UNIVERSITY OF NAIROBI
FACULTY OF ENGINEERING
DEPARTMENT OF ELECTRICAL AND INFORMATION
ENGINEERING
TRAFFIC ENGINEERING WITH MULTI-PROTOCOL LABEL SWITCHING
TECHNOLOGY
PROJECT INDEX: PRJ 073
BY
WANJALA ELVIS
F17/1778/2006
SUPERVISORS: DR.CYRUS WEKESA
EXAMINER: DR MANG’OLI
PROJECT REPORT SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENT
FOR THE AWARD OF THE DEGREE
OF
BACHELOR OF SCIENCE IN ELECTRICAL AND ELECTRONIC ENGINEERING OF THE
UNIVERSITY OF NAIROBI 2011
Submitted on: 18th May, 2011
ii
DEDICATION
To my family for the support and love they have given me. Also, I’ll not forget my close friends.
Thank you.
iii
ACKNOWLEDGEMENTS
I would like to thank my supervisors DR WEKESA and Engineer DAVID ADHIAMBO for their
technical support during the project implementation, my classmate Clive, and finally proof
reader Collins.
iv
DECLARATION AND CERTIFICATION ND CERTI
This BSc. work is my original work and has not been presented for a degree award in this or any
other university.
………………………………………..
WANJALA ELVIS
F17/1778/2006
This report has been submitted to the Department of Electrical and Information Engineering,
University of Nairobi with my approval as supervisor:
………………………………
Dr. Cyrus Wekesa
Date: 18th
May 2011
v
TABLE OF CONTENTS
DEDICATION .............................................................................................................................. ii
ACKNOWLEDGEMENTS ........................................................................................................ iii
DECLARATION AND CERTIFICATION .............................................................................. iv
TABLE OF CONTENTS ............................................................................................................. v
LIST OF FIGURES .................................................................................................................... vii
LIST OF ABBREVIATIONS ................................................................................................... viii
ABSTRACT .................................................................................................................................. ix
CHAPTER 1: INTRODUCTION ................................................................................................ 1
1.1 Background ........................................................................................................................ 1
1.2 Problem Statement............................................................................................................. 2
1.3 Objectives of Project .......................................................................................................... 2
CHAPTER 2: NETWORKING PROTOCOLS – OSI MODEL.............................................. 3
2.1 Introduction ............................................................................................................................. 3
2.2 The OSI Model ........................................................................................................................ 3
2.2.1 Physical Layer ................................................................................................................ 4
2.2.2 Data Link Layer .............................................................................................................. 4
2.2.3 Network Layer ................................................................................................................ 4
2.2.4 Transport Layer .............................................................................................................. 5
2.2.5 Session Layer .................................................................................................................. 5
2.2.6 Presentation Layer .......................................................................................................... 5
2.2.7 Application Layer ........................................................................................................... 5
CHAPTER 3 .................................................................................................................................. 6
UNDERLYING LAYER 1 ........................................................................................................... 6
AND LAYER 2 TECHNOLOGIES ............................................................................................ 6
3.1 Introduction ........................................................................................................................ 6
3.2 Ethernet ................................................................................................................................... 6
3.3 Frame Relay ............................................................................................................................ 9
3.4 Asynchronous Transfer Mode (ATM) ................................................................................ 10
CHAPTER 4: INTERNET PROTOCOL (IP) ......................................................................... 11
4.1 Introduction ........................................................................................................................... 11
4.2 IP Version 4 ........................................................................................................................... 11
4.3 IP Version 6 for Next Generation ........................................................................................ 12
CHAPTER 5: MULTIPROTOCOL LABEL SWITCHING (MPLS) ................................... 14
5.1 Introduction ........................................................................................................................... 14
5.2 MPLS ..................................................................................................................................... 14
5.3 MPLS Creates a Unified All- protocol Infrastructure ...................................................... 15
5.4 MPLS Creates a Better IP/ATM Integration ..................................................................... 16
vi
5.5 Optimum Traffic Flow ......................................................................................................... 16
5.6 Traffic Engineering ............................................................................................................... 16
5.7 MPLS Terminologies ............................................................................................................ 17
5.8 Label Distribution ................................................................................................................. 24
5.9 Label Distribution Protocol (LDP) ...................................................................................... 24
5.10 Label Distribution Approaches ......................................................................................... 25
5.11 The MPLS Fundamentals of Forwarding......................................................................... 27
CHAPTER 6: TRAFFIC ENGINEERING WITH MPLS (MPLS TE) ................................ 28
6.1 Introduction ........................................................................................................................... 28
6.2 Traffic Engineering with MPLS (MPLS TE) ..................................................................... 28
6.3 Traffic Engineering Mechanisms of Operation ................................................................. 31
6.3.1 Path Calculation (PCALC) ........................................................................................... 32
6.3.2 RSVP with TE Extensions (RSVP-TE) Signalling Process ......................................... 33
6.4 Traffic Engineering Information Distribution ................................................................... 36
6.4.1 OSPF Extensions for TE ......................................................................................... 36
6.5 TE Attributes of the Link ..................................................................................................... 37
6.6 Attributes of the MPLS TE Tunnels ................................................................................... 38
6.7 Calculation of the TE Tunnel Path...................................................................................... 38
6.7.1 Path Set up Option ........................................................................................................ 39
6.7.2 Setup and Holding Priority ........................................................................................... 39
6.7.3 Re-optimization ............................................................................................................ 39
6.8.................................................................................................................................................. 40
Forwarding Traffic onto MPLS TE Tunnels ........................................................................... 40
CHAPTER 7: CONCLUSIONS AND RECOMMENDATION ............................................. 41
7.1 Conclusions ............................................................................................................................ 41
