too
boundaries of a single Autonomous System. Through the often. At the same time, if a router is down it is eating
use of OSPF Link State Advertisements (LSA) the network away at revenue potential; therefore, it is important to
is able to discover the topology, routes and capabilities for determine how often these messages should be
the entire AS. Each router in the AS exchanges its exchanged to properly balance these two considerations.
capabilities with its immediate neighbor. For example, A complicating factor is the size of the network. While
router 1 tells router 2 about itself in an LSA. Since router 3 convergence should occur rather quickly in our simple
is not an immediate neighbor of router 1, the information five-node network, a network with 1000 nodes might take
about router 1 is not yet known by router 3; however, a very long time to converge. Therefore, OSFP does not
these LSAs are shared periodically, and when the next seem to be “scalable.”
LSAs are sent out, router 2 tells router 3 about router 1
using a process called flooding. Therefore, every router
eventually will know about every other router. When the
network topology changes (e.g., a router goes down) the
whole LSA process begins again.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
16
2 | IP Foundation for MPLS
OSPF has addressed the scalability issues by defining As a result of OSPF routing, each router has a local routing
OSPF “areas.” table telling it how to get to all other routers.
Using this concept, the autonomous system is partitioned Forwarding is then achieved by moving packets from one
into multiple areas. There is a network core called Area 0, point to another using information from these routing
along with multiple other non-zero areas. Based on this tables. In our example Router R1 establishes a session
model traffic that moves from a router in one non-zero with router R2 within OSPF Area 3. Using only Area 3
OSPF area to a different non-zero OSPF area must pass routings tables traffic is forwarded from R1 to R2.
through the core (OSPF Area 0). Routing is now simplified
However, when router R3 in OSPF Area 1 wishes to
since routers share information about themselves only
establish a session with Router R4 in OSPF Area 2 the
with other routers within their area. Each router maintains
path must go through the ABR in Area 1, pass through
a local area routing table. To enable connectivity between
core (Area 0) routers to find the ABR for OSPF Area 2, and
areas, special routers called Area Border Routers (ABR)
then on to router R4. This is achieved by the following
bridge their non-zero area and Area 0. These routers serve
steps:
as area gateways, and maintain routing tables both for
their non-zero area and for Area 0. While normal routers 1. Forwarding the packet from R3 to the ABR in Area 1
exchange detailed information about themselves and the 2. Forwarding across Area 0 to the ABR in Area 2
networks to which they have access, ABRs boil down the
area routing information and forward only summary 3. Forwarding the packet on to R4
information about routes in the adjoining area.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
17
2 | IP Foundation for MPLS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
18
2 | IP Foundation for MPLS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
19
2 | IP Foundation for MPLS
IP over ATM
IP
Network ATM Network
ATM
ATM ATM
ATM
One of the problems with IP networks is that they do not ATM is generally more of a core technology where paths
provide any assurance of timely delivery of packets. They are set up in advance and may accommodate various
are subject to congestion which can result in significant needs like load balancing, alternate paths, fault recovery,
delay in packet delivery. One potential answer to the etc. IP operates at Layer 3 and must perform complex
congestion problem is to transport IP packets over an forwarding procedures, including doing a “longest match”
Asynchronous Transport Mode (ATM) network (i.e., IP and of the IP destination address with entries in the routing
ATM working together for end-to-end delivery). In ATM, table before it can determine how to forward the packet.
paths can be manually established in advance and rules ATM operates at Layer 2, and defines end-to-end “fixed
can be applied that enable load sharing across multiple routes” in advance, so forwarding through an ATM switch
paths. is very fast. Unlike IP, ATM does not adapt quickly to
changes in the network.
Each technology is designed to meet specific
requirements. IP and ATM can complement each other or
can be competing transport technologies. This chart
contrasts the use of IP routing with ATM switching as
transport technologies. IP uses destination-based routing.
When a packet is received at the ingress node in the IP
network the routing tables provide only one path to the
destination from that ingress point. Alternative routes in
the case of congestion are not considered. This is where
ATM can help.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
20
2 | IP Foundation for MPLS
IP over MPLS
IP
Network MPLS LSR
LER
LER
LSR
Award Solutions' eBook is authorized for a single user only. Do not distribute.
21
2 | IP Foundation for MPLS
23
IP
87 IP Packet
Network MPLS
LER
LER
LSR
23 IP Packet
LSR 19 IP Packet
19 IP Packet
87
Award Solutions' eBook is authorized for a single user only. Do not distribute.
22
2 | IP Foundation for MPLS
Summary
• IP networks carry two types of IP packets:
― Control Plane: For finding routes through the network – Routing;
and
― User Plane: User-generated IP packets – Forwarding.
• IP is a forwarding protocol while routing is accomplished
using routing protocols such as OSPF and BGP.
• ATM is very good at forwarding while IP networks are very
good at routing.
• MPLS combines IP’s routing strength with ATM-like
forwarding.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
23
2 | IP Foundation for MPLS
Review Questions
1. What “planes” describe the separation of
responsibility for IP and MPLS routers?
2. What are the primary roles for each plane?
3. Identify the best of IP and the best of ATM
used in MPLS.
4. Identify the three labeling functions (hint:
ingress PE; P router, egress PE)
Award Solutions' eBook is authorized for a single user only. Do not distribute.
24
3 | Introduction to MPLS
Chapter 3:
Introduction to MPLS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
25
3 | Introduction to MPLS
Objectives
After completing this module, you will be able
to:
• Discriminate between forwarding and routing
• Describe different IP forwarding techniques
• Explain label switching as a forwarding technique
• Differentiate between IP forwarding and MPLS
forwarding
Award Solutions' eBook is authorized for a single user only. Do not distribute.
26
3 | Introduction to MPLS
IP Routing and
Forwarding
Award Solutions' eBook is authorized for a single user only. Do not distribute.
27
3 | Introduction to MPLS
IP Routing
? ?
?
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
28
3 | Introduction to MPLS
Incoming IP Outgoing IP
Packet Data Plane Packet
IP Forwarding Table (FIB)
If we could look inside an IP router, we would see that it Routing information is collected in the control plane in the
has two distinct but interrelated functioning planes, the Routing Information Base (RIB) which is later used to
control plane and the data plane. This chart enables us to create the Forwarding Information Base (FIB), also called
better examine those functions of the IP router. It a Routing Table or Forwarding Table, in the data plane.
abstracts the job of the router into the control plane used Once the routing table is defined the router is prepared to
for the routing tasks and the data plane used for packet accept incoming IP packets through the data plane and
forwarding. We will describe various routing protocols forward them toward the proper destination. If the
later, but their responsibility is to discover network network is very stable the routing table might remain
topology and how to get to remote networks. This is done unchanged for a long period of time (i.e., very little
by exchanging information with their immediate neighbors. “routing” work to do), and other than an occasional “keep
While you are telling the immediate neighbor what alive” message the router can focus on the forwarding
networks you have access to and learning the same from activity.
them; the neighbor router is learning from its other
neighbors, too. When information is exchanged with the
immediate neighbors a second time the router is able to
discover networks accessible from the neighbor’s
neighbor. If there are “n” routers in the network it takes no
more than “n-1” exchanges of network information to
learn about the entire network (and to build local routing
tables).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
29
3 | Introduction to MPLS
IP Routing
www.awardsolutions.com
Forwarding Table 30.0.0.1
30.0.0 R3 Route
Update
20.0.0 R1
Sally NW = 30.0.0
20.0.0.1 NextHop-R3
Compute the
Best route
Award
R2 30.0.0
Futureland IP Backbone
20.0.0 R1 R3
Pastland
R4 40.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
30
3 | Introduction to MPLS
IP Routing Characteristics
• Function of the IP Control Plane
• Intra-Domain routing differs from Inter-Domain routing
• Uses advertisements between routing peers to build a
“reachability” database for each router (called a Routing
Table)
• Triggered:
– When a new network is discovered
– When changes occur in the network that impact network
connectivity
– Periodically
• Takes time to converge
The major characteristics of IP routing are: aware of the new attached network.
• Routing is an IP control plane function. The results of • Routing advertisements are triggered by the addition
IP routing (i.e., the Forwarding Information Base) are of new networks, but other events can also trigger
provided to the IP data plane and used to forward routing advertisements. Suppose a network is
packets. functioning properly and suddenly a link somewhere
in the network is severed. As soon as the impacted
• There are different requirements and expectations if
routers detect the outage they send out a routing
a route is to be defined totally within a single
update advertisement, informing their immediate
autonomous system vs. between multiple
peers that the link is no longer available for traffic. In
autonomous systems. In a single autonomous system
addition to new networks and network failures routing
the routing peers are generally physically connected
advertisements are sent out on a periodic schedule
neighbors. When routing between multiple
provisioned into the network.
autonomous systems the peers are not physically
connected; in fact, some effort is required to even • When changes occur in the network, new networks
discover the peers. are added or network outages take place, a routing
advertisement session is triggered. In a large network
• Routers directly connected to a network advertise this
it may take some time before all routers in the
fact to their peers along with information on how to
network become aware of the change. Meanwhile,
reach the network. A single advertisement session is
packets at one end of the network might be sent
only able to inform immediate neighbors of the new
toward a link that is known locally to be faulty. This
network. This reachability information is propagated
results in dropped packets and points to the need for
(flooded) in a follow-on advertisement session, but
effective fault recovery processes.
will take some time before all network routers are
Award Solutions' eBook is authorized for a single user only. Do not distribute.
31
3 | Introduction to MPLS
IP Forwarding
Forwarding Table
www.awardsolutions.com
30.0.0 R3
30.0.0.1
Forwarding 20.0.0 R1
process
Sally Compute the
20.0.0.1 Best route
Futureland Award
20.0.0 30.0.0
IP Packet R2
Src=20.0.0.1 IP Backbone
Dest=30.0.0.1 R1 R3
R4
Pastland
40.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
32
3 | Introduction to MPLS
IP Forwarding Characteristics
• It is based on hop-by-hop forwarding
• Forwarding decisions based on:
− Destination address and
− Type of service
• Paths not predetermined
− Truly a connectionless technology
− Multiple paths between a sender and receiver
− Each router makes independent decisions
Award Solutions' eBook is authorized for a single user only. Do not distribute.
33
3 | Introduction to MPLS
IP Forwarding Example
IP Forwarding Table
Destination Next Hop
20.0.0.1 www.awardsolutions.com
30.0.0 R3 30.0.0.1
Sally 20.0.0 R1
40.0.0 R1
R2
Futureland
Electronics
IP Backbone Award
Network R1 R3 Solutions
20.0.0
Network
R4 30.0.0
IP Forwarding Table
Destination Next Hop IP Forwarding Table
30.0.0 R2 Destination Next Hop
Pastland
20.0.0 Direct 30.0.0 Direct
Electronics
40.0.0 R4 20.0.0 R2
Network
40.0.0 R2
40.0.0
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
34
3 | Introduction to MPLS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
35
3 | Introduction to MPLS
What is MPLS?
MP LS
Two Aspects
Award Solutions' eBook is authorized for a single user only. Do not distribute.
36
3 | Introduction to MPLS
MPLS “Router”
Routing
MPLS LER Information
Exchange with
Control Plane other routers
MPLS RIB IP Routing Protocols
Router Label Binding
IP Routing Table Exchange with
other MPLS
Routers
LIB MPLS IP Routing Control
Incoming IP
Packet Outgoing IP
Data Plane
Packet
IP Forwarding Table (FIB)
POP + L3 Lookup
Label Forwarding Table (LFIB)
Incoming Outgoing Labeled
Labeled Packet Packet
Award Solutions Proprietary
MPLS uses routers that, from the outside, might resemble • When an unlabeled packet comes in and a labeled
IP routers. The differences are on the inside. This chart packet goes out the router is serving as an ingress
demonstrates how an IP router might morph into an MPLS Label Edge Router (LER). In this case, the router is
router. You will recognize from an earlier chart the IP said to attach, “impose” or “push” a label onto the
control plane and the data plane functions are still in the packet.
