SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
(MPLS) MultiProtocol Labling
        Switching

 Software Engineering 4C03
Computer Network & Computer
          Security
     Dr. Kartik Krishnan
         Winter 2004

           Final Copy


       Researcher: Paul Chan
        Student ID: 9914759


    Last Revised: March 29th, 2004
4C03 Project Proposal

Objective

As computer networks become more and more a basic staple asset for
both businesses and in general human communication. Since the
adoption of the internet as a main medium of communication, we have
noticed a correlating burden on the existing hardware and software
system supporting these operations. We are beginning to see that our
current IP switching router configurations struggle to satisfy all the
bandwidth and network throughput requirements. In addition with the
growth of online businesses, there is a push for added security measures
to allow for transmission of sensitive data.

MPLS is a hardware and software solution to this problem. By using newer
networking hardware and smarter software algorithms to direct network
data we can achieve more efficient, flexible and secure network
communications.

Approach

In this report we will briefly describe what MPLS is and how it works.
Moreover, we will discuss how MPLS features can improve current
network conditions and lastly we will see an example of how MPLS
impacts current technology. General knowledge about IP based routing
and switching is assumed as we have studied these in our 4C03
Networking & Security course in great detail.

Impact

This report is intended to give this audience a brief introduction in the
developing networking technology due to be released sometime in the
summer of 2004. From this presentation the audience should be able to
gain insight into the growth of network usage and the necessity for more
efficient ways route information. It should be clear that newer technology
is needed to replace the current technology if we wish to continue
supporting increasing numbers of networked users and devices. Hence
the need for new and cleaver ways to do the things we do on a daily basis.

We will show that MPLS offers many different benefits in addition to the
current IP network. It allows for network traffic engineering to ensure
quality of service (QoS), reliability, security and data transfer efficiency.
This list is only a mere fraction of the list of benefits MPLS brings to the IP
based networking domain. In depth research is needed for one to
understand the depth and breadth of the benefits MPLS brings to our
current networking architecture.
What is wrong with what we have now?

As the internet becomes the standard medium to carry information to and
from their destination we will see traditional protocols and hardware be
pushed to their operating thresholds. How do we solve the problem of
increased demands for quality network bandwidth? How do we guarantee
our packets will get from our sources to our intended destinations without
loss delay and most importantly of all how can we know that are packets
are traveling thru authorized secure networks?

Traditional networking infrastructure relay packets of information via
routers that determine the next best path each packet was to take. Based
on different routing algorithms each packet was sent down the shortest
path or quickest path whichever is deemed to be the priority. Each time a
packet arrived at a router their fate would be determined by a routing table
governed by complex algorithms. The most basic constructs of IP routing
do not include considerations to the quality of network that the packet will
travel nor does it take into account what is the most secure path a packet
can take. It is only concerned with how it can get a packet to its
destination while minimizing the distance (hops). MPLS or Multi Protocol
Label switch is the answer to our concerns above. Since traditional IP
networks have no means of labeling, categorizing or monitoring the
packets that traverse them it is nearly impossible to track and direct
specific packets to ensure that priority packets get to their destination via
the right channels. MPLS technology works to solve these IP
shortcomings.

What is MPLS

MPLS is an “overlay” protocol, meaning that MPLS uses the existing
structure of traditional IP switching enhanced with label or tags to aid in
this new way of relaying packets. MPLS takes advantage of all the
benefits of traditional IP switching and adds to it the benefits of network
quality assurance and security management.

Technically MPLS is nothing more than a label header encapsulated into
the IP packet header. This label is used to categorize the packet as it
travels across the physical network thus enabling the ability for it to be
monitored tracked. MPLS hardware transforms the standard IP packets
into MPLS packets adding and subtracting labeling information as they
enter and leave the network. This ensures compatibility to current
consumer computer equipment and eliminates the need for end users to
make hardware upgrades to take advantage of the benefits of MPLS.
How it works: MPLS

MPLS-equipped networks use MPLS-aware devices known as label edge
routers (LERs), positioned at the network’s edges. These devices are
designed to inspect IP packets entering the network and add MPLS
headers, as well as removing the headers from packets leaving the MPLS
network. Inside the boundaries of the MPLS network, devices known as
label switch routers (LSRs) look for an MPLS label on each packet as they
passes through them. By looking up and following the instructions
contained in those labels and routing them based on a list of instructions
we obtain the ability to control, monitor and direct packets to and from
network paths of our choice.




Diagram A - http://www.nwfusion.com/news/tech/0524tech.html

Benefits Derivations
  • Security
  • Quality of Service (QoS)
  • Routing Efficiency
  • Backward compatibility and Cost efficiency
  • Traffic Engineering
Applications: Where can MPLS thrive?

MPLS technology main thrives in large network implementations where
mass amounts of data needs to be transmitted through different physical
networks quickly, efficiently and securely. In many cases finding the
optimal path of information is not an easy task. Network administrators
need the flexibility to dictate where on the network specific packets of
information must flow based on technical or business criteria. MPLS
allows network administrators the ability to direct critical traffic thru only
secure networks and non critical data thru general network backbone
connections.

The greatest and simplest example of current technology that can use the
strengths of MPLS technology is VPN (Virtual private networking). VPN is
the establishment of a secure connection to a host severs thru insecure
networks (such as the internet) often known as tunneling.