7.2 Recommendations ................................................................................................................. 41
REFERENCES ............................................................................................................................ 43
vii
LIST OF FIGURES
FIGURE 2-1 : ISO OSI MODEL ......................................................................................................... 4
FIGURE 3-1: ETHERNET LAYERS ...................................................................................................... 6
FIGURE 3-2: THE ETHERNET FRAME ................................................................................................ 7
FIGURE 3-3: THE ATM CELL ......................................................................................................... 10
FIGURE 4-1: IP DATAGRAM ........................................................................................................... 11
FIGURE 4-2: IP VERSION 4 CLASSES ............................................................................................... 12
FIGURE 5-1: OSI/MPLS LAYER COMPARISON ............................................................................... 15
FIGURE 5-2: THE MPLS HEADER .................................................................................................. 18
FIGURE 5-3: MPLS LABEL STACK ................................................................................................. 19
FIGURE 5-4: LSRS AND LSPS IN A TYPICAL MPLS NETWORK [5] ................................................. 20
FIGURE 5-5: MPLS BASIC OPERATION [5] ..................................................................................... 22
FIGURE 5-6: LABEL IMPOSITION, SWAPPING, AND DEPOSITION ..................................................... 23
FIGURE 5-7: LABEL DISTRIBUTION IN AN MPLS NETWORK [5] ..................................................... 26
FIGURE 6-1: TRAFFIC ENGINEERING IN A SAMPLE NETWORK ........................................................ 29
FIGURE 6-2: TRAFFIC ENGINEERING USING LAYER 2 (L2) ON LAYER 3 (L3) ................................. 29
FIGURE 6-3: TRAFFIC ENGINEERING WITH ATM SWITCHING......................................................... 30
FIGURE 6-4: TRAFFIC ENGINEERING WITH IP ................................................................................. 31
FIGURE 6-5: RSVP TE OPERATION [5] .......................................................................................... 35
viii
LIST OF ABBREVIATIONS
ATM Asynchronous Transfer Mode
BGP Border Gateway Protocol
CoS Class of Service
CSMA/CD Carrier Sense Multiple Access with Carrier Detection
FEC Forwarding Equivalence Class
IETF Internet Engineering Task Force
IGP Interior Gateway Protocol
IP Internet Protocol
IS-IS Intermediate System to Intermediate System
LAN Local Area Network
LDP Label Distribution Protocol
LSP Label Switching Path
LSR Label Switching Router
MAC Media Access Control
MPLS Multiprotocol Label Switching
MPLS DiffServ TE Differential Services aware MPLS TE
MPLS_TE Traffic Engineering with Multiprotocol Label Switching
OSI Open System Interconnection
OSPF Open Shortest Path First
PVC Permanent Virtual Circuit
QoS Quality of Service
RFC Requests for Comments
RSVP Resource Reservation Protocol
SONET Synchronous Optical Network
SPF Shortest Path First
TE Traffic Engineering
WAN Wide Area Network
ix
ABSTRACT
Traffic Engineering is a wide field in the networking world. This report presents some of the
methodologies used to achieve traffic engineering. They include layer 2 technologies like ATM
and frame relay and layer 3 IP based on the OSI reference model.
The advantages and limitations of ATM, Frame Relay and IP are separately looked at with
respect to their traffic engineering capabilities. The MPLS technology is introduced at its
fundamental level and later developed in details to MPLS TE. Various protocols together with
their extensions are analysed into details. These extensions are used to achieve traffic
engineering. They include RSVP TE extensions, IS-IS extensions, and OSPF extensions.
Several data carriers in Kenya deploy MPLS TE on their networks, such as Safaricom and Kenya
Data Networks (KDN). This is because MPLS offers quality services at a cheaper cost.
Therefore, MPLS TE is a technology that keeps at par with the set standards in the Internet
world.
1
CHAPTER 1: INTRODUCTION
1.1 Background
Due to increasing demand for an improved access to information, people, irrespective of their
social status are compelled to be relevant with the trends. However, what motivate them is not
technology at its simplicity but its benefits and how it can improve their standards of living.
Internet is becoming a household commodity in our society. Cell phones are being improved to
make internet more accessible. In addition, cell phones are being converted to automated teller
machines as a value add.
Service convergence as a technology leap driven by consumer demand has also put pressure on
the existing service providers’ in-terms of how best to deliver the services. IP TVs, online
gaming, real time applications and voice (through the quad play or triple play) demand a high
bandwidth but a cheaper price.
With such an increase in broadband connectivity, reducing the cost of transporting bits while
guaranteeing better quality of service is the biggest challenge to service providers. This is due to
bandwidth competition which often leads to congestion and thus lowering the QoS offered to the
network customers.
Once completed, the project will:
Show the benefits of using MPLS _TE for efficient resource utilization
Provide knowledge for those who want to further in traffic engineering
Advise on the advantages of MPLS TE in the industry over the pure native IP with regards to
efficient resource utilization
The main challenge to the project is due to differences in configuration between the vendors
narrowing the universality of the findings and conclusions. Simulation using a general software
thus became a challenge too. Due to time and scope, MPLS TE coverage has only been limited
to application towards bandwidth utilization as opposed to protection, load balancing, rerouting
etc.
2
1.2 Problem Statement
The need for maintaining quality of service with the increasing network users has been a
challenge to network engineers and designers. Congestion due to overflow of traffic and due to
link and node failures presents a case for traffic engineering. Management of network resources
is also of great need. This ensures that the service providers incur less cost to provide required
services to their consumers.
ATM, Frame Relay and IP are overwhelmed by congestion especially for large networks and this
has led to lots of packet drops. MPLS TE has emerged to be a powerful tool to achieve traffic
engineering objectives. This project seeks to validate the application of MPLS _TE with regards
to efficient resource utilization in a network.
1.3 Objectives of Project
It’s therefore important to make sure customers that are guaranteed reliable, efficient services.
Traffic Engineering is one of the methods that ensure efficient allocation of resources. Priority is
given to very important traffic such as voice and video.
This project therefore seeks to:
Study and understand MPLS technology
Study and understand the deployment of MPLS for Traffic Engineering in relations to
resource utilization
Demonstrate, using simulation or otherwise, the operation of MPLS TE using a case study.
3
CHAPTER 2: NETWORKING PROTOCOLS – OSI MODEL
2.1 Introduction
Traffic Engineering with Multiprotocol Label Switching (MPLS TE) is an upcoming technology
that is finding its way in the networking world. Before MPLS TE is looked at in details, Traffic
Engineering should be defined. Traffic Engineering is defined precisely as manipulating a
network to keep at par with the traffic. Thus Traffic Engineering involves the following:
The ability to control the flow of traffic in a given network
Optimization of the available resources in a network
Movement of traffic from a more congested path to a less congested path
Ensuring efficient use of the available resources.
From the given definition of Traffic Engineering, traffic engineering ensures reliability,
efficiency, quality of service, which are the ideals required for the satisfaction of users of a given
network [1]. Before dealing with MPLS, the International Standards of Organization (ISO)
Open Systems Interconnection (OSI) model should be looked at first.
2.2 The OSI Model
An open system is a set of agreed upon rules called protocols that enables two systems that are
different to communicate irrespective of their underlying architecture. Thus OSI model shows
how to facilitate communication between varied systems without having to change the
underlying hardware and software of those systems.
The OSI model consists of seven layers that are separated but related .This layered framework is
used for the design of network systems and allows communication between all types of computer
systems. Each of the seven layers defines a portion of the process of transferring information
across a given network. The OSI model is shown in figure 2.1.