MPLS router. In fact, an MPLS router must also be
• When a labeled packet comes in and an unlabeled
capable of performing as a normal IP router.
packet goes out the router is serving as an egress
Let’s examine the additions. In the data plane, in addition Label Edge Router (LER). In this case the router is
to the routing table (Forwarding Information Base (FIB)) said to detach, “dispose” or “pop” a label from the
used for normal routing, the MPLS router has a Label packet.
Forwarding Information Base (LFIB) used to apply and
• When a labeled packet comes in and a labeled
swap MPLS labels. In the Control Plane, while the normal
packet goes out the router is serving as an egress
routing function exchanges routing information with
Label Switch Router (LSR). In this case the router
routing peers, there is a new MPLS IP Routing Control
simply replaces the incoming MPLS label with an
function responsible for creating MPLS label bindings.
outgoing label representing the Label Switched Path’s
Label information exchanged between MPLS peers is
(LSP’s) Forwarding Equivalency Class (FEC). This is
collected in the Label Information Base (LIB) which
called label “swapping.”
becomes a source of input for the LFIB.
• This chart demonstrates the various roles an MPLS
router can play. When an unlabeled packet comes in
and an unlabeled packet goes out the router is acting
like a normal IP router.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
37
3 | Introduction to MPLS
We have learned about IP routing and forwarding, and are just a simple lookup. This simplicity provides label
almost ready to discuss MPLS forwarding. First we need to switching with high performance in terms of packets
understand the label switching aspect of MPLS. Obviously, forwarded per second. MPLS also allows other things such
MPLS has label switching at its core but first one might as reserved network resources to be associated with
ask, “What is a label?” For MPLS, a label is a short labels and this allows support for advanced functionality
number that is marked on each packet in the network. It is such as Quality of Service (QoS).
important to keep in mind that the value of a label is not
special. The label has no structure or subfields within it
and is essentially a random number. The value of a label
is not a compression of the destination address or other
information from the packet. The usefulness of the label
comes with forwarding packets based on the label’s value
which is called label switching.
The concept of label switching is very simple. Normally in
IP networks a router examines a packet it receives, reads
the destination address and usually does some complex
processing on it to determine the exit port to which it
should be forwarded to bring it closer to the final
destination. Label switching occurs when a label switch (or
MPLS router) looks at the label value on a packet and
looks up the exit port to which it should be forwarded.
There is no complex processing in making the decision,
Award Solutions' eBook is authorized for a single user only. Do not distribute.
38
3 | Introduction to MPLS
– A connection-oriented technology
• IP headers are not analyzed when making
forwarding decisions
• MPLS is similar to ATM and Frame Relay protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
39
3 | Introduction to MPLS
In MPLS forwarding, the path followed by a packet is set This process is performed at each router until it reaches
up before packets are sent from the source. A label is the exit router where the label is removed and the IP
associated with the path at each router. The label is packet is forwarded to the destination. Note that
attached to the packet at the entry point to the MPLS throughout the forwarding process, contents of the IP
backbone. Inside the MPLS backbone, the forwarding is header are not analyzed except at the entry and exit
based on the attached label. The forwarding table at each points of the network.
router contains a label map rather than IP addresses. A
label map is a table that maps an incoming label to the
outgoing label.
Let’s visit Sally again. How do packets from Sally’s
computer get routed using MPLS? A label has been
associated with the destination network 30.0.0 at each
router and communicated to the adjacent routers. We will
see how the labels are allocated and communicated later
in the course. As packets are sent from network A to
network B, a label is associated with the packet at router
R1. R1 forwards the packet to R2. Next, R2 performs a
table lookup in the label map. It finds the appropriate
outgoing label and replaces the incoming label with the
outgoing label.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
40
3 | Introduction to MPLS
Steps 1 2 3 4
1 2 3 4
7 6 5
Analyze
IP Header No Yes
MPLS Forwarding typically includes the following steps: the results of the previous step.
1. Check the Time To Live (TTL) value. 8. Decrement TTL.
2. Index into the incoming interface table. 9. Recompute IP header checksum.
3. Index into the incoming label table. IP forwarding requires more steps than MPLS forwarding.
And also requires more process power than MPLS
4. Replace the incoming label with the outgoing label.
forwarding because each time a match is performed, IP
IP Forwarding typically includes the following steps: needs to iterate through a significantly larger routing table.
1. Compute the IP header Checksum and compare with IP forwarding requires analysis of the entire IP header.
recorded value to test for IP header errors. MPLS simply forwards packets based on labels that are
2. Determine if the packet is to be sent to the local or short. MPLS packets also have fixed length headers (if the
remote network. headers are used at all); therefore, the processing is
limited and the results is faster and more efficient than IP
3. Check the Time To Live (TTL) value. forwarding.
4. Determine whether this packet is unicast, multicast or
broadcast.
5. Perform a basic match based on the routing table to
derive the working set.
6. Perform the longest match on the working set.
7. Choose the most optimal route for the packet from
Award Solutions' eBook is authorized for a single user only. Do not distribute.
41
3 | Introduction to MPLS
Summary
• IP forwarding is:
– Based on destination IP address,
– Slower, and
– Connectionless.
• MPLS forwarding is:
– Based on the label,
– Very fast, and
– The path is set up before sending packets.
• MPLS routers have all of the capabilities of IP
routers (and more)
Award Solutions' eBook is authorized for a single user only. Do not distribute.
42
3 | Introduction to MPLS
Review Questions - I
1. Which of the following are characteristic of IP forwarding?
A. Packets are forwarded on a hop-by-hop basis.
B. IP forwarding is connection-oriented.
C. Packets from sender to receiver may take different paths.
D. Each router maintains a forwarding table.
2. Which of the following techniques results in faster and
more efficient forwarding of packets? (Please justify your
answer.)
A. MPLS forwarding
B. IP forwarding
Award Solutions' eBook is authorized for a single user only. Do not distribute.
43
3 | Introduction to MPLS
Review Questions - II
3. In IP forwarding, each packet knows the complete path
through the network. True or False?
4. Which of the following are characteristic of label switching?
A. Forwarding a received packet using the label table
B. Advertising routing changes to all neighbors
C. Updating the routing table from received advertisements
D. Similar to ATM and Frame Relay protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
44
3 | Introduction to MPLS
50.6.8.x
Customer
50.6.9.x
Network
Customer
Network
R2
A C B R3
B
A
R1 A 50.6.7.x
B
B Customer
B A R5
A R4 C Network
Award Solutions' eBook is authorized for a single user only. Do not distribute.
45
3 | Introduction to MPLS
• Hint: In the second pass all five routers will send the contents of their
routing tables to their adjacent routers. Upon receiving the second
update, each router will update its routing table.
• The instructor will then show how a packet is forwarded through this
network.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
46
3 | Introduction to MPLS
50.6.7: Dir
Dest Port # Hops
50.6.7 C 1 Dest Port # Hops
50.6.8 B 1 50.6.7 Dir -
50.6.9 A 1
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
47
3 | Introduction to MPLS
R3
50.6.8.x Dest Port # Hops
50.6.9.x Customer
Network
Customer
Network
R2
B
A C R3
B A
R1 A
50.6.7.x
B
B Customer
A B C A
R4
R5 Network
R4 Dest Port # Hops
Dest Port # Hops
R5
Award Solutions' eBook is authorized for a single user only. Do not distribute.
48
4 | MPLS Networks
Chapter 4:
MPLS Networks
Award Solutions' eBook is authorized for a single user only. Do not distribute.
49
4 | MPLS Networks
Objectives
After completing this module, you will be able
to:
• Sketch the MPLS network architecture
• Identify the functions of various MPLS network
elements
• Define the Label Switched Path (LSP) and
Forwarding Equivalence Class (FEC)
• Explain different types of LSPs
Award Solutions' eBook is authorized for a single user only. Do not distribute.
50
4 | MPLS Networks
MPLS Network
Components
Award Solutions' eBook is authorized for a single user only. Do not distribute.
51
4 | MPLS Networks
IP Domain Sally
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
52
4 | MPLS Networks
LER LER
MPLS Domain
IP Forwarding LER Functions
1. Map IP Packets to Labels
2. Push or Pop Labels on IP Packets
3. Apply QoS Functions
IP Domain 4. Initiate LSP Setup Process
Sally 5. Existing Functions of Edge Routers
6. Traffic Engineering
MPLS VPN:
LER called Provider Edge Router (PE)
Customer Edge Router (CE) in customer
network
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
53
4 | MPLS Networks
Egress
LER
IP Domain Sally
Each LER plays the role of both ingress and egress LERs.
These concepts are quite easy to understand. An ingress
LER is an entry point into the MPLS network where labels
are assigned and pushed (i.e., added) to the packets. An
egress LER is the exit point of the MPLS network where
labels are popped (i.e., removed) from the packets and
the resulting packet is forwarded. This is the standard
terminology used in the networking industry.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
54
4 | MPLS Networks
IP Forwarding
LSR
IP Domain
MPLS Domain
IP Forwarding
LSR
LSR Functions
1.
Swap Labels
2.
Apply QoS Functions
3.
Participate in LSP Setup Process
IP Domain Sally 4.
Only knows Routes within MPLS
Domain
MPLS VPN:
LSR (P) LSR called Provider Router (P)
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
55
4 | MPLS Networks
Award Solutions' eBook is authorized for a single user only. Do not distribute.
56
4 | MPLS Networks
Swap
Futureland
Award Push Pkt 20.0.0
30.0.0 Pkt LSP 1
LSR A
LER 2
Pkt LER 5
Pkt LSP 2
Todayland
50.0.0
LER 1
LSP 3 LER 4
LSR B
LER 3
MPLS Network
Pastland
40.0.0
A Label-Switched Path (LSP) is a path inside the MPLS LERs at the ingress are responsible for assigning the
network traversed by a set of packets with a common packets to different LSPs. For example, LER 1 assigns and
source and destination. Different sets of packets may sends the packets with IP address 20.0.0.1 destined for a
follow different paths and receive different types of host in Futureland network, to LSP 1. LER 1 assigns
treatments (e.g., bandwidth allocated) along these paths. packets with the IP address 40.0.0.1 to LSP 3. LER5
Distributing packets to the proper LSPs is done by LERs. assigns packets with the IP address 30.0.0.1 to LSP 2.
LERs select the appropriate LSP for each IP packet based The LERs also terminate LSPs at the egress point and
on information such as the destination IP address or the perform IP forwarding. In this example LER 2 terminates
type of service. LSP 1 and forwards packets based on the IP addresses.
LER 3 does the same for LSP 3, similarly LER 1
A label-switched path is similar to a virtual channel
terminates LSP 2. The LSRs such as LSR A and LSR B
connection in ATM; however, a LSP is unidirectional,
perform only MPLS forwarding.
unlike an ATM virtual channel connection which is
bidirectional. Therefore, in MPLS the path for LSP from A MPLS actions with respect to the LSP are demonstrated
to B might be different from the path for the LSP in the with the three actions shown. The ingress router in the
opposite direction. LSP “Pushes” a label onto an unlabeled packet and
forwards to the next router in the LSP. The downstream
Consider this example. There are four networks shown:
router “Swaps” one label value for another and forwards
two LSPs are set up between the Award network and the
downstream. The egress router in the LSP “Pops”
Futureland network (with network prefix 20.0.0) for
(removes) the label, forwarding as an unlabeled packet.
bidirectional communication and a single unidirectional
LSP is set up from Award’s network to Pastland’s network
(40.0.0).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
57
4 | MPLS Networks
Types of LSPs
Hop-by-Hop
Futureland (Shortest Path)
20.0.0 Award
LFIB 30.0.0
LER 4
LER 2
LFIB LFIB
LER 1
LSP LFIB
Explicit Routed LER 3 MPLS Network
(QoS & TE)
Pastland
• Hop-by-hop routed LSPs 40.0.0
- Based on entries in IP routing table
• Explicit routed LSPs
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
58
4 | MPLS Networks
What is an FEC?
