300 likes | 494 Views
Functional Tests of MPLS and VPN on TWAREN. Tsang-Ling Sheu Dept. of Electrical Engineering National Sun Yat-Sen University Kaohsiung, TAIWAN. Outline. MPLS Architectures Fast Rerouting Preemption Load sharing Auto-bandwidth Multiple MPLS-VPN. MPLS Architectures.
E N D
Functional Tests of MPLS and VPN on TWAREN Tsang-Ling Sheu Dept. of Electrical Engineering National Sun Yat-Sen University Kaohsiung, TAIWAN
Outline • MPLS Architectures • Fast Rerouting • Preemption • Load sharing • Auto-bandwidth • Multiple MPLS-VPN
MPLS Architectures • Multiple Protocols Label Switching • Integrate IP routing and ATM Label Switching • Route once and Switch many • Establish LSP (Label Switching Path) from Ingress LSR to Egress LSR • via RSVP-TE , LDP, or CR-LDP • Provide QoS via Queuing Disciplines (or DiffServ) • WRR, DRR, Token Bucket • Provide Traffic Engineering
MPLS Traffic Engineering • Bandwidth Reservation • Traffic Rerouting • Path Preemption • Path Selection • QoS-based Forwarding
Fast Rerouting Traffic before Link Failure
Fast Rerouting (Cont.) Traffic after recovery
Packet Drop Sending rate = 100 Mbps , 200 Mbps and 300 Mbps
Recovery Time Sending rate = 100 Mbps , 200 Mbps and 300 Mbps
Throughput Sending rate = 100 Mbps, 200 Mbps and300 Mbps
Packet Drop Packet size =1000 Byte, Auto length, 64 byte. sending rate = 100 Mbps
Recovery Time Packet size = 1000 Byte, Auto length, 64 byte. Sending rate = 100 Mbps
Throughput Packet size = 1000 Byte, Auto length, 64 byte. Sending rate = 100 Mbps
LSP Preemption Topology before Preemption
LSP Preemption (Cont.) Topology after Preemption
Preemption Results Packet Size = Auto Length • Recovery time from Preemption is not uniform. • It may talk less then one second or more than 20 seconds.
Load Sharing via Hash • Cisco router uses hash function to distribute traffic over the same subnet • Three source-destination groups are tested individually. (1) 192.168.60.51 --- > 192.168.111.21 192.168.50.53 --- > 192.168.111.21 (2) 192.168.50.52 --- > 192.168.111.21 192.168.60.51 --- > 192.168.111.21 (3) 192.168.50.53 --- > 192.168.111.21 192.168.60.53 --- > 192.168.111.21 192.168.50.0/24 and 192.168.60.0/24 are on NSYSU 7609R 192.168.111.21 is on Taipei Gigapop (TP 12416R).
Experimental Results • The first group uses different LSP Tunnels (192.168.60.51 to192.168.111.21:Tunnel 422 192.168.50.53 to 192.168.111.21:Tunnel 421) • The second group uses the same tunnel:Tunnel 422. • The third group uses the same tunnel: Tunnel 421. • Load sharing isworking, but because of hash function, it may need lots of source-destination pairs to be transmitted simultaneously.
Multiple MPLS-VPN • VPN uses BGP backbone • Redistribute Connected • Redistribute Static • VPN uses MPLS Tunnels
Conclusions • MPLS is the selected switching technique for backbone networks (it has been widely employed in USA) • Fast Rerouting, Path Preemption, and Load Sharing are proved technologies • LSP tunneling facilitates the progress of MPLS-VPN • Bandwidth guarantee in MPLS relies on DiffServ technologies • Mapping problems still exist between 3-bit Exp field and 6-bit DSCP field