4
The seven OSI layers have the following functions:
2.2.1 Physical Layer
Carries out the transmission of bits,1’s and 0’s, over a transmission medium
Provides mechanical and electrical specifications
2.2.2 Data Link Layer
Organizes bits into frames
Provides hop to hop delivery
2.2.3 Network Layer
Moves packets from source to destination
Provides internet
7 Application
6 Presentation
4 Transport
3 Network
5 Session
1 Physical
2 Data Link
Figure 2-1 : ISO OSI Model
5
2.2.4 Transport Layer
Provide process to process message delivery with reliability
Does error recovery
2.2.5 Session Layer
Establishes, manages, and terminates sessions
2.2.6 Presentation Layer
Deals with translation, encryption, and compression of data
2.2.7 Application Layer
Allows access to network resources
6
CHAPTER 3
UNDERLYING LAYER 1
AND LAYER 2 TECHNOLOGIES
3.1 Introduction
Taking a look at some of the protocols applied at the Physical Layer and Data Link Layer, the
following are considered:
Ethernet
Frame Relay
Asynchronous Transfer Mode (ATM)
3.2 Ethernet
Ethernet is one of the frame based underlying computer networking technologies widely used for
local area networks. Ethernet gives some wiring and signalling standards for layer 1 of the OSI
model. The data link layer it consists of Media Access Control (MAC) responsible for the
operation of the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) and the
logical link control (LLC) as shown in figure 3.1
Data Link Layer
Logical Link Control
(LLC)
Media Access Control
(MAC)
Physical
Layer
Figure 3-1: Ethernet Layers
7
Ethernet has been evolving since its inception. There is:
Traditional Ethernet
Fast Ethernet
Gigabit Ethernet
3.2.1 Traditional Ethernet
This protocol was designed in 1973 by Xerox with a data rate of 10Mbps together with a bus
topology. The access method for traditional Ethernet is CSMA/CD. In bus topology used, the
channel is shared between stations and only a single station a time can use the channel. It also
means that all stations receive a frame sent by a station.
To make sure that two stations are not using the same station at a time CSMA/CD is used and
has the following principles:
Multiple access to the medium without preference to any station
Every station ready to send a frame must listen first if there’s any data in the medium
before it sends the frame.
If the medium is found idle by two stations, then both start sending, a collision occurs.
All stations sense a collision. Thus each of them sends a jam signal to destroy the data on
the line. After each station waits for a different random amount of time it tries sending
again.
CSMA/CD is carried out in MAC sub layer of the data link as shown in figure 3.1.
Ethernet frame is as shown in figure 3.2.
Figure 3-2: The Ethernet Frame
Pre-ample SFD Destination Source Length Data and Cyclic
Address Address PDU Padding Redundancy
Check
8
3.2.1.1 Pre-ample
It is used to synchronize the input timing of the receiving system.
3.2.1.2 Start Frame Delimiter (SFD)
It signals the beginning of the frame.
3.2.1.3 Destination Address
This address contains the physical address of the next station.
3.2.1.4 Source Address
This address contains the physical address of the previous station.
3.2.1.5 Length
This defines the length of the data field that follows or the upper layer protocol that uses the
Internet services.
3.2.1.6 Data
Carries data that is encapsulated from the upper layer protocols
3.2.1.7 Cyclic Redundancy Check (CRC)
Contains the error detection information
3.2.2 Fast Ethernet
This has a data rate of 100Mbps.it has the same principles as traditional Ethernet in the MAC
sub-layer of CSMA/CD.
3.2.3 Gigabit Ethernet
It has a data rate of 1Gbps.To achieve the given data rate, CSMA/CD is either dropped or kept.
When CSMA/CD is left the minimum length of the field is increased to achieve 1Gbps data rate.
Otherwise, the station is connected by two separate hubs to the central hub thus accomplishing
full-duplex Ethernet with no collision and no CSMA/CD.
Capabilities of Ethernet are as follows:
9
Gigabit Ethernet achieves full duplex Ethernet without collision
It is simple since it consists of a Coax cable and adapters.
Relatively cheap to implement
The coaxial used is immune to external noise since it is shielded
Limitations:
Ethernet is unreliable since there is no acknowledgement of receipt of frames.
Difficult to troubleshoot
In case of a fault the whole network fails
In relation to traffic engineering more traffic in the network leads to delay[2]
Security not guaranteed
3.3 Frame Relay
Frame relay is a switched Wide Area Network that interconnects Local Area Networks
(LANs) or mainframe computers. It is a connection oriented network with no error control
and no flow control thus it ensures delivery of packets in order, that is, in case all are
delivered. Frame relay uses a virtual circuit and virtual circuit identifiers. Frame relay only
has physical layer and data link layer. The frames in frame relay are of variable length
Advantage
Reliable since it is connection oriented.
Disadvantages
Creation of virtual circuits is tedious for a large network since each router sends
traffic directly to another router at the edge through the formed virtual circuit
For any to any connection between sites full mesh is required and this is cumbersome
and also expensive.
Security is not guaranteed.
10
3.4 Asynchronous Transfer Mode (ATM)
This is a cell relay protocol that is connection oriented since it forms virtual circuits to carry
ATM traffic across the network. ATM consists of fixed size cells of 53 bytes in length. See
figure 3.3.
ATM is used extensively in Wide Area Networks.
Advantages
Due to fixed cell size, it results in transmission with no jitter.
It has guaranteed quality of service
It is greatly flexible
Traffic Engineering
Limitations
It is only limited to its use in wide area networks
It has poor scaling in large full meshed networks in case of a failure. Failure of a router
leads to O(N3) flooding while failure of a link leads to O(N
2),where N is the number of
links.[3]
Security is not guaranteed
Ethernet, Frame Relay and ATM are mainly data link layer technologies. In the network
layer, the main focus here is on Internetworking Protocol (IP).
Header Payload (Data)
5 bytes 48bytes
Figure 3-3: The ATM Cell
11
CHAPTER 4: INTERNET PROTOCOL (IP)
4.1 Introduction
IP is a technology that does packet delivery from host to host. IP is a connectionless thus
unreliable datagram protocol. It is known as a best- effort data transfer service because IP
does not provide for error checks. IP does not guarantee transmission of the datagram to the
destination.
The data units in the IP layer are called datagrams. The datagrams constitute a header and a
data segment of variable length. The maximum length of a datagram is 65,535 of which the
header has a maximum of 60 bytes. See figure 4.1. [2]
4.2 IP Version 4
Currently, most networks are using version 4. The Internet address in version 4 is 32 bits in
length. The address space is divided into different classes. There are 5 classes:
Class A
Class B
Class C
Class D
Class E
The address space is 232
.