Same Path
– Different FECs
Header
Payload
Award Solutions' eBook is authorized for a single user only. Do not distribute.
59
4 | MPLS Networks
FEC Assignment
E-LSP
FEC1:Plat Policy
FEC2:Gold Policy
FEC3: Silver Futureland
Award
20.0.0
30.0.0 LSR A
FEC 1
LER 2
FEC 2
L-LSP FEC 3
Todayland
MPLS Network 50.0.0
LER 1
FEC 3
LSR B
LER 3
Platinum
Gold Pastland
Silver 40.0.0
The FECs can be selected based on several parameters. These FECs are used to set up the LSPs. We can see the
Let’s assume Futureland requires a higher QoS (Platinum) power of MPLS. The forwarding decisions are not only
that includes higher bandwidth and security which is based on the destination addresses, but also through a
available along LER 1 - LSR A - LER 2. Todayland requires combination of several parameters. This provides
a medium QoS (Gold) which is available along LER 1 - LSR flexibility for network operators that did not exist in pure IP
B - LER 2. The QoS required for a packet is indicated forwarding. To use an industry term, the FECs help identify
through the Type of Service (TOS) field in the IP header. In different “flows” and/or Quality of Service (QoS) in the
this case packets from Award Solutions are partitioned network.
into three FECs, each having distinct LSPs. All three have
the same source and destination. Both the destination
network address and Type of Service field are used to
determine the FECs. We will later identify this procedure
for handling different service classes, Label-Based LSP (L-
LSP).
An alternative solution is to have Platinum, Gold and Silver
traffic all assigned to the LSP LER 1 – LSR A – LER 2. The
different classes are marked in the MPLS header and
policies deployed in each router in the LSP provide
different treatment for each class. Later, this way of
handling the separate classes will be called Experimental
LSPs (E-LSP).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
60
4 | MPLS Networks
Summary
• An MPLS network is composed of LERs and LSRs.
• LER functions to:
― Receive non-MPLS packets and push/pop label, and to
― Enforce QoS policy.
• LSR functions to:
― Switch MPLS packets by swapping labels, and to
― Apply QoS.
• FEC is used to classify all packets which require the same
treatment in one group.
• LSPs are set up based on FEC.
• There are hop-by-hop and explicit routed LSPs.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
61
4 | MPLS Networks
Review Questions
1. A single LER can play the role of both Ingress as
well as Egress LER. True or False?
2. LER and LSR roles are interchangeable. True or
False?
3. For a particular FEC a Label Switched Path (LSP)
can be bidirectional. True or False?
4. The FEC is mapped to an LSP. True or False?
5. For a given LSP each router in the path may have
a different label value. True or False?
Award Solutions' eBook is authorized for a single user only. Do not distribute.
62
5 | MPLS Labels
Chapter 5:
MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
63
5 | MPLS Labels
Objectives
After completing this module, you will be able
to:
• Define an MPLS label
• Identify different methods to distribute and bind
MPLS labels
• Explain how labels are assigned
• Describe label stacking and name some of its
applications
Award Solutions' eBook is authorized for a single user only. Do not distribute.
64
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
65
5 | MPLS Labels
Structure of a Label
• No fixed structure
• Leverage any existing Layer 2 labels
• Or use shim headers
MPLS
PPP
Ethernet
ATM Frame Relay
Award Solutions' eBook is authorized for a single user only. Do not distribute.
66
5 | MPLS Labels
Shim Headers
Identifies Used to
Used for
User Label Label prevent
QoS
Stacking loops
Ethernet MPLS IP IP
Ethernet
Header Shim Header Payload Packet
Header
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
67
5 | MPLS Labels
With a label field of 20 bits the value of the label can have • Label Value 2 - IPV6 Explicit Null: This functions the
a value of over one million (2 to the 20th power). That said, same way as the Label 0 value except within an IPV6
the first 16 values (0 thru 15) are reserved for special use protocol stack.
as summarized in the lower table on the slide.
• Label Value 3 - Implicit Null: This is assigned by a LSR
• Label Value 0 - IPV4 Explicit Null: This label is only when it wishes the label to be popped prior to
legal at the bottom of the label stack. When used it receiving the packet. Cisco uses this at the last P
indicates that the label stack must be popped and router in the VPN path so the top label in the received
the forwarding of the packet must then be based on packet is the VPN label. This is done so that the
the IPV4 header. router is not able to perform two label lookups at line
speed. This is called “penultimate hop popping” or
• Label Value 1 - Router Alert: This label can be used
PHP.
anywhere in the label stack except as the bottom
label. When the received packet has this as the top • Label 14 - OAM Alert: This is used to identify MPLS
label it is delivered to a local software module for OAM packets and differentiate them from normal
processing. This is used to request the router to user packets.
examine the labeled packet more closely for some
anomaly. Forwarding is then dependent on the label
below the router alert label. If the packet is forwarded
further as a labeled packet then the router alert
packet must be pushed back into the stack before
forwarding.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
68
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
69
5 | MPLS Labels
MPLS Forwarding
In an MPLS network labels need to be distributed and Label distribution can be performed by the MPLS Label
Label Switched Paths (LSP) need to be established. There Distribution Protocol (LDP) or by using an extension of the
needs to be a trigger to initiate these actions. The data- Resource Reservation Protocol (RSVP) called RSVP-TE
driven approach waits until a packet arrives at the edge of when Traffic Engineering is being used.
the MPLS network.
The Label Edge Router (LER) determines the FEC that the
packet belongs to and then initiates the distribution of
labels to set up the required LSP for that FEC. This
ensures an LSP is established only if needed; however,
the establishment of the LSP and distribution of the
necessary labels takes some time. The first few packets to
arrive must be forwarded using conventional means
(normal IP forwarding) until the LSP is established. This
not only degrades the performance of those packets, but
might also impact other packet flows since interior routers
spend more effort to carry out normal IP forwarding.
For this reason the control-driven approach is preferred in
which labels are distributed ahead of time when IP routing
protocols determine routes through the network.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
70
5 | MPLS Labels
What is an LFIB? - I
Award Futureland
LSP 1
30.0.0 LSR A 20.0.0
a LER 2
LER 5
a b LSP 2
LER 1
Todayland
b
c 50.0.0
LSP 3
LER 4
LSR B
MPLS Network LER 3
LFIB for LER 1
Pastland
Pastland
NHLFE Outgoing 40.0.0
40.0.0
FEC In Out Next Hop Interface
20.0.0 None 36 LSR A a
50.0.0 None 42 LER 4 b
40.0.0 none 19 LSR B c
LFIB: Label Forwarding Information Base
Award Solutions Proprietary NHLFE: Next Hop Label Forwarding Entry
To perform MPLS label swapping we need a Label Generally, the ingress LER matches the packet to an FEC
Forwarding Information Base (LFIB). This is somewhat using a traditional IP routing longest match operation. It
analogous to a forwarding table used for IP forwarding. then selects the appropriate LSP to forward the packet.
The LFIB is derived by first creating local bindings in each
The figure shows the LFIB for LER 1. The Next Hop Label
router for the MPLS Forwarding Equivalency Classes, then
Forwarding Entry (NHLFE) column matches the outgoing
distributing those local bindings to routing peers to create
label to the next hop LSR or LER. The outgoing interface is
a Label Information Base (LIB). The next two charts
also specified for each FEC entry.
assume that the LIB has been created and the derived
LFIB has been determined. We will next describe the
various options for LIB creation required by the LFIB.
A LFIB is simply a table that contains label mapping
information for each LSP. We know that IP forwarding
uses IP routing tables within each router to determine the
next hop information for each packet. In MPLS routers use
the LFIB to forward packets. We will see how LFIB is used
as we walk through a packet forwarding example later in
this chapter.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
71
5 | MPLS Labels
What is an LFIB? - II
Award Futureland
30.0.0 20.0.0
LSP 1
LSR A
a LER 2
LER 5
a b LSP 2
Todayland
b 50.0.0
LER 1
LSP 3 LER 4
LSR B
MPLS Network LER 3
Pastland
LFIB for LSR A 40.0.0
NHLFE Outgoing
In Out Next Hop Interface
LFIB: Label Forwarding Information Base
36 84 LER 2 a NHLFE: Next Hop Label Forwarding Entry
Award Solutions' eBook is authorized for a single user only. Do not distribute.
72
5 | MPLS Labels
The MPLS Label Information Base (LIB) is the router- Also assume that LER C has decided to create a local
specific collection of FEC “Local Bindings” coupled with binding with value 86 for the same FEC. The local binding
the “Local Bindings” advertised by that router’s neighbors. in router C could be expressed as 50.6.7:86. Finally, LER
When the router receives the neighbor’s “Local Bindings” A creates a local binding for the same FEC but assigns a
for the FECs they are considered “Remote Bindings” to value of 92, expressed as 50.6.7:92.
the receiving router; therefore, the LIB can be considered
As stated above, a remote binding is a binding received
the collection of all local bindings plus all remote bindings
from a peer router (where the binding was considered to
at each router. We will see later that policies differ as to
be a local binding to the peer). In our example, LER A and
when a router creates a local binding for a FEC and with
LER C send their local bindings for FEC 50.6.7 to LSR B
whom these local binding are shared. This chart provides
where they become remote bindings to router LSR B. A
a simple example of the creation and sharing of local
Router Identifier (RID) is used by each router to identify
bindings for a single FEC (network 50.6.7). We also focus
from which router the binding was received. Router
only on the LIB for router LSR B.
loopback addresses are typically used as RIDs.
This chart displays two attached networks that can be
The Label Information Base (LIB) is the set of all local
assumed to be Forwarding Equivalency Classes (FECs).
bindings and remote bindings at a given MPLS router. This
Any MPLS router may create a local binding with any FEC
becomes a repository for label values when a Label
by selecting a number to associate with the FEC (which
Switched Path (LSP) is defined and is used in populating
will later be used as an MPLS label value). For example,
the Label Forwarding Information Base (LFIB).
suppose LSR B decided to associate a value of 35 with
FEC 50.6.7. The local binding could then be expressed as
50.6.7:35.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
73
5 | MPLS Labels
Label 49 Label 87
20.6.7.x 50.6.7.x
LER A LSR B LER C
Before a Label Information Base (LFIB) can be created in FEC 50.6.7. These labels are then used to create an entry
the Data Plane, a Label Information Base (LIB) for each in LSR B’s LFIB for FEC 50.6.7. In the LFIB entry the local
router is created in the Control Plane. The LIB describes binding created by LSR B is entered as the “Incoming
the “bindings” and associates label values that are used Label (IN)” related to the FEC, while the remote binding
to create LSPs. The LIB is the collection of local bindings value received from LER C is entered as the “Outgoing
and remote bindings for the router. Label (OUT).” Later, when MPLS traffic is received for the
associated Label Switched Path to 50.6.7 the MPLS label
This chart demonstrates one option for creation and
value on the packet will be 49. LSR B will remove the
distribution of bindings. Assume that the OSPF has
incoming label and replace it with one having a value of
determined that the shortest path from 20.6.7.x to
87.
50.6.7.x is the path LER A to LSR B to LER C.
We will call this approach to label binding creation
One option for LIB creation is to identify a specific IP
“Ordered LSP Control Mode,” and the approach to the
destination prefix (e.g. 50.6.7.x) from the routing table,
distribution of the local bindings we will call “Downstream
a.k.a. Forwarding Information Base (FIB), and treat this as
On Demand” (DOD). These are neither the only options for
a Forwarding Equivalency Classes (FEC). In this scenario
label binding creation and distribution nor are they the
LER C (the egress LER) defines the first binding by
Cisco preferred solutions as we will see in the following
assigning a value of 87 to the FEC creating the local
charts.
binding 50.5.6:87. This is sent to LSR B. Since LSR B to
LER C is on the shortest path the received binding is
treated by LSR B as a remote binding. LSR B then creates
a local binding for 50.6.7.x (with a value of 49) and sends
it to LER A. While doing this LSR B makes entries in its LIB,
logging both the local binding and the remote binding for
Award Solutions' eBook is authorized for a single user only. Do not distribute.
74
5 | MPLS Labels
Ingress LSP
LSR a
• LSP Control Modes LFIB
– Independent vs. Ordered MPLS Network
LER 2 LFIB Egress
• Label Distribution Modes
– Unsolicited Downstream (UD) LER 3
LER 1
vs. Downstream-on-demand (DOD)
• Label Retention Modes
– Liberal vs. Conservative
Pastland
40.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
75
5 | MPLS Labels
1. OSPF
Futureland 20.0.0/24 Award
2. Bind 20.0.0/24
20.0.0 30.0.0
to Label 35
Cisco:
Independent Independent Control
LSP Control
-Unsolicited Downstream (UD)
MPLS supports two methods of label assignment to an Using a Conservative Label Retention policy extra labels
FEC called label binding. The first is called independent are discarded, minimizing data storage management
control and is shown in this figure. LER A has used OSPF problems. Using a Liberal Label Retention policy the
to advertise address prefix 20.0.0/24 to LSR B. Upon network retains all labels even if there is not a current
receiving this advertisement LSR B independently creates need for the label. This has the effect of speeding up
a local binding for FEC 20.0.0 and assigns a label (e.g., convergence when changes occur in the network. The
35; local binding: 20.0.0:35). Later LSR B receives default Cisco policy is Liberal Label Retention.
another OSPF advertisement for prefix 30.0.0/24. Again,
LSR B independently creates another local binding
assigning a label value of 67 (local binding 30.0.0:67).
The control modes do not indicate the rules for
distributing these local bindings. The independent control
for creation of local bindings is generally coupled with the
Unsolicited Downstream (UD) label distribution mode. The
rules governing how these bindings will be distributed are
called label distribution modes.
The advantage of independent control is that the network
might establish LSPs more quickly, although this can
result in numerous bindings that are not associated with
any LSP. This brings in the question whether these extra
labels should be retained or discarded.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
76
5 | MPLS Labels
Ordered Control
-Downstream on Demand (DOD)
Award Solutions Proprietary
The second label control mode is ordered control, shown The downside to ordered control/DOD solution is that it
in this figure. It is so named because the label takes more time than independent control to establish the
assignments occur in an ordered manner. In ordered LSP. Some people consider this “latency” a small price to
control the MPLS router only creates a local binding for a pay for the control it gives the network administrator.
FEC if it recognizes that it is the egress LER for the FEC or Others think ordered control is too cumbersome. For
if the MPLS router has received a (remote) label binding MPLS both approaches are supported, but keep in mind
from the next hop in the LSP toward the FEC. The example that ordered control should be implemented at all LSRs if
in this figure shows the operation emanating from the it is going to be effective.
egress LER C. LER C recognizes that it is the egress LER
for FEC 30.0.0 and it creates a local binding with label
value 45 (Local Binding 30.0.0:45). Similarly, LER A
recognizes that it is the egress LER for FEC 20.0.0,
therefore creating a local binding with label value 83
(Local Binding 20.0.0:83)
Again, the label control mode does not define how LER C
distributes the local bindings but the ordered control for
creation of local bindings is generally coupled with the
Downstream On Demand (DOD) label distribution mode.
When coupled with DOD, ordered control ensures that all
LSRs use the same FEC as the initial advertiser. This
alternative also allows a network administrator some
leeway in controlling how LSPs are established.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
77
5 | MPLS Labels
R3
LIB for R1
FEC Local or Router Label 50.6.7.0/24
Remote ID
R1 R5 Customer
50.6.7 L R1 17 Network
LIB for R5
FEC Local or Router Label
Remote ID
50.6.7 L R5 57
Award Solutions' eBook is authorized for a single user only. Do not distribute.
78
5 | MPLS Labels
R3
LIB for R1
FEC Local or Router Label 50.6.7.0/24
Remote ID
50.6.7 L R1 17 R5 Customer
R R3 37 R1 Network
R R5 57
LIB for R5
FEC Local or Router Label
Remote ID
50.6.7 L R5 57
R R1 17
R R3 37
Award Solutions' eBook is authorized for a single user only. Do not distribute.
79
5 | MPLS Labels
Exercise:
Step 1: Create a local binding by associating (binding) a
FEC (network prefix from the routing table) with the label
value. Assume each is assigned a label that has a value
10 times the router number plus the third field entry in the
network IP address (e.g., router R1 uses a label of 11
(1*10 + 1) for the label value for network 50.6.1). R3
uses label 31, and R5 uses label 51 for network prefix
50.6.1.
Step 2: Distribute the local labels from each router to each
of their adjacent routers and update the LIB with the
remote label bindings.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
80
5 | MPLS Labels
MPLS Label
Distribution
Award Solutions' eBook is authorized for a single user only. Do not distribute.
81
5 | MPLS Labels
Futureland LFIB
20.0.0 LSR A LFIB In Out Next Hop
LER 1
54 none none
LFIB
FEC = 30.0.0
LFIB IP Forwarding Table
Label = 54
LER 2 Destination Next Hop
30.0.0 Direct
MPLS Network
LFIB
LER 3
Pastland
40.0.0
Award Solutions Proprietary
Since LER 1 is the egress MPLS LER for any LSP destined
for Award, LER 1 decides to set up LSPs for Award’s
network (with network ID 30.0.0). This process is initiated
manually by network personnel or as a result of LER 1
learning about Award’s network through routing updates.
LER 1 selects a free label (e.g., 54) from its label pool,
binds it to Award’s network (with network ID 30.0.0) and
sends a label-binding message to its adjacent routers. In
our example this message is sent from LER 1 to LER 3
and LSR A. The message contains the network ID 30.0.0
and the label 54. Now any packet that is destined for
Award’s network (30.0.0) is part of the same FEC. In
addition, LER 1 makes an entry in the Label Forwarding
Information Base (LFIB).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
82
5 | MPLS Labels
30.0.0 LER 1
Award Solutions' eBook is authorized for a single user only. Do not distribute.
83
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
84
5 | MPLS Labels
LFIB
LFIB
LER 2
LER 1
FIB
In Out Next Hop MPLS
none 36 LSR A LER 3 LFIB Network
Pastland
40.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
85
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
86
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
87
5 | MPLS Labels
LFIB LER 1
LFIB
LFIB
LER 2
In Out Next Hop LFIB
none 36 LSR A In Out Next Hop
LFIB
LER 3 82 none none
LFIB
In Out Next Hop
Pastland
61 82 LER 1 40.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
88
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
89
5 | MPLS Labels
LSR A LSR B
LER 1 LER 2
LER 1 to LER 2 traffic
2nd Customer 41 52 63
2nd Customer
Net a IP Header IP Header IP Header Net b
Payload Payload Payload
In this chart the MPLS service provider has a customer But suppose that Net 1 and Net a both have a prefix of
who has two geographically dispersed networks and wants 10.2.3 while Net 2 and Net b both have a prefix of 10.4.5.
to use the MPLS network to “connect” Net 1 to Net 2. When LER 2 receives a packet destined for 10.4.5.8
When we describe Layer 2 VPNs (L2VPN) and Layer 3 should it be sent to the first customer of the second
VPNs (L2VPN) we will elaborate how this might be done. customer?
To accommodate the customer, the service provider has
established a LSP from LER 1 to LER 2. A MPLS label of
41 is attached to the customer’s IP packets received at
LER 1, then forwarded toward LER 2. LER 2 receives the
customer’s IP packets which now have a label of 63,
removes the label and forwards the packet to Net 2.
Suppose now a second customer is added who connects
their Net a through LER 1 and their Net b through LER 2.
The end points are the same and there are plenty of
resources so the service provider applies the same
labeling for the second customer as it did for the first
customer. This may work fine if all of the customer’s
networks have public IP addresses.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
90
5 | MPLS Labels
Label Stacking
Customer 1 41 52 63 CE
10.10 CE
65 65 65
Customer 1
IP Header IP Header IP Header 10.20
Payload Payload Payload
VPN 65
LSR A LSR B
Customer 1 Tunnel (65)
LER 1 LER 2
Customer 2 Tunnel (20)
41 52 63
Customer 2
Customer 2 20 20 20 10.20
10.10 CE
CE IP Header IP Header
IP Header
Payload Payload Payload
VPN 20
Award Solutions Proprietary
To answer the question from the previous chart, label The ingress LER identifies the customer sending packets
stacking in MPLS allows multiple labels to be carried and applies a lower label identifying that customer. It then
simultaneously in a packet. This chart demonstrates a attaches a second label used for label swapping across
scenario where stacked labels are required. Our two the MPLS network. The egress LER pops the top label,
customers may both be using private IP addressing and uses the bottom label to forward the packet to the
(overlapping IP address spaces) to communicate across correct customer’s network.
the MPLS backbone network between their respective
subnets 10.10/16 and 10.20/16 (private IP addresses).
The paths they are taking through the MPLS network are
the same.
This leads to the possibility that Customer 1 sending
packet from its 10.10 subnet to its 10.20 subnet could be
mistakenly sent to the 10.20 subnet of Customer 2. To
eliminate this possibility a VPN label label of 65 is
assigned to all of packets for Customer 1, and a VPN label
of 20 is assigned to all of the packets for Customer 2.
These VPN labels are stacked below the path identifying
labels and used on the egress LER to identify the
customer, and where to forward the packets
Award Solutions' eBook is authorized for a single user only. Do not distribute.
91
5 | MPLS Labels
Summary
• MPLS adds a four-byte header to packets which
includes label and QoS bits.
• An MPLS label is an unstructured 20-bit number.
– Some label numbers have special meaning.
– Each router assigns its own label and distributes:
• Independently – Unsolicited Downstream and
• Ordered – Downstream On Demand.
• Routers use a Label Information Base (like a
routing table) to make forwarding decisions.
• Label stacking is used for MPLS tunnels.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
92
5 | MPLS Labels
Review Questions - I
1. A shim header is a must in IP networks. True
or False? (Justify your answer.)
2. Match the fields used to carry a label with
L2 technology:
A. Shim 1. ATM
B. VPI/VCI 2. FR
C. DLCI 3. Ethernet
Award Solutions' eBook is authorized for a single user only. Do not distribute.
93
5 | MPLS Labels
Review Questions - II
3. Label Stacking is restricted to only two labels. True or
False?
4. The LFIB contains an entry for each LSP. True or False?
5. LSRs generally swap labels. True or False?
6. The LSR uses IP forwarding table to forward packets. True
or False?
7. In “Independent Control,” what triggers a label assignment
operation?
A. OSPF routing update message
B. Label-to-FEC binding message
C. Packet without a label
D. Packet with a new label value
Award Solutions' eBook is authorized for a single user only. Do not distribute.
94
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
95
5 | MPLS Labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
96
6 | MPLS Protocols
Chapter 6:
MPLS Protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
97
6 | MPLS Protocols
Objectives
After completing this module, you will be able
to:
• Describe how labels are distributed using the
Label Distribution Protocol (LDP)
• Explain how existing protocols such as RSVP and
BGP can be used to distribute labels
Award Solutions' eBook is authorized for a single user only. Do not distribute.