These classes are illustrated in figure 4.2.
Header Data
Figure 4-1: IP Datagram
12
8 bits 8 bits 8 bits 8 bits
Class A
Class B
Class C
Class D
Class E
Figure 4-2: IP version 4 Classes
The network address is used identify the organization to the rest of the internet while the host
address identifies the individual host.
The classful addressing has many challenges. There is wastage of resources in class A and B.
Limited resources in class C. This led to the development of classless addressing.
4.3 IP Version 6 for Next Generation
In view of the growing and evolving data communication and fast growing internet, IP version 4
has been found to have some deficiencies that include:
Address depletion which may not be permanently solved by subnetting, classless
addressing, or network address translation.
For real-time audio and video transmission, IP version 4 does not provide the required
minimum delay strategies and resource reservation.
IP version 4 does not provide encryption and authentication of data for given
applications.
Thus IP version 6 will eventually replace IP version 4. IP version 6 uses 128 bits as opposed to
the 32 bits of IP version 4. Thus gives guarantee that there cannot be depletion of addresses for
internet users.
Network ID Host ID
Network ID Host ID
Network ID Host ID
Multicast Address
Reserved
13
IP version 5 was not implemented due to extensive changes in the OSI layers and also the
expense that was to be incurred [4].
Generally, IP has the following advantage and limitation:
Advantage
Many technologies can be transported over it.
Disadvantages
It is unreliable since it does not guarantee packet delivery.
Traffic sent over IP follows the primary link which may lead to congestion.
Thus there is an inefficient use resource.
The limitations in IP, ATM, Frame Relay and Ethernet led to the invention of Multi-protocol
Label Switching (MPLS) that aims at reducing limitations of layer 2 and 3 technologies and to
reinforce their capabilities but not to wipe them away. [1]
14
CHAPTER 5: MULTIPROTOCOL LABEL SWITCHING (MPLS)
5.1 Introduction
MPLS is a networking technology that attaches labels to frames and/or packets to forward them
through the network. It is called multiprotocol because it is applied not on one protocol only but
more various protocols. Examples are IPv4,IPv6,IPX,AppleTalk,Any Transport over MPLS
which encompasses any layer 2 protocol such as ATM, Frame Relay, Point-to-point
Protocol(PPP), Fibre Distributed Data Interface (FDDI) .
5.2 MPLS
MPLS is sometimes called layer 2.5 technology as shown in figure 5.1 [1]. MPLS uses label to
label mapping between routers. In layer 3 the labels are attached to IP packets thus the routers
are enabled to forward traffic while looking at the label as opposed to IP forwarding which at
each hop has to look at the destination IP address. Consequently, MPLS utilizes label switching
as opposed to IP routing.
This label switching technique was at first used in Frame Relay that uses frames and ATM that
uses frames called cells to traverse a network. The ATM cell and Frame relay header refer to the
virtual circuit that the given cell or frame, respectively, lies on. In both ATM and Frame Relay
the label value in their header is changed at each hop in the network. This is opposed to IP which
does not change the destination address of datagram. The label switching technique has enabled
MPLS to be one of the most preferred technologies in the networking world.
MPLS has the following capabilities:
It combines the traffic engineering capabilities of ATM with the flexibility of class of
service (CoS) differentiation of IP. Thus a better IP over ATM integration
Ensures that the traffic flow is optimum
Traffic Engineering
MPLS is a standards based technology
MPLS keeps up with growth in the technological world
Increases scalability
15
IP Layer 3 Layer 3
MPLS Layer 2.5
Ethernet, Frame Relay,
Layer 2
ATM, PPP, etc
Physical Layer
From figure 5.1 it is seen that MPLS provides a very useful link between the connection-oriented
switching in layer 2 and totally connectionless routing in layer 3.A more striking example is
ATM and IP.
On that note, the essence of MPLS technology with reference to its benefits is looked at. The
main reason why MPLS was invented was not to increase packet transfer across the network.
5.3 MPLS Creates a Unified All- protocol Infrastructure
After MPLS has labelled an incoming packet as per its destination address, it switches the traffic
over a common infrastructure. IP is known as an all technology network in that apart from
forwarding data it also transports voice and video. That is why IP has gained prominence in the
networking world. The same is to MPLS that gave it the name “Multi-Protocol” meaning it can
transport a labelled packet on any protocol both in layer 2 and layer 3.
Figure 5-1: OSI/MPLS Layer Comparison
16
5.4 MPLS Creates a Better IP/ATM Integration
Due to the outstanding prominence of IP over other layer 3 technologies like IPX, AppleTalk,
DECnet it became a preferred technology in internetworking. This is because of, as stated earlier,
its simplicity and flexibility.
ATM, on the other side, is a well known connection-oriented technology but limited to its being
used as a WAN protocol in layer 2 .Thus arose the need for IP over ATM. Many solutions were
put in place to achieve this. These include:
Multiprotocol Encapsulation over ATM adaptation layer 5 in which ATM circuits are
manually set up and all mappings between IP next hops and ATM endpoints are manually
configured on every ATM-attached router in the network.
LAN Emulation (LANE) –Due to failure of Ethernet to achieve scalability and reliability
as expected LANE was invented as an emulator of an Ethernet network such that various
Ethernet segments were bridged together as if the ATM wide area network in the middle
were an Ethernet switch.
Multiprotocol over ATM (MPOA) which is a complex way of integrating IP over ATM
The three given methods became tedious in implementation and also during troubleshooting.
This led to the invention of MPLS which enables the ATM switches to intelligently run an IP
protocol and implement a label distribution protocol.
5.5 Optimum Traffic Flow
As stated earlier, in ATM and Frame Relay switching there has to be a direct connection through
a virtual circuit between two routers for traffic to be sent across that network. Thus in case of any
to any connection it is tedious to achieve optimum traffic flow due to the full complex mesh of
manually created virtual circuits between two connected sites. Using MPLS VPN, the traffic
flows optimally without full mesh interconnection of virtual circuits.
5.6 Traffic Engineering
Traffic engineering is generally trying to identify the resources available in a given network and
then utilizing them to a maximum in adherence to set standards. In IP routing, the Interior
17
Gateway Protocol (IGP) seeks for a shorter and cheaper route leaving the other routes unused
hence underutilization of resources. Thus traffic engineering is not fully achieved.
A MPLS implemented network, the traffic flow does not necessarily follow the least cost link but
ensures uniform and optimal utilization of resources in a network. This will be discussed in detail
in the following chapters.