98
6 | MPLS Protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
99
6 | MPLS Protocols
Several protocols have been defined for implementing the The Label Information Base (LIB) is populated by label
label distribution functionality required in MPLS. MPLS bindings received from LDP, RSVP, or MP-BGP, or
standards have also defined a brand new protocol for statically assigned. RSVP distributes labels only for traffic
distributing label information between routers. This is engineering and MP-BGP distributes labels only for BGP
known as the Label Distribution Protocol (LDP). Some of Customers, while LDP distributes labels for interior routes.
the existing routing protocols have also been enhanced to
carry label information. For example routing protocols
such as OSPF and BGP have been enhanced to carry label
information along with routing updates. The Resource
Reservation Protocol (RSVP), which was originally
designed for Quality of Service (QoS) reservations, has
been enhanced to carry label information. The LDP and
RSVP are the two dominant intra-domain label distribution
protocols supported in MPLS routers today.
The protocols discussed so far implement basic label
distribution functionality. RSVP with Traffic Engineering
extensions (RSVP-TE) is the primary protocol for
supporting traffic engineering functionality, while LDP is
used when Traffic Engineering is not involved. RSVP-TE
also supports QoS reservation capabilities.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
100
6 | MPLS Protocols
LDP
Award Solutions' eBook is authorized for a single user only. Do not distribute.
101
6 | MPLS Protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
102
6 | MPLS Protocols
MPLS does not make a forwarding decision with each Shown at the top of the chart is another use of LDP
layer 3 datagram (based on the addressing and Type of generally referred to as Targeted LDP. This is used to
Service contents of the layer 3 header). Instead, a exchange L2VPN label values between LERs (PE routers).
forwarding equivalency is determined for classes of layer Unlike the regular LDP which unicasts the label value to all
3 datagrams and a fixed-length label is negotiated neighbors, Targeted LDP unicasts the label value
between neighboring LSRs along label switched paths independently to each relevant LER separately.
(LSPs) from ingress to egress. Routers with label switching
capabilities must be able to determine which of their
neighbors are capable of MPLS operations. They must
then agree upon the label values to be used for the
transport of user traffic. LDP is used to support this
requirement.
This figure shows the general concepts of LDP. It operates
between LSRs that are directly connected via a link (LSR A
and LSR B as well as LSR B and LSR C). It can also
operate between non-adjacent LSRs: LSR A and LSR C,
shown in the figure with dashed lines. Obviously, the LDP
messages for the label bindings for LSR A and C flow
through LSR B, but LSR B does not take action on them.
LSRs that use LDP to exchange label/FEC mapping
information are called LDP peers and they exchange this
information by forming an LDP session.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
103
6 | MPLS Protocols
Session Messages
Advertisement Messages
Notification Messages
Award Solutions' eBook is authorized for a single user only. Do not distribute.
104
6 | MPLS Protocols
LSR A
LSR B
z
Label space b1, 1-500 Int. b1
LFIB
In Out Interface
19 54 b1
26 54 b2
Interface :
Award Solutions Proprietary
Label spaces in LDP are the same as those defined in which two ATM switches have multiple links connecting
MPLS namely: them and perhaps reuse the labels on each interface.
With this approach, a label space and its LSR is always
• Per Interface: Label space where each interface can
known if the LDP identifier accompanies an LDP message.
reuse the labels. Suppose label 54 is assigned to a
In this example, labels 1-500 are used twice and the LDP
LSP on egress port A. If the router supports per
identifiers keep the label spaces uniquely identified.
interface label spaces the router can assign label 54
to another LSP on egress port B.
• Per Platform: Label space where a label can be used
for one LSP for the router. If label 54 is assigned to a
LSP on egress port A then label 54 can not be
assigned to another LSP on egress port B. A per
platform label space is required if the network needs
to support various path recovery procedures. Why?
A label space is identified with a six octet LDP identifier.
The first four octets identify a LSR and must be a globally
unique value, such as an IP address (a router ID). Often
this is the loopback 0 IP address of the router. The last
two octets identify the label space within the LSR.
If the LSR uses multiple label spaces it associates a
different LDP identifier with each label space. Multiple
label spaces may be encountered in ATM networks in
Award Solutions' eBook is authorized for a single user only. Do not distribute.
105
6 | MPLS Protocols
RSVP
Award Solutions' eBook is authorized for a single user only. Do not distribute.
106
6 | MPLS Protocols
LER 1 LER 2
Futureland Award
20.0.0 30.0.0
Let’s show how label distribution is used for the LSP setup In addition, the PATH message may also carry information
with an example. We will use RSVP for label distribution to regarding required QoS for the LSP. LSR A makes note of
set up the LSP. RSVP was originally defined for supporting the request and forwards the PATH message to LER 2.
QoS reservations in IP networks, it has been extended to LER 2 is the egress point for the LSP. It is connected to
carry label information. the Award network and must start the allocation of labels.
Note that at this point we have not allocated any labels for
Let’s take the same example we used before for the LSP
this path.
setup process. We used generic message names such as
label request and label binding during the LSP setup. We
take the same example and apply RSVP messages to set
up the LSP.
The goal is to set up a LSP from the Futureland network to
the Award network. The LER1 attached to Futureland
decides to set up a LSP to Award with the network prefix
30.0.0. The decision to set up LSPs may be through
manual intervention (network management systems) or as
a result of LER1 learning the route from LSR A. LER1
sends a PATH message with a Label Request Object to
LSR A.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
107
6 | MPLS Protocols
LSR A
RESV RESV
Label Label
LER 1 LER 2
(42) (37)
Futureland Award
20.0.0 30.0.0
Award Solutions' eBook is authorized for a single user only. Do not distribute.
108
6 | MPLS Protocols
LFIB
LER 2
LER 1
LFIB LFIB
LFIB
Futureland In Out Next Award
20.0.0 Hop 30.0.0
LFIB 42 37 LER 2
In Out Next Hop LFIB
In Out Next
none 42 LSR A Hop
37 none Direct
Award Solutions' eBook is authorized for a single user only. Do not distribute.
109
6 | MPLS Protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
110
6 | MPLS Protocols
Use of BGP
iBGP
LSR A
eBGP eBGP
CE
LER 1 LER 2
Futureland CE Award
20.0.0 30.0.0
Border Gateway Protocol (BGP) is an Exterior Gateway The BGP operations are quite similar to the conventional
Protocol (EGP) used to perform inter-domain routing. The MPLS label stacking operations. For example if LER 1
BGP session between two BGP peers is said to be an needs to send a packet to destination Award (30.0.0) and
external BGP (eBGP) session if the BGP peers are in LER 1’s BGP next hop for Award is LER 2, and LER 2 has
different Autonomous Systems (AS) and is said to be an mapped label L to Award, then LER 1 first pushes L onto
internal BGP (iBGP) session if the BGP peers are in the the packet's label stack. LER1 then consults its Internal
same autonomous systems. In the chart, LER 1 and LER 2 Gateway Protocol (IGP) to find the next hop to LER2, call it
are peers in the same (MPLS) AS; iBGP is used here as a LSRA. If LSRA has distributed to LER1 a MPLS label for
routing protocol. Futureland and Award are both separate the route to LER 2, LER 1 can push this label on the
autonomous systems from the backbone MPLS network; packet's label stack and then send the packet to LSR A.
therefore exchanging of routing information between the
If a set of BGP speakers are exchanging routes via a route
LER 1 and a Customer Edge (CE) Futureland and between
reflector then by piggybacking the label distribution on the
LER 2 and the CE router in Award Solution involves the
route distribution, one is able to use the route reflector to
use of eBGP.
distribute the labels as well. This improves scalability
BGP has also been enhanced to support label distribution. significantly.
When BGP is used to distribute a particular route it can
also be used to distribute a MPLS label that is mapped to
that route. The label mapping information for a particular
route is piggybacked in the same BGP Update message
that is used to distribute the route itself.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
111
6 | MPLS Protocols
Award Solutions' eBook is authorized for a single user only. Do not distribute.
112
6 | MPLS Protocols
Summary
• MPLS may use LDP (created for MPLS), RSVP and
BGP to distribute labels.
• LDP is used for distribution of hop-by-hop labels; it
establishes a neighbor relationship between
routers; and it distributes and withdraws labels .
• RSVP is used for explicit path LSPs.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
113
6 | MPLS Protocols
Review Questions
1. Which of the following protocols support label distribution
functionality?
A. Label Distribution Protocol (LDP)
B. Dynamic Host Configuration Protocol (DHCP)
C. Border Gateway Protocol (BGP)
D. Open Shortest Path First (OSPF)
2. When RSVP is used to distribute labels the actual label
bindings are carried in which of the following?
A. The label object
B. The explicit route object
C. The RESV message
D. None of the above
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
114
7 | MPLS and QoS
Chapter 7:
MPLS and QoS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
115
7 | MPLS and QoS
Objectives
After completing this module, you will be able
to:
• Describe why QoS is important for today’s
network services
• Explain the application of MPLS-to-QoS
mechanisms:
― Integrated Services
― Differentiated Services
Award Solutions' eBook is authorized for a single user only. Do not distribute.
116
7 | MPLS and QoS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
117
7 | MPLS and QoS
We know that IP delivers packets in a connectionless There are obvious benefits to adding QoS capabilities to
manner. The packets may follow different routes before the network. Real-time sensitive services can request and
reaching the destination. The delay is not the same for all obtain the necessary network resources to enable their
packets. Some packets may reach the destination earlier smooth delivery. This changes the network into a multi-
than others. Because they might arrive out of order at the service network that can handle both data applications as
destination the packets must be placed in the proper well as voice and multimedia services. In addition, service
order before the message can be interpreted. All of these providers who build QoS capabilities into their network can
factors make IP unsuitable for sending time sensitive demand that users pay extra for real-time or other
data. In other words, Quality of Service (QoS) cannot be premium services, such as high bandwidth, that require
guaranteed by IP. extra network resources.
Therefore, proper QoS mechanisms must be put in place Changing from a best-effort based network to one
to handle time-sensitive data. The QoS mechanisms allow providing different qualities of service can also have
hosts to request allocation of network resources that beneficial secondary effects. One is that a single
support certain traffic characteristics. For example, a aggressive user cannot seize a disproportionately large
specific host may request an allocation of 128 kbps data amount of network resources to the possible exclusion of
rate with a maximum acceptable delay of 90ms. The other users. This kind of restraint may lead to a more
network, on its part, can either dedicate resources for the balanced and better overall utilization of the network.
host or prioritize network traffic to meet the QoS
requirements of the host.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
118
7 | MPLS and QoS
Sender Receiver
LSR
LSR
LER
LER LSR
LSR LER
RESV Msg
Rspec
Label Obj Labels are distributed upstream to establish
an LSP with guaranteed QoS resources.
Award Solutions Proprietary
The Resource Reservation Protocol (RSVP) was designed upstream from the egress LER. The Rspec indicates the
to signal Quality of Service (QoS) requests across an IP type of integrated services required and the filter
network. In a MPLS network simple extensions to RSVP specification (filter spec) that characterizes the packets
allow it to establish a Label Switched Path (LSP) with QoS for which the reservation is being made. In this way, the
requirements. Using these extensions it is straightforward LSP is established and each LSR/LER reserves resources
to employ QoS in a MPLS network. As shown in the figure, according to the QoS parameters carried in the RESV
the sender initiates a RSVP PATH message with a Traffic message for that LSP.
Specification (Tspec) object and a Label Request object.
The Tspec object identifies the characteristics of the
traffic the path is expected to support. There can be lower
and upper requirements for bandwidth as well as delay
and jitter tolerances. The label request is notifying the
routers along the path that a label-switched path is being
planned to go through this router. In a MPLS network each
LSR/LER processes the PATH message in the same way
as regular IP routers.
An RESV message is returned from the egress router to
the head end router along the same path carrying a Label
Object and a Request Specification (Rspec) object.
The label object carried in the RSVP RESV message
communicates the label information to create a new LSP
Award Solutions' eBook is authorized for a single user only. Do not distribute.
119
7 | MPLS and QoS
DiffServ in MPLS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
120
7 | MPLS and QoS
Differentiated Services
Router at edge of network
Network A assigns class of service;
sets Type of Service field
Network B
Voice
Network allocates Video on demand
resources to classes of
service rather than WWW data
individual flows
The traditional integrated services approach to reserving For example, they may reserve percentages of bandwidth
resources on a packet data network presented several for specific classes or assign relative priorities to packets
problems. Because resource reservation was typically within the service classes.
done on a per-data flow basis, the architecture did not
It is important to realize that traffic is not prioritized within
scale as well as the number of flows grew larger. The
a given service class. As such, the differentiated services
Resource Reservation Protocol (RSVP) also required that
approach cannot strictly promise quantifiable service for a
applications periodically re-register their resources. This
single user. In order to provide any assurance of service
was to protect against instances where applications did
quality the service provider must carefully monitor
not correctly release their resources when they
network traffic.
terminated. Additionally, the need to prioritize individual
data flows greatly complicated the jobs of routers in the One example of a differentiated services protocol is
network. DiffServ. DiffServ redefines the Type of Service field of the
IP header. It uses the first six bits of the field as a service
The differentiated services approach to providing assured
designator enabling 64 possible grades of service, the
Quality of Service (QoS) avoids many of these issues.
remaining two bits are reserved for future use. DiffServ is
Instead of reserving resources for individual data flows,
mostly intended to be used at the network boundary to
packets are assigned to a class of service. The set of
implement some service level agreement between two
service classes is relatively small and static. Routers can
service providers.
use the packet’s class designation as an index into a table
that defines appropriate behaviors for each class. Exactly
how routers treat the various service classes is open.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
121
7 | MPLS and QoS
DiffServ Domain
Award
SLA
Network
A DiffServ domain is a network of routers where every The policy manager is a central repository of all Service
router implements the QoS mechanisms based on the Level Agreements (SLAs) between the user and the
DiffServ model. Every router in the domain implements a DiffServ domain service provider. The policy manager (or
consistent set of service levels (or per-hop behavior QoS manager) defines and distributes policies for
definitions – PHBs). Each service level is treated the same different customers to the routers. The policy information
way at every router. For example, the packets belonging to distributed to edge routers and transit routers are
an Expedited Forwarding PHB are provided the same different. The policy information distributed to the edge
bandwidth and delay constraints at each router. routers includes classification, marking and enforcement
rules. However, transit routers require only PHB
The edge router is the entry point to the DiffServ Domain.
configuration information. In other words, what are the
As packets enter the DiffServ domain the edge router has
associated characteristics of a PHB? These include
to classify the packets to different PHBs supported by the
bandwidth definition, delay requirements, packet loss and
domain. Once the classification is done each packet has
many other QoS parameters.
to be marked to indicate the service level (or PHB) it will
receive in the network. Finally, it must enforce policies set
for the customer by the policy manager. We will elaborate
on each of these aspects later.
The transit routers do not have either classification or
traffic enforcement responsibility. It simply has to provide
the appropriate QoS associated with each PHB. How does
it know the PHB associated with each packet? Somehow,
the edge router has to mark that information in each
packet. We will see later how it is done.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
122
7 | MPLS and QoS
Award Solutions' eBook is authorized for a single user only. Do not distribute.
123
7 | MPLS and QoS
8 bits
DSCP
Header Type of Service
6 bits
Payload
Award Solutions' eBook is authorized for a single user only. Do not distribute.
124
7 | MPLS and QoS
Policy Output
Configuration Queues
Input
Schedulers
Packet
Classification
Traffic
and Metering
Enforcement
Marking
Edge Router
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
125
7 | MPLS and QoS
EF
AF 1
Classification
Schedulers
Packet
and
Marking AF 2
Operator
Defined
Simply look BE
at DSCP
Award Solutions' eBook is authorized for a single user only. Do not distribute.
126
7 | MPLS and QoS
User User
Ingress Transit Egress
LER LSR LER
Award Solutions' eBook is authorized for a single user only. Do not distribute.
127
7 | MPLS and QoS
Summary
• MPLS core network supports applications
with varying QoS needs for IP Convergence.
• RSVP is used to setup QoS enables explicit
paths.
• DiffServ codes point from IP packets are
mapped onto MPLS EXP bits.
– LER does this mapping and polices the traffic.
– LSR prioritizes the packets based on EXP bits.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
128
7 | MPLS and QoS
Review Questions - I
1. RSVP carries the QoS requirements for a label-
switched path by defining a per-hop behavior. True or
False? (Justify your answer.)
2. The interior nodes in a DiffServ region are responsible
for:
A. Traffic policing
B. Traffic shaping
C. Per-hop behavior
D. Service level agreements
Award Solutions' eBook is authorized for a single user only. Do not distribute.
129
7 | MPLS and QoS
Review Questions - II
3. How many Diff-Serv PHBs have been standardized?
A. 64
B. 8
C. 14
D. None
4. How many QoS values are supported by MPLS?
A. 14
B. 8
C. 4
D. QoS is not supported by MPLS.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
130
8 | MPLS and Traffic Engineering
Chapter 8:
MPLS and Traffic
Engineering
Award Solutions' eBook is authorized for a single user only. Do not distribute.
131
8 | MPLS and Traffic Engineering
Objectives
After completing this module, you will be able
to:
• Define Traffic Engineering (TE)
• List the application of MPLS to traffic
engineering
• Describe how MPLS supports traffic engineering
― Constrained routing
• Explain link and node failure protection in MPLS
― Fast Re-Route (FRR)
Award Solutions' eBook is authorized for a single user only. Do not distribute.
132
8 | MPLS and Traffic Engineering
Motivation for
Traffic Engineering
Award Solutions' eBook is authorized for a single user only. Do not distribute.
133
8 | MPLS and Traffic Engineering
Minimizing congestion is one of the most important traffic- The major problem with the “more bandwidth” philosophy
and resource-oriented performance objectives. is that it leads to very poor utilization of very expensive
Congestion can be described in two scenarios. The first is network resources, during periods when there is less
straightforward: there are insufficient resources to traffic (say during the early morning hours). It is akin to
accommodate the user’s traffic. The second is building a freeway system that accepts all rush hour
considerably more complex: there are sufficient resources traffic, and at 2:00 am the twenty lanes of asphalt are
in the network to support the user’s QoS needs but the almost empty.
traffic streams are not mapped properly onto the available
The second type of problem, inefficient resource
network resources (principally, the communications links
allocation can usually be addressed through traffic
between nodes). Therefore, some parts of the network
engineering. After all, the resources are available in the
become under-utilized and others are saturated with user
network. It is a matter of finding them and diverting user
traffic.
traffic to them. In general, congestion resulting from
The first problem is solved by building networks with more inefficient resource allocation can be reduced by adopting
bandwidth (say, in a freeway analogy, putting in more load balancing policies; that is diverting traffic to available
freeways). We also can help matters by applying links and nodes.
congestion control techniques, such as window control
operations with “receive not ready” and “congestion
notification” (in the freeway analogy, placing traffic lights
at the entrance ramps to the freeway).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
134
8 | MPLS and Traffic Engineering
Downtown
Dallas
Plano
Award Solutions' eBook is authorized for a single user only. Do not distribute.
135
8 | MPLS and Traffic Engineering
Highway 85
Downtown
Dallas
Plano
Award Solutions' eBook is authorized for a single user only. Do not distribute.
136
8 | MPLS and Traffic Engineering
Traffic Engineering
Award Solutions' eBook is authorized for a single user only. Do not distribute.
137
8 | MPLS and Traffic Engineering
Traffic Engineering (TE) is a systematic method of TE can be performed to optimize the level of traffic
mapping traffic flows on to physical links in the network. performance in a network or alternatively, optimize the
When the amount of traffic in a network begins to grow, total usage of network resources. The former case allows
the network experiences congestion at some point. If the the provider to make guarantees to his customers but the
reason for the congestion is a simple lack of network later case might allow the provider to maximize his
resources then the solution is to increase resources; revenue by fully utilizing all of his network equipment.
however, the reason for the congestion might be an
imbalance in the use of network resources. That is, some
paths in the network may be experiencing overutilization
while alternate paths remain underutilized. In the latter
case, network providers can resort to TE to balance the
resource usage in their networks. Furthermore, TE allows
a network provider to map out the expected flows of traffic
in his network and what resources will be allocated to
those flows ahead of time.
TE consists of setting up predetermined (explicit) paths
through the network with a particular amount of
resources. Predominantly, the resource tracked is
bandwidth and this allows the network provider to predict
and guarantee the level of performance to his customers.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
138
8 | MPLS and Traffic Engineering
Futureland
IP Backbone
R4 Award
30.0.0
R1 R5
550 Mbps
R2 R3
Pastland
Requires
500 Mbps
Award Solutions Proprietary
Let’s suppose that we have a pure IP network that IP routing protocols in the transit network are used to
consists of IP routers. Such a network can benefit from calculate the best paths for data to take. Some metrics
Traffic Engineering (TE) but the question is how can TE be must be applied to the links to enable this. The limitation
implemented? Let’s again consider three networks, with IP routing protocols is that the “best” or “shortest”
Award, Futureland and Pastland connected to a service path will be selected. When data enters the transit
provider’s IP network. network with Award’s network as the destination either
the upper or lower path will always be selected as the best
Suppose that the network needs to support two kinds of
path depending upon the link metrics.
customer flows. The first flow is from Futureland’s network
to Award’s network with a maximum bandwidth of 225 Since IP routing works on destination alone there is no
Mbps. The second flow from Pastland’s network to way to separate one traffic flow from the other. So no
Award’s network has a maximum of 500 Mbps. The transit matter how the link metrics are manipulated by the
network has two parallel paths that connect networks network provider, the traffic flows cannot be engineered in
Futureland and Pastland to Award’s network. The lower this network. The result is a sub-optimal condition where
path has more bandwidth than the upper path but neither one path is over utilized while the other path is
one can support both traffic flows. Ideally, the goal of TE is underutilized.
to use the upper path for traffic between Futureland’s
network and Award’s network while using the lower path
for traffic between Pastland’s network and Award’s
network.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
139
8 | MPLS and Traffic Engineering
ATM
Requires Router
550 Mbps
500 Mbps
ATM2 ATM3
PVC (Pastland –
Pastland
Award)
ATM
Router
Award Solutions' eBook is authorized for a single user only. Do not distribute.
140
8 | MPLS and Traffic Engineering
The introduction of MPLS technology into an IP network MPLS protocols working in conjunction with IP routing
provides a more superior tool for Traffic Engineering (TE) protocols form a single logical network which is far easier
than the direct use of an ATM or Frame Relay network. to maintain than the two separate IP and ATM networks
There are several reasons for this with the primary one traditionally required. Additional benefits from MPLS
being the capability of MPLS to integrate TE directly with include the integration of Quality of Service (QoS)
the IP network. Unlike a pure IP network that does not mechanisms into MPLS as well as the possibility of
possess any TE capabilities MPLS offers explicitly routed automating the TE process. Not all parts of the TE process
Label Switched Paths (LSP), the ability to associate can be fully automated but MPLS protocols support
network resources with these paths, and an efficient automation of several steps of the process and new
mechanism for packet forwarding. The ability to establish mechanisms are currently being developed.
explicitly routed paths is a prerequisite to TE as the
network provider must be able to set up arbitrary paths
through the network without regard for the “shortest”
path. Furthermore, the network provider must be able to
pre-allocate network resources such as bandwidth to
these paths so that traffic flows can be carried
successfully.
Another significant benefit to MPLS technology is its ability
to efficiently map an IP network over ATM hardware. Since
the MPLS control layer can directly control the ATM
switching hardware there is no need for the network
provider to operate a logical ATM network.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
141
8 | MPLS and Traffic Engineering
Traffic Engineering
Process
Award Solutions' eBook is authorized for a single user only. Do not distribute.
142
8 | MPLS and Traffic Engineering
MPLS TE Process
1. Understand traffic required Define traffic trunks in terms of:
to traverse the network BW, hops, policy, etc.