5.7 MPLS Terminologies
Multiprotocol Label Switching term can be divided into two parts:
Multiprotocol meaning MPLS works on various protocols as mentioned before.
Label Switching that involves putting labels on information units, packets, whereby these
labelled packets are switched across the network.[3]
5.6.1 MPLS Header
An MPLS header is very important in MPLS implementation. Figure 5.2 shows the constitution
of an MPLS header.
18
5.7.1.1 Label
This constitutes the value of the MPLS label which ranges from 0-1,048,575 with the first 16
values reserved for special purpose.
5.7.1.2 Experimental bits
Used for quality of service thus it affects queuing of packets and discard of algorithms applied
to the packets as they traverse the network.
5.7.1.3 Bottom of Stack
A stack is a collection of labels located on a packet. The bottom of the stack reads 1 if the label is
the bottom one as shown in figure 4.3.This enables it to support hierarchical label stacking.
In MPLS based services, the stacks are given various names depending on where they are
applied. In MPLS VPN label stack, the second label identifies the VPN. In MPLS TE, the top
label shows the ending point of the traffic engineering tunnel while the second label shows the
destination. In Any Transport over MPLS (AToM) and Virtual Private LAN Service (VPLS), the
top label shows the endpoint or tunnel header and the second label shows the Virtual circuit
(VC).
5.7.1.4 Time to Live (TTL)
This is used to prevent a packet from getting stuck in a routing loop. TTL value is decreased by
one as the packet moves from hop to hop. It is also used for path tracing.
Label (20 bits) EXP (3 bits) Stack (1 bit) TTL (8bits)
Figure 5-2: The MPLS Header
19
5.7.2 Label Binding
This is an association of an FEC prefix to a given label so that the receiver knows which label
goes to which packet.
5.7.3 Labelled Packet
This is a packet encoded with a label. A packet with more than one label is called a label stack.
The individual labels on the stack are implemented using Last in-First out (LIFO).
Label Exp. 0 TTL
Label Exp. 0 TTL
Label Exp. 0 TTL
...................................... ............... ................ ..................
………………………... ………… ………..... …………...
…………..................... ………… ………….. ..................
Label Exp. 1 TTL
5.7.4 Label Switch Router (LSR)
This is an MPLS node that receives and transmits labelled packets. It has the capability of
understanding the information on the MPLS label. There are three categories of label switch
routers:
Figure 5-3: MPLS Label Stack
20
Ingress LSR
This type of node receives non-MPLS labelled packets and labels them as they enter the
MPLS network.
Intermediate LSR
This node receives MPLS-labelled packets and switches them within the MPLS network.
Egress LSR
This node receives the MPLS labelled packets, removes the labels then forwards them to
the data link.
The egress LSR and the ingress LSR are referred to as Label Edge Routers (LERs) as shown in
figure 5.4.
Figure 5-4: LSRs and LSPs in a Typical MPLS Network [5]
LSR Operation
An LSR performs three main processes:
Push
21
This is the process of adding labels onto an already created label stack. This type of
router is called an imposing router
Swap
This is the process by which the top label of a received labelled packet is swapped with a
new label then switched to the next LSR.
Pop
This is where one or more labels are removed from the top of the label stack. This type of
router is called a disposing router.
This process is demonstrated in figures 5.5 and 5.6.
5.7.5 Next Hop Label Forwarding Entry (NHLFE)
NHLFE is used by the LSR to forward packets. NHLFE information base at every LSR may
contain all or some of the following:
The address of the next hop
Push, swap and pop operations
The label stack used to switch the data
The data link encapsulation used in packet transfer
Other information required for packet processing
5.7.6 Label Switched Path (LSP)
A series of label switch routers for packet switching in an MPLS network forms a label switched
path. The LSP begins at the ingress LSR through the intermediate LSRs if any then finally to
Egress router as shown in figure 5.4. This is the path which the packets belonging to a given
forward equivalence class follow. An LSP is ordered and unidirectional. [4]
22
5.7.7 Forwarding Equivalence Class (FEC)
An FEC is a group of network layer packets that are forwarded in a similar way. All packets in
this FEC group follow the same path in the network and have equal priority. Some of the criteria
used in classifying FEC classes by the ingress router are as follows:
Packets with the same particular route in the IP routing table
Packets that belong to the same group are multicast
Packets forwarded the same way according to IP differential service code or precedence
Data Link frames in an MPLS network entering the ingress label switch router on one
virtual circuit and on the egress label switch router on one virtual circuit.
Packets with same border gateway protocol prefix and same destination in their IP
addresses.[3]
Figure 5-5: MPLS Basic Operation [5]
23
Figure 5-6: Label Imposition, Swapping, and Deposition
5.7.8 Incoming Label Map (ILM)
ILM information enables a given LSR to choose a set of NHLFEs containing the information for
switching packets. [4]
5.7.9 FEC to NHLFE Map (FTN)
FTN allows LSR to process an incoming unlabeled packet before it is forwarded. FTN also maps
a label to a set of NHLFEs in order to balance the load of packets over multiple paths with equal
costs. [4]
Figures 5.5 and 5.6 show a simple summary of MPLS operation in an IP network with some
terminologies used.
5.7.10 Control Plane
This where routing information and label information are exchanged.
24
5.7.11 Data Plane
This is also called the forwarding plane. After the establishment of the control plane, the data
plane is used to perform the actual forwarding of packets [1].
5.8 Label Distribution
Label Distribution is the process of LSP set up. It involves the insertion of mappings in the
forwarding tables at each LSR. The mapping is from {Incoming interface, Label Value} to
{Outgoing Interface, Label Value}. The first label of a given LSP is imposed on the ingress LSR.
One or more labels can be imposed on the incoming packet. As the packet traverses the MPLS
network the intermediate LSRs only swap the top label, that is, the incoming label on a labelled
packet with another label, the outgoing label. Then the packet is moved to the outgoing link.
Finally, the egress LSR disposes the labels as the packet exits the MPLS network.
5.9 Label Distribution Protocol (LDP)
For label distribution to occur effectively there needs to be coordination between adjacent LSRs.
Since LSRs are not globally known within a network there is need for label distribution protocol.
Label distribution protocol is a set of rules and procedures that enables one LSR to communicate
with its neighbouring peers. This specification is used by an LSR to inform next LSR of an
assigned label and its associated meaning. This exchange of information establishes a mutual
agreement between the LSR pair.
Since MPLS architecture does not have a specific required LDP to be used there are two
categories of LDPs, namely:
Extensions to existing protocols
Developing new protocols
25
5.9.1 Extensions to Existing Protocol
This involves the addition of label distribution information within the existing data flows in the
existing protocols.