The figure illustrates the four major steps in the Traffic This can be readily accomplished by adding
Engineering (TE) process when using MPLS in IP networks. extensions to the IGP of choice to carry the new
The steps are described below: attributes. For example, OSPF can be used to flood
link attributes to all nodes. Traditional routing
1. The first step is to understand the traffic that is
information using link metrics must also be collected
required to traverse the network. This might be a
and distributed.
strict requirement set by a customer for a predictable
traffic pattern or it may be an estimate by the
network provider of typical traffic conditions. This
traffic pattern is called a traffic trunk. A traffic trunk is
defined in terms of bandwidth, the amount of delay
(which may be described in network hops), and other
traffic characteristics as well as policy information.
Policy includes things such as traversing desirable or
forbidden network links or keeping certain customer’s
traffic separate from other traffic. Thus, policy may
affect the decision on how to route the traffic trunk.
2. The link attributes that describe the network
resources associated with each link need to be
collected and disseminated across the whole
network. Typically, the resource is available
bandwidth on each link.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
143
8 | MPLS and Traffic Engineering
LSR C
LSR A
Pastland
LSR B
Award Solutions' eBook is authorized for a single user only. Do not distribute.
144
8 | MPLS and Traffic Engineering
Futureland
LSR E LSR D
LSR F
LSR A LSR C
Pastland
LSR B
Bandwidth on links is flooded
through routing protocols
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
145
8 | MPLS and Traffic Engineering
Futureland LSR D
LSR E
LSR F
225 Mbps
Award
LER2 30.0.0
LER1
LSR C
LSR A
Pastland
LSR B Avoid
Required
Award Solutions' eBook is authorized for a single user only. Do not distribute.
146
8 | MPLS and Traffic Engineering
Overview of RSVP-TE
1. Ingress LER initiates set 2. Labels are distributed upstream to establish
up an constrained LSP an LSP with QoS resources allocated
RSVP RESV
Rspec
Futureland
LSR D
…
LSR E
LSR F
RSVP PATH
Award
Explicit Route LER2 30.0.0
LER1
Tspec
…
LSR A LSR C
Pastland
LSR B
4. The final step is to define the LSP for the explicit path The LSP is established as the RESV message is
determined through C-SPF. We have determined the processed in the upstream direction. The Rspec value
path required to satisfy the customer traffic trunk helps the LSRs reserve the proper resources to
requirements. The next step is to set up an LSP along support the LSP’s QoS.
the path. This is where the explicit routed LSP setup
process is used. The LDP and RSVP protocols have
been enhanced to set up explicit LSPs. The RSVP
Traffic Engineering extension is called RSVP-TE, and
has the ability to carry an explicit path definition as
one of the parameters. This is an example of the use
of RSVP-TE.
In the example, the ingress LER initiates the LSP by
sending a PATH message. The PATH message
contains an extension to carry the explicit route. In
the forward direction, RSVP-TE operates very similarly
to a standard RSVP PATH message (except for the
explicit route). Once the egress LER determines the
reservation requirements, it generates and adds the
Rspec and label information in the RESV message.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
147
8 | MPLS and Traffic Engineering
Fast Re-Route
Award Solutions' eBook is authorized for a single user only. Do not distribute.
148
8 | MPLS and Traffic Engineering
Consider a scenario where an LSP is established from the The breakdown may happen due to transient routing
Futureland network to the Award network and the users conditions in the network, such as when routing
are happily communicating from one end to another. information across the network is changing or when there
Suddenly there is a break in the LSP and communication is a link or node failure.
stops.
It is also referred to as Protection Switching, a mechanism
What are the options at this point when every minute to protect the established LSPs. It introduces an element
counts in millions of dollars worth of lost business? The of robustness to the LSPs with the ultimate objective of
poor service provider frantically begins to set up a new provisioning a fault tolerant MPLS network.
LSP so that communication can be restored. However, it
might take several hours before normal operation is
resumed.
To avoid such scenarios the service provider may keep
stand-by LSPs at critical points in the network and reroute
user traffic in case of such an eventuality. The re-route
must take place transparently so that the users never
realize what happened in the background. This is called
Fast Re-Route - routing packets through alternate paths
whenever established LSPs breakdown.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
149
8 | MPLS and Traffic Engineering
27 67
LSR A LSR F
LSR C 13 LSR E
Award Solutions' eBook is authorized for a single user only. Do not distribute.
150
8 | MPLS and Traffic Engineering
LSR C 13 LSR E
67
Award Solutions' eBook is authorized for a single user only. Do not distribute.
151
8 | MPLS and Traffic Engineering
Summary
• Traffic Engineering (TE) is about efficiently
using the network to support traffic needs.
• The MPLS TE process:
– Identifies the traffic needs (burst, QoS);
– Gathers link conditions and network routes;
– Identifies end-to-end path through the network
to meet the traffic needs; and
– Establishes LSP on that path with RSVP-TE.
• The Fast Re-Route feature of MPLS deals
with link or node failure.
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
152
8 | MPLS and Traffic Engineering
Review Questions
1. Which of the following are possible with Traffic
Engineering?
A. Increase the total bandwidth of network equipment.
B. Increase the total revenue from network equipment.
C. Control the allocation of network resources for different services.
D. Compensate for link or node failures.
2. Name the steps in MPLS Traffic Engineering process in the
right order:
A. Gather link attributes from across the network.
B. Understand traffic required to traverse the network.
C. Establish an LSP across the network.
D. Determine explicit paths across the network.
3. Link attributes for a network can be collected by running
the OSPF protocol. True or False? Justify your answer.
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
153
Award Solutions' eBook is authorized for a single user only. Do not distribute.
154
9 | MPLS Virtual Private Networks
Chapter 9:
MPLS Virtual Private
Networks
Award Solutions' eBook is authorized for a single user only. Do not distribute.
155
9 | MPLS Virtual Private Networks
Objectives
After completing this module, you will be able
to:
• Describe the various VPN alternatives
• Explain L2VPN architecture
• Explain L3VPN architecture
• Describe routing and forwarding in a L3VPN
network using an example
Award Solutions' eBook is authorized for a single user only. Do not distribute.
156
9 | MPLS Virtual Private Networks
Virtual Private
Networks Overview
Award Solutions' eBook is authorized for a single user only. Do not distribute.
157
9 | MPLS Virtual Private Networks
Firewall Corporate
Firewall Intranet
(Headquarters)
Corporate
Intranet
(Branch Office)
Japan
Internet
Supplier’s
Extranet
VPN Tunnel
South America Firewall
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
158
9 | MPLS Virtual Private Networks
VPN Taxonomy
Virtual Private Network (VPN)
• MPLS Core
• Ethernet MPLS-based
L2TPV3 - IP Pseudowires
VPNs
• IP Core • MPLS Core
• Various L2s • Various L2s and L1s
Virtual Private Networks (VPNs) can be defined as physical Finally, the P2P VPWS can be realized as an IP network
layer networks (OSI layer 1 – L1VPN), data link layer called L2TPv3 (Layer 2 Tunneling Protocol Version 3) or a
networks (OSI layer 2) – L2VPN) or network layer networks MPLS service known as Pseudowire Emulation End-to-End
(OSI layer 3 – L3VPN)). or PWE3 (L2 or L1 traffic over a MPLS backbone).
• L1VPN: A L1VPN may take the form an a T1 leased L1VPN and L2TPv3 are not a MPLS services and will not
line network which physically separates one be discussed further in this class.
customer’s traffic from another. Early VPNs were
VPLS is a multipoint L2 VPN technology that allows
L1VPNs but these can be very expensive and difficult
multiple sites to be connected over a simulated Ethernet
to set up and manage.
broadcast domain that is supported across a provider
• L2VPN: With a L2VPN the customer effectively leases provisioned IP/MPLS network. In other words VPLS
a logical leased line from the service provider. The delivers multipoint Layer 2 connectivity over a Layer 3
service provider uses a shared network infrastructure network architecture. VPLS evolved as a logical extension
but provides a logical separation between the traffic of Ethernet over MPLS (EoMPLS) which was developed to
of the customers. Customer routers in one geographic enable point-to-point Ethernet-based L2 VPN services.
area peer with customer routers on another
• L3VPN: This will be discussed later.
geographic area and the network gives the
appearance of a Layer 2 switch between the two
customer routers. The L2VPN can be further
classified into Point to Point (P2P) services referred to
as “Virtual Private Wire Service” or VPWS, and
MultiPoint to MultiPoint (MP2MP) services referred to
as Virtual Private LAN Services or VPLS.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
159
9 | MPLS Virtual Private Networks
L2VPN
Award Solutions' eBook is authorized for a single user only. Do not distribute.
160
9 | MPLS Virtual Private Networks
Layer 2 VPNs
Attachment Pseudowire
Circuit (AC) (PW)
MPLS LSP
CE CE
Site 1 Site 2
VPN 1 VPN 1
P P
PE1 PE2
ATM ATM
cells P P cells
CE CE
Site 1 Service Provider network Site 2
VPN 2 VPN 2
A Layer 2 Virtual Private Network (L2VPN) connects a The PE router receives Layer 2 frames from the CE
number of disparate customers networks enabling them through the Attachment Circuit (AC). These frames are
to function as a single network. As the name implies, the encapsulated using MPLS labels to be transported across
networks are connected at the data link layer (OSI Layer the Packet Switched Network (PSN). The architecture is
2) rather than at the network layer (OSI Layer 3). What based on pseudowires as described in many IETF RFCs.
does this mean to the customer? Suppose the L2 VPN As a result the operations and characteristics of the
customer currently runs a layer 2 network such as ATM, original Layer 2 technology are emulated across the PSN.
Frame Relay or Ethernet which is disconnected. L2LPNs
Tunnel labels will define the path from PE1 to PE2. To
enable the customer to connect the remote locations
multiplex more than one pseudowire onto the same tunnel
without first converting to some other protocol.
a second Virtual Circuit (VC) or Pseudowire (PW) label is
In other words, the customer does not need to make any added below the tunnel label.
changes in their current network. To the customer, the
L2 frames received by PE1 across the ACs are assigned
Service Provider (SP) Network appears as a giant layer 2
VC label (e.g., the Ethernet VC may be assigned 48 while
switch (ATM, FR, or Ethernet). A networking protocol, such
the ATM VC may be assigned 92). On top of these labels
as IP, may be run on top of the layer 2 network but the
will be the tunnel labels for transporting the frame across
customer manages this aspect. Unlike a Layer 3 VPN
the PSN. The egress router (PE2) will recognize from the
(L3VPN) the SP network is not involved in any network
VC label the destination of the frame and forward
level routing for the customers.
accordingly.
MPLS is one of the alternatives for the SP supporting
Targeted LDP is used to signal the pseudowires.
L2VPNs. The SP network can carry any layer 2 data, or a
Below the two labels, control words are added to enable
mixture of different layer 2s for different customers, over
the egress PE router to provide proper treatment for the
the same MPLS Label-Switched Path (LSP).
received packets.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
161
9 | MPLS Virtual Private Networks
33 14 27 CE
CE LSP
VPN Ethernet
Ethernet 21 P 21 P 21
Frame
Frame
Ctrl Word Ctrl Word Ctrl Word
Eth-Fr Eth Fr Eth Fr
PE1 PE2
ATM Cell 33 27
14 ATM Cell
CE 40 40
P P CE
Ctrl Word 40 Ctrl Word
ATM Network
Site 1 ATM Cell Ctrl Word ATM cell ATM Network
VPN 2 ATM Cell Site 2
VPN 2
This chart demonstrates the forwarding of packets in a • Control Word: A 32-bit control word is added that can
L2VPN with a MPLS core network. MPLS can carry packets be used by the egress PE router to determine how to
belonging to many different Layer 2 protocols. It can carry treat this packet. Information contained in the control
ATM or Frame Relay cells just as easily as IP packets. word includes protocol control information, sequence
number, length, etc.