Examples are:
Border Gateway Protocol (BGP) extensions: In this case Forward Class Equivalences
(FECs) are used to identify the prefixes distributed by the BGP LSR peers. The use of
same devices has the following advantages:
It eliminates the need for another protocol running on the LSR
Since BGP route reflectors are used in distribution of labels, scalability is enhanced
significantly.
The routing and label distribution are ever in synchrony because the label and the
prefix must coexist.
However, it is not easy to extend the prefixes on the routing protocol to carry the labels.
Resource Reservation Protocol (RSVP) extensions: Here, RSVP standards are enhanced
to include the support for establishing and distributing information for a given LSP. Thus
resources will be allocated along the end to end path. [4].
5.9.2 Developing New Protocols
New protocols for distributing labels are being developed. These protocols are independent of
the existing routing protocols at each hop along the label switched path. This method’s
advantage is that it allows an LSP to traverse LSRs that do not support one of the extended
routing protocols to include label distribution information. Thus the routing protocol distributes
prefixes while the new protocol distributes labels. The main disadvantage is that a new protocol
is required on the LSRs which is an extra task and cost. [4]
5.10 Label Distribution Approaches
There are two categories of the methods used to effect communication between LSRs in an
MPLS Network. These are:
Downstream on Demand
26
This is where the ingress LSR requests for a label binding for a particular FEC from the
next LSR for that given FEC.
Downstream Unsolicited
This is where the egress LSR together with intermediate LSRs distributes label bindings
to LSRs that have not requested for the information.
In both the two approaches, the labels are allocated opposite to the direction of data flow, that is,
from downstream. This is shown in figure 5.7.
Figure 5-7: Label Distribution in an MPLS Network [5]
27
5.11 The MPLS Fundamentals of Forwarding
5.11.1 Frame Mode
Frame mode is used when a packet is forwarded with a label inserted in front of a layer 3 header,
say, IP header.
5.11.2 Cell Mode
Cell mode is used in an ATM LSR network that uses MPLS to exchange Virtual Path Identifier
(VPI) or Virtual Circuit Identifier (VCI) information. For ATM, the label is said to be encoded in
a cell’s VPI/VCI fields. In the control plane the label is exchanged after which in the forwarding
plane the packet is segmented into ATM cells by the ingress Label Edge Router (LER).After this
segmentation the ingress LER forwards the cells. As opposed to the edge ATM, LSRs the
intermediate ATM LSRs act normally as ATM switches. The egress ATM LSR reconstitutes the
cells into a packet.
28
CHAPTER 6: TRAFFIC ENGINEERING WITH MPLS (MPLS TE)
6.1 Introduction
Traffic Engineering is the ability to steer traffic in a network. It is the ability to ascertain the
available resources in a network and being able to utilize them maximally. Since Traffic
Engineering involves moving traffic from end to end in a network, it was only implemented in
ATM and Frame Relay because of their circuit-oriented operation. Due to the prominence of IP’s
flexibility, Frame Relay and ATM were used to steer traffic in IP network. But due to many
networks relying on pure IP network it led to the necessity of introducing MPLS onto the IP
network. Pure IP network does not support Traffic Engineering but IP/MPLS network makes
Traffic Engineering possible due to incorporation of Traffic Engineering with MPLS (MPLS-
TE).
6.2 Traffic Engineering with MPLS (MPLS TE)
IP routing is based only on Interior Gateway Protocol (IGP) metric. This implies that IP routing
will only steer traffic in least cost path. This gives rise to congestion in some paths while others
are underutilized. The congestion leads to dropping of the excess packets due to exhaustion of
bandwidth. But this dropping of packets does not stop the IP routers from forwarding packets in
the congested link.
Due to the changing traffic patterns, addition of bandwidth does not solve the problem. At the
same time it is time consuming to add bandwidth. Thus the only available way to solve this
limitation is by use of MPLS-TE.
MPLS-TE achieves the following objectives:
To ensure efficient spread of traffic within the network thus avoiding overuse of some
links in the network at the expense of other links
To consider the available bandwidth within the network
To acknowledge link attributes such as jitter and delay.
To keep in tune with the changing bandwidth and link attributes
To use explicit routing as opposed to IP’s destination based routing.
The given objectives ensure lower overall cost of operation as well as efficient use of bandwidth
resources [3], [8].
Using a sample simple network, a traffic example can be illustrated as shown in figure 6.1.
29
Figure 6-1: Traffic Engineering in a Sample Network
With reference to figure 6.1, consider traffic engineering with layer 2 ATM or Frame Relay. This
network is also called overlay network as shown in figures 6.2 and 6.3.
Figure 6-2: Traffic Engineering Using Layer 2 (L2) on Layer 3 (L3)
30
Figure 6-3: Traffic Engineering with ATM Switching
As seen earlier, ATM and Frame Relay are used in traffic Engineering as shown in figures 6.2
and 6.3. Permanent Virtual Circuits (PVCs) are formed between switches to steer traffic as in
figure 6.3. But this has the following limitations:
It requires extra devices in the network hence more cost
It increases network complexity hence difficult to manage
For large networks, the full mesh circuits lead to scalability problems
Additional bandwidth required
Traffic engineering with layer is shown in figure 6.4. One path is overused more than the other.
As seen earlier the traffic engineering in an IP network is not fully achievable especially for large
networks and varying traffic. This is because IP uses IGP metric only. On the other hand, it does
not have explicit routing.
31
Figure 6-4: Traffic Engineering with IP
6.3 Traffic Engineering Mechanisms of Operation
The main aim of MPLS TE is to achieve explicit routing, a technique not efficiently achieved by
the most preferred flexible IP. To achieve explicit routing, the following mechanisms are taken
into consideration:
The link constraints which determine how much traffic can be steered on a link and
which traffic tunnel to be used on the link.
Traffic Engineering information distribution. This is achieved by link-state routing
protocols that are MPLS TE enabled ,that is, Open Shortest Path First (OSPF) and
Intermediate-System to Intermediate-System (IS-IS) .When one of the protocols is used
it ensures that the network topology and the available resources are known to the LSRs.
32
A path calculation algorithm used to calculate the best path to be followed from the
ingress LSR to Egress LSR.
Modified Resource Reservation Protocol (RSVP) used as a signal protocol to signal the
traffic engineering tunnel across the network thus setting up the LSPs. Constraint based
by use of Label Distribution Protocol (CR-LDP) is also used to set up the LSPs.
Traffic forwarding method onto the traffic engineering tunnel
The term traffic engineering tunnel refers to data flows between a given specific source and
destination that have attributes associated with them. These attributes include bandwidth
requirements and class of service for the data to be forwarded through the tunnel.
The following is the procedure of setting up the LSP path for MPLS TE:
1. The network operator configures an MPLS TE path on the ingress LSR.
2. The ingress router computes hop to hop route across the MPLS network. Link state
routing protocols OSPF or IS-IS with extensions for TE are used to advertise the
availability of resources on the routers in the network. This facilitates the route
computation.
3. The ingress LSR requests for establishment of LSP using either RSVP or CR-LDP as the
dedicated signalling protocol.
4. The intermediate LSRs along the MPLS TE LSP to be established may either reject or
accept the path request. On acceptance, the internal MPLS switching infrastructure is set
up.
5. The MPLS TE LSP is only operational if and only if all the intermediate LSRs along the
path accept LSP path signalling request.
6. The ingress router can now use the established LSP to handle special data in case of static
routing or seamlessly integrate this new path into the link state routing protocol.
6.3.1 Path Calculation (PCALC)
OSPF or IS-IS are extended to include the information about the link attributes that will be used
for TE. This information when sent by the link state protocol is used to build the TE database.
The MPLS database built is used by path calculation (PCALC) or constrained shortest path first
33
(CSPF) to calculate the shortest path that considers all the network constraints from the ingress
LSR to the egress LSR. The path calculation takes place on the ingress router.
6.3.2 RSVP with TE Extensions (RSVP-TE) Signalling Process
The intermediate LSRs use RSVP-TE as a signalling protocol to know to which LSP the
incoming and outgoing labels belong in a given traffic engineering (TE) tunnel. RSVP operates
in downstream on demand label advertisement mode.
RSVP-TE consists of four extensions as follows:
RSVP Path Message
This is the message sent by the ingress LSR to the egress LSR used to request a label
mapping to the LSP or the TE tunnel
RSVP Reservation Message
This is the message sent from the egress LSR used to allocate labels mapping to the LSP
or TE tunnel and is propagated upstream.
RSVP Error Message
In case the requested resources are not available, the LSR requested will respond by
generating RSVP error messages and sends them upstream to LSR which sent the
request.
RSVP Tear Messages
Two types of tear messages are created by RSVP, that is, PATH tear message and
RESERVATION tear message. The tear messages instantaneously clear the
PATH/RESERVATION states on the router. This enables the reuse of the available
resources on the router through other requests.
RSVP TE operation is shown in figure 6.5.
6.3.2.1 RSVP Objects in the Path Message
SESSION
It defines the source and the destination of the LSP tunnel and is normally identified by IP
addresses of corresponding loopback interfaces on ingress and egress routers.
34
SESSION_ATTRIBUTE
It is used to define the characteristics of the specific LSP tunnel such as the bandwidth
requirements and resources that would need to be allocated to the tunnel.
EXPLICIT_ROUTE OBJECT (ERO)
Populated by the list of next hops that are either manually specified or calculated using
constraint-based shortest path first (CSPF). The previous hop (PHOP) is set to the router's
outgoing interface address. ERO provides the specific path information for the RSVP Path
message to follow.
RECORD_ROUTE OBJECT (RRO)
This is populated with the local router's outgoing interface address in the path of the LSP tunnel.
Thus RRO records the actual route a packet traversed.
SENDER_TEMPLATE
In addition to the previously mentioned attributes, the sender template object in the path message
depicts the interface address that will be used as the LSP-ID for the tunnel. This value is defined
by the ingress router.
35
Figure 6-5: RSVP TE Operation [5]
6.3.2.2 Shared Explicit Style RSVP
This is in TE to ensure that make-before-break is issued. This means that a new TE LSP is built
before the tearing of the old LSP for a given tunnel. The traffic is then set on the new LSP thus
avoiding or reducing traffic loss.
36
6.4 Traffic Engineering Information Distribution
A link state routing protocol is of great importance when it comes to implementing MPLS TE.
The protocol is used to flood the constraints on the network links to all routers running traffic
engineering. Distance routing protocol cannot perform MPLS TE since it only forwards data to
the best route while the consideration for alternate paths is lost. Thus interior gateway protocol
(IGP) is required to be able to flood the state of all links on a router to all the other routers in a
given area so that there can be alternate paths to the destination thus achieving TE.
Apart from the head end router knowing information about all alternate possible paths to the
destination, it needs also to consider the network constraint information. Constraint information
is the collection of all information about resources on links that is necessary to achieve TE. Thus
the need of the link state routing protocol to have extensions that will carry this extra
information. The TE link resources include:
TE metric
Used to construct the TE topology distinct from the IP topology in that it is different
from OSPF cost or IS-IS metric of the link.
Maximum bandwidth
This is the total bandwidth on the link
Maximum reservable bandwidth
This is the available bandwidth that can be used for TE on the link
Unreserved bandwidth
This is the remainder of the bandwidth that is available for TE. It is the difference
between the maximum reservable bandwidth and the bandwidth in use by the TE
tunnels.
6.4.1 OSPF Extensions for TE
OSPF protocol is extended by three opaque link-state advertisements (LSAs) that are used for
addition of MPLS TE information. This enables OSPF to flood information in the whole
network. The three types of LSAs are:
Opaque LSA type 9- This floods information not beyond a local link
Opaque LSA type 10- This floods information area wide
37
Opaque LSA type 11- This floods information autonomous system (AS) wide thus
covering the OSPF domain
MPLS TE uses type 10 LSA for intra-area MPLS-TE.
6.4.2 IS-IS TE Extensions
IS-IS is extended two new type length values (TLVs) that are used to carry the MPLS TE
information.
Extended IS Reachability TLV or Type 22- This describes IS-IS neighbours, the cost to
them and other descriptions.
Extended IP reachability TLV or Type 135- It succeeded the IP reachability TLV type
128 and TLV type 130.
6.4.3 IGP Flooding
The following cases make IGP to flood TE information:
Change in link status
Change in configuration
Periodic flooding
Changes in the reserved bandwidth
In case of tunnel set up failure
6.5 TE Attributes of the Link
These are the characteristics of every MPLS TE enabled link that the ingress router uses to
determine which link a TE tunnel can follow. These include:
Maximum reservable bandwidth
This is the maximum bandwidth reservable which forms a pool that all regular TE tunnels
use.
Attribute flags
These flags show the resources of the link, the capabilities of the link or administrative
policies.
38
TE metric
This is the IGP cost of the link. During the calculation of the path in the network, a tunnel
takes into account the IGP cost of the links.