Why would we want to carry ATM cells in the MPLS
network? ATM is one of the more dominant services • VC Header: On top of the Control Word is the Virtual
offered to customers by the service provider today. Circuit (or pseudowire) label that identifies the VPN.
Service providers want to move to the MPLS domain so
• Tunnel Header: The top label is the tunnel label used
that they can support new IP services. A move to MPLS
by MPLS to find its way through the MPLS network.
risks losing the current ATM customers. To mitigate the
problem the service provider can offer a L2VPN service The PE routers that provide this separation management
that enables the customer to continue current service function are called “mediation devices.” These routers
offerings while the service provider’s MPLS PE routers have all of the intelligence in an L2VPN while the
take care of all required translations. customer networks and the MPLS P routers are totally
unaware of the existence of the VPN.
In the example the L2VPN is transporting traffic for both
an Ethernet network and an ATM network. Each Site 1
network sends Layer 2 frames for their respective
technology to PE1. PE1 attaches three different 32-bit
headers: a Control Word, a VPN Header, and a Tunnel
Header.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
162
9 | MPLS Virtual Private Networks
L3VPN
Award Solutions' eBook is authorized for a single user only. Do not distribute.
163
9 | MPLS Virtual Private Networks
CE
PE
CE
PE MPLS Network PE CE
PE CE
Award Solutions Proprietary
Award Solutions' eBook is authorized for a single user only. Do not distribute.
164
9 | MPLS Virtual Private Networks
Cust 2 CE
CE
MPLS Core
P1
PE 1
CE PE 2
P2
Cust 1
MP-iBGP
ASN : nn (64 bits) + IP Network Address (32 bits) (VPNV4)
(Route Distinguisher - RD)
Award Solutions Proprietary
One thing to note when considering Layer 3 VPNs is that The RD combined with the VPN prefix (also called the
multiple routing domains are involved. The CE router in VPNV4 route) is what must be advertised across the MPLS
the customer’s network peers at the network level with a network. To meet the need to advertise the 96-bit VPNV4
PE router in the MPLS core network. This calls for the use route across the MPLS network, an extended version of
of an Exterior Gateway Protocol (i.e., BGP). BGP called Multi Protocol BGP (MP-iBGP) is used.
To advertise CE routes to the MPLS network we will use
exterior BGP (eBGP) and to advertise the customer routes
across the MPLS domain we will use MP-iBGP.
BGP is used to advertise routes between customer
domains; however BGP is limited to advertising 32-bit
IPV4 network addresses. Since VPN customers may have
overlapping IP addresses, normal IP addressing is not a
sufficient means of discriminating between them. L3VPN
solution to this is to define a label called a Route
Distinguisher (RD). This is a 64-bit parameter generally
made up of the Autonomous System Number (ASN) as
assigned by IANA – the internet numbering authority,
along with an added number (nn) assigned by the service
provider.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
165
9 | MPLS Virtual Private Networks
L3VPN VRFs
PE: One VRF Instance (VRF Routing Table) for each
L3VPN represented
VPN A CE VPN A
Site 1 Site 2
P1
PE 2
PE 1
P2
VPN B
Site 2
VRF Routing Table – VPN A
VPN B
Site 1 VRF Routing Table – VPN B
The Virtual Routing and Forwarding (VRF) is a structure Like the RD, the RT is a 64-bit number. The RT indicates
maintained in the Provider Edge (PE) router to manage which routes should be imported into the VRF at PE2.
L3VPN information. The VRF is a combination of: Before the VPNV4 parameter is sent across the MPLS
core by MP-BGP, an RT is appended then the combined
• A VPN-specific logical routing table,
parameter is advertised by MP-BGP to PE2. The objective
• A set of interfaces to use VPN routing table, is for the network prefixed identified in VPNV4 to be
• A set of rules controlling the importing and exporting imported into PE2’s VRF. To achieve this, PE2 will remove
of routes (Route Targets, or RTs), and the RT and examine it to determine to which VRF the route
should be imported. The RD will be removed and the
• A set of routing peers. network prefix will be installed in the appropriate VPN
A Route Target (RT) is like a VPN identifier. In the practical routing table in PE2.
world there are needs for information/access to be If we could look inside the PE 1 router we could see a
shared between different VPNs. For example, VPN B site 2 separate VRF for VPN A and VPN B as well as a global
may need to have access to part of VPN A site 1. In this routing table.
case the VPN site 2 needs to know the router access
information for VPN A site 1. The Route Target (RT)
permits a route to be established from VPN B site 2 to
VPN A site 1 even though they represent different Virtual
Private Networks (VPNs).
Award Solutions' eBook is authorized for a single user only. Do not distribute.
166
9 | MPLS Virtual Private Networks
P1 7. eBGP
1. eBGP Advertise
Advertise IPV4
IPV4 route address
PE 1 PE 2
2. IPV4 P2
addresses
added to VRF
6. IPV4 address added
to VRF routing table
Award Solutions Proprietary
To support VPNs the MPLS network must be capable of advertised between the PE routers.
keeping various customer traffic streams separate in the
Standard BGP supports only the distribution of IPV4
MPLS network. This requires a procedure to make sure
routing information, so it is incapable of distributing these
that traffic entering the MPLS network from one traffic
VPNV4 addresses. Therefore, an extended version of BGP
source is identified in some manner, so that it is distinct
called Multi-Protocol BGP (MP-BGP) was created to
from other traffic sources when it is returned to the
accommodate these addresses. When MP-BGP is limited
customer at the egress PE router. There must be some
to advertisements between PE routers within the same
globally unique traffic source identifier. If all traffic
domain it is referred to as MP-iBGP. MP-iBGP has the
received by the egress PE has a public IP address, this is
ability to identify and propagate non-IPV4 routing
sufficient.
information such as the VPNV4 addresses as well as VPN
However, one of the primary purposes for VPNs is for the labels.
customer to be able to exchange private network data
In addition to the RD a Route Target (RT) is required,
(e.g., 10.x.x.x IP addresses) between remote customer
describing the rules on which VRF of the receiving side is
locations. To ensure globally unique identifiers the
allowed to “import” an advertised VPNV4 address into its
concept of a Route Distinguisher (RD) has been
VRF.
developed. The RD is a 64-bit identifier assigned by the
MPLS service provider to ensure the anonymity of the
various traffic sources.
This RD is prepended to the IP destination address to
produce a 96-bit globally unique VPN identifier called the
VPN-IPV4 address (or more compactly the VPNV4
address). It is this 96-bit VPNV4 address that must be
Award Solutions' eBook is authorized for a single user only. Do not distribute.
167
9 | MPLS Virtual Private Networks
P1 7. eBGP
1. eBGP Advertise
Advertise IPV4
IPV4 route address
PE 1 PE 2
2. IPV4 P2
addresses
added to VRF
6. IPV4 address added
to VRF routing table
Award Solutions Proprietary
Our example steps through the entire process of route 6. The IPV4 route is added to the VRF, subject to the RT
advertisement from CE router to CE router. rules.
1. The ingress CE router used external BGP (eBGP) to 7. eBGP is used to advertise the IPV4 address to the
advertise its network to the MPLS PE router. egress CE router.
2. The ingress PE router must log in the advertised
address before advertising it its peer PE router. It first
inserts the IPV4 address into its VRF table identifying
the customer associated with this network.
3. Before advertising the network the ingress PE router
must add a Routing Distinguisher (RD) to the IPV4
address, creating a 96-bit VPNV4 route. The Routing
Target (RT) is added to the peer PE router, describing
what rules it should use in importing the VPNV4
route.
4. MP-iBGP advertises the VPNV4 route with MPLS label
and RTs to its peer PE routers.
5. The PE peers receive the advertisement and use the
RT to determine the rules for importing the VPNV4s
into the VRFs. The RD is removed, leaving the IPV4
address.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
168
9 | MPLS Virtual Private Networks
Customer 1 CE CE
10.10
Customer 1
10.20
P1
IPV4 Packet
VRF VRF IPV4 Packet
PE 1 PE 2
VPN
Tunnel VPN P2 Label
IPV4 Packet
Label Label
IPV4 Packet
Award Solutions' eBook is authorized for a single user only. Do not distribute.
169
9 | MPLS Virtual Private Networks
Summary
• MPLS supports L2 and L3 VPNs.
• MPLS pseudowires may be used to tunnel
T1/E1, Frame Relay, Ethernet, IP and other
L1/L2/L3 protocols.
• In L2 VPNs, there is no IP routing relationship
between customer and provider.
• In L3 VPNs, customer and service provider
routers have a routing relationship.
• Label stacking is used to realize VPN services.
Award Solutions' eBook is authorized for a single user only. Do not distribute.
170
9 | MPLS Virtual Private Networks
Review Questions
1. What protocol is used to distribute labels between PEs for
L2VPNs?
2. What is another name for a point-to-point L2VPN?
3. How many labels are required when using an L2VPN?
4. What is the role of the “control word?”
5. Which routing protocols are used to establish a L3VPN?
6. Describe which labels are required for a L3VPN.
7. What is a VRF used for?
8. What is advertised by MP-BGP?
Award Solutions' eBook is authorized for a single user only. Do not distribute.
171
Award Solutions' eBook is authorized for a single user only. Do not distribute.
172
Acronyms
Award Solutions' eBook is authorized for a single user only. Do not distribute.
173
Acronyms
Award Solutions' eBook is authorized for a single user only. Do not distribute.
174
Acronyms
Award Solutions' eBook is authorized for a single user only. Do not distribute.
175
Award Solutions' eBook is authorized for a single user only. Do not distribute.
176
References
MPLS RFCs
1. RFC 2547, BGP/MPLS VPNs
2. RFC 2702, Requirements for Traffic Engineering Over MPLS
3. RFC 2858, Multiprotocol Extensions for BGP-4
4. RFC 3031, Multiprotocol Label Switching Architecture
5. RFC 3032, MPLS Label Stack Encoding
6. RFC 3063, MPLS Loop Prevention Mechanism
7. RFC 3140, Per Hop Behavior Identification Codes
8. RFC 3270, Multi-Protocol Label Switching (MPLS) Support of Differentiated Services (E-LSPs only)
9. RFC 3443, Time To Live (TTL) Processing in Multi-Protocol Label Switching (MPLS) Networks
10. RFC 3469, Framework for Multi-Protocol Label Switching (MPLS)-based Recovery
11. RFC 3564, Requirements for Support of Differentiated Services-aware MPLS Traffic Engineering
12. RFC 4124, Protocol Extensions for Support of Diffserv-aware MPLS Traffic Engineering
13. RFC 4125, Maximum Allocation Bandwidth Constraints Model for Diffserv-aware MPLS Traffic Engineering
14. RFC 4127, Russian Dolls Bandwidth Constraints Model for Diffserv-aware MPLS Traffic Engineering
15. RFC 4379, Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures.
16. RFC 3815, Definitions of Managed Objects for the Multiprotocol Label Switching (MPLS), Label Distribution
Protocol (LDP)
17. RFC 4448, Encapsulation Methods for Transport of Ethernet over MPLS Networks
Award Solutions' eBook is authorized for a single user only. Do not distribute.
177
References
18. RFC 5462, Multiprotocol Label Switching (MPLS) Label Stack Entry: "EXP" Field Renamed to "Traffic Class" Field.
Books
1. Black, Uyless. IP Routing Protocols, Prentice Hall, 2000.
2. Black, Uyless. MPLS and Label Switching Networks, Prentice Hall, 2001.
3. Cicso IOS 12.0 Quality of Service, Cisco Press, 1999.
4. Cisco Advanced MPLS Design and Implementation, Cisco Press, Sept. 2001.
5. Davie, Bruce S. MPLS : technology and applications/ Bruce Davie, Yakov Rekhter, Morgan Kaufmann Publishers,
2000.
Web Sites
1. The MPL Resource Center - http://www.mplsrc.com
2. MPLS World News - http://www.mplsworld.com
Award Solutions' eBook is authorized for a single user only. Do not distribute.
178