Shared risk link groups (SRLGs)
This indicates the links that share a common fibre or conduit. In case of the fibre failure,
a group of links are affected hence they share a common risk.
Maximum reservable sub-pool bandwidth
The sub-pool bandwidth is a fraction of the global-pool bandwidth that is used by
DiffServ-aware TE tunnels to obtain their bandwidth
6.6 Attributes of the MPLS TE Tunnels
Tunnel destination
This is the MPLS TE router ID of the egress router that the tunnel LSP should be routed
to.
Desired bandwidth
This is the bandwidth required by the TE tunnel.
Affinity
The affinity bits are used to control whether the tunnel is allowed to cross a certain link
with given attribute flags.
Setup and holding priorities
Re-optimization
Path options
Setup and holding priorities, re-optimization and path options are used in TE tunnel path
calculation.
6.7 Calculation of the TE Tunnel Path
The calculation of a TE tunnel path is dependent on the following factors:
Setup and holding priorities
Re-optimization
Path options
39
Affinity bits and attribute flags
6.7.1 Path Set up Option
The configuration of the path option on the ingress LSR is done in two ways:
Explicitly. This is where every router up to the egress LSR on which the tunnel is routed
is specified. The TE router ID or the link IP address of the intermediate routers is
specified.
Dynamically. This is where the ingress LSR is left to decide which best route the tunnel
should take towards the destination. Thus only the egress ID is configured on the egress
router.
6.7.2 Setup and Holding Priority
In order that more important tunnels are prioritized over the less important ones, setup and
holding priority are used. The setup priority shows how important the tunnel is to pre-empt other
tunnels. The holding priority shows how much the weight of that tunnel is to hold on to
reservations on the links. Thus in case a tunnel has a lower setup priority over a second one, it
can pre-empt that of the second one. This implies that the lower the setup priority and the lower
the holding priority the more important the tunnel.
6.7.3 Re-optimization
A tunnel can be set up on a path that is no longer its optimal path. This occurs when a previously
down link becomes available again or when a link that did not have enough unreserved
bandwidth at the time of tunnel set up but now has enough unreserved bandwidth for the TE
tunnel to be routed across that link.
Re-optimization enables a tunnel to be re-routed in the MPLS TE network onto a more optimal
path. This is accomplished in three ways:
Periodic Re-optimization which occurs at a default frequency of one hour
Event-driven Re-optimization which occurs when a link becomes operational for MPLS
TE but there is no re-optimization.
Manual Re-optimization forces re-optimization for all TE tunnels on ingress router [3].
40
6.8 Forwarding Traffic onto MPLS TE Tunnels
There are six ways to enable the TE tunnel to forward traffic. These are:
Static routing
A static route is configured on the ingress router. The TE tunnel is configured as the
outgoing interface in the static route.
Policy based routing
This is a configured policy that is used on the incoming interface to steer traffic to a
particular next hop
Auto route announce
This is a command configured on the ingress LSR to insert IP destinations into the
routing table with the TE tunnel as the next hop
Forwarding adjacency
Through forwarding adjacency feature, the IGP sees the TE LSP as a link. Any router in
the area running shortest path first (SPF) includes this link.
Direct mapping of AToM traffic onto TE tunnels
Class based tunnel selection
41
CHAPTER 7: CONCLUSIONS AND RECOMMENDATION
7.1 Conclusions
ATM and frame relay are used in networking to achieve traffic engineering. It was realized that
as the network becomes large, ATM and frame relay connections form a complicated full mesh
of virtual circuits that are difficult to troubleshoot in case of link and node failure. This also leads
to poor scalability.
IP is flexible but it has limited traffic engineering capabilities. IP /ATM integration for traffic
engineering becomes complex as the network increases in size. Also, running pure IP is of great
essence in networking.
From the project analysis, it was found that MPLS brings layer 2 switching to layer 3. It also
incorporates connection oriented properties to the connectionless IP.
It was also seen that MPLS TE can be used to build label switched paths with guaranteed
bandwidth. MPLS TE avoids path computation along certain links which have limited
bandwidth. This avoids congestion in those links.
Thus MPLS traffic engineered paths ensure efficient bandwidth utilization. Resource allocation
is also assured in case of resource shortage. MPLS TE also takes control of the path taken by the
traffic in the network.
This reduces the need for extra resources hence lessening the cost of providing service to
consumers.
In Kenya, key entities like Safaricom, Kenya Data Networks are deploying MPLS which has
proved to increase their quality of service provision to their customers at a cheaper cost than
when they were using pure IP.
7.2 Recommendations
The Electrical and Information Engineering department should buy up to date simulation
software like Optimized Network Engineering Tool (OPNET) to aid in simulating sample
MPLS TE networks.
The studied MPLS TE has the following drawbacks:
1. It cannot give bandwidth guarantee on per differential services class basis.
42
2. It is limited to a single autonomous system and interior gateway protocol area.
3. No guarantees are provided for the traffic during failures.
To deal with the given limitations, the developed extensions of MPLS TE should be studied.
These are:
1. Extensions that make MPLS TE aware of Differential services
2. Inter-domain traffic engineering
3. Protection and restoration mechanisms in case of network failure.
43
REFERENCES
1. Eric Osborne, Ajay Simha, Traffic Engineering with MPLS: Design, configure,
and manage MPLS TE to optimise network performance, ©2003 Cisco Systems,
Inc., Printed in the United States of America.
2. Behrouz A. Forouzan, TCP/IP Protocol Suite, Third Edition , ©2006, 2003, 2000
The Mcgraw-Hill Companies, Inc., Printed at Gopaljee Enterprises, Delhi 110
053.
3. Luc De Ghein, MPLS Fundamentals: A Comprehensive Introduction to MPLS
Theory and Practice, ©2007 Cisco Systems Inc., Printed in the United States of
Africa
4. Lydia P., David T B., Chuck D., Jason F., Wei L., Carolyn M., Nicolas R.,TCP/IP
Tutorial and Technical Overview, Eighth Edition, © IBM Corp. 1989-2006,
Printed in the U.S.A.
5. 7750 Service Router, Alcatel-Lucent Service Implementation Course, © Alcatel-
lucent 2007.
6. http://searchtelecom.techtarget.com/tip/MPLS-traffic-engineering-essentials
7. http://www.cisco.com/en/US/dxs/ios/mpls/configuration/guid/mp_link_node_prot
.html
8. Ina Imei, Julian Lucek, MPLS-Enabled Applications: Emerging Developments
and New Technologies , ©2005 John Wiley & Sons Ltd, Printed and bound in
Great Britain by Antony Rowe Ltd, Chippenham, Wiltshire.