Diagram B - http://www.helpdesk.umd.edu/topics/applications/vpn/3836
Diagram C - http://www.helpdesk.umd.edu/topics/applications/vpn/3836

As described in the diagrams above users create a “tunneled” secure
connection to specific host servers passing thru unknown physical
networks of the internet domain. Packets may very well travel thru
networks belonging to malicious hackers. Even though this information is
often encrypted hackers can and will find a way to intercept and decrypted
messages that pass thru their networks.

MPLS can mitigate this security threat completely. As network
administrator you may be required to establish a VPN connection between
two locations. The data sent maybe extremely sensitive. With MPLS and
VPN technology you will be able to establish a connection and ensure that
this information only travels via certain trusted networks. Doing so can
ensure data is transferred safely, securely and efficiently. In the diagrams
below you will see the concepts of VPN without MPLS and VPN with
MPLS illustrated. The main difference is VPN connection established via
MPSL will travel via Virtually Leased Lines (VLL). These lines are provided
by large network service providers which ensure the lines are secure and
always are of highest quality.
Diagram D - http://www.netcraftsmen.net/welcher/papers/mplsvpn.html




Diagram E - http://www.foundrynet.com/solutions/appNotes/PDFs/DM_VLL.pdf
Conclusion

Since the exponential like growth of the internet we have noticed
correlating phenomena that hardware limits are being pushed to
dangerously instable levels. By devising new and more cleaver ways to
route information to and from different locations we can accommodate the
increasing demands while postponing the changing of standards and
expenditure. We can use what we have now in smarter more efficient
ways postpone the need to expand or upgrade our current network
systems. MPLS is the solution to our ever expanding internet usage. By
use of cleaver routing techniques not only can we achieve more efficient
usage of our physical networks but we can also have the additional
benefits of security and flexibility.

Bibliography

Author Unknown
Introduction to MPLS .. Explaining Multi-protocol Label Switching
Retrieved Feb 28th, 2004 from
http://findvpn.com/articles/mpls.php

Más contenido relacionado

La actualidad más candente

Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
CU
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile Backhaul
Scott Foster
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
Nitin Gehlot
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
seanraz
 

La actualidad más candente (20)

Mpls
MplsMpls
Mpls
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
MPLS
MPLSMPLS
MPLS
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Mpls te
Mpls teMpls te
Mpls te
 
GMPLS (generalized mpls)
GMPLS (generalized mpls)GMPLS (generalized mpls)
GMPLS (generalized mpls)
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
gmpls
gmplsgmpls
gmpls
 
Mpls
MplsMpls
Mpls
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile Backhaul
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
Mpls101
Mpls101Mpls101
Mpls101
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
 
Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)Presentation on MPLS (Multi Protocol Label Switching)
Presentation on MPLS (Multi Protocol Label Switching)
 

Destacado

Destacado (6)

Assessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba damAssessment of rainfall intensity on temporal water quality of awba dam
Assessment of rainfall intensity on temporal water quality of awba dam
 
Congestion control in computer networks using a
Congestion control in computer networks using aCongestion control in computer networks using a
Congestion control in computer networks using a
 
Bgp
BgpBgp
Bgp
 
Biscuitville
BiscuitvilleBiscuitville
Biscuitville
 
Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007Iniciativa për Siguri Informative 2007
Iniciativa për Siguri Informative 2007
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 

Similar a Mpls

MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term Success
ReadWrite
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Erik Ginalick
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
mashiur
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
Cisco Service Provider
 

Similar a Mpls (20)

IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
L347176
L347176L347176
L347176
 
dissertation
dissertationdissertation
dissertation
 
my project publication
my project publicationmy project publication
my project publication
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term Success
 
MPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term SuccessMPLS: Future Proofing Enterprise Networks for Long-Term Success
MPLS: Future Proofing Enterprise Networks for Long-Term Success
 
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
Mpls Future Proofing Enterprise Networks For Long Term Success Wp101094
 
5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications
 
Vp ns
Vp nsVp ns
Vp ns
 
MPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdfMPLS Virtual Private Networks.pdf
MPLS Virtual Private Networks.pdf
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
 
Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )Research paper ( MPLS as a Software-Defined Network )
Research paper ( MPLS as a Software-Defined Network )
 
G010314853
G010314853G010314853
G010314853
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Mpls

  • 1. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised: March 29th, 2004
  • 2. 4C03 Project Proposal Objective As computer networks become more and more a basic staple asset for both businesses and in general human communication. Since the adoption of the internet as a main medium of communication, we have noticed a correlating burden on the existing hardware and software system supporting these operations. We are beginning to see that our current IP switching router configurations struggle to satisfy all the bandwidth and network throughput requirements. In addition with the growth of online businesses, there is a push for added security measures to allow for transmission of sensitive data. MPLS is a hardware and software solution to this problem. By using newer networking hardware and smarter software algorithms to direct network data we can achieve more efficient, flexible and secure network communications. Approach In this report we will briefly describe what MPLS is and how it works. Moreover, we will discuss how MPLS features can improve current network conditions and lastly we will see an example of how MPLS impacts current technology. General knowledge about IP based routing and switching is assumed as we have studied these in our 4C03 Networking & Security course in great detail. Impact This report is intended to give this audience a brief introduction in the developing networking technology due to be released sometime in the summer of 2004. From this presentation the audience should be able to gain insight into the growth of network usage and the necessity for more efficient ways route information. It should be clear that newer technology is needed to replace the current technology if we wish to continue supporting increasing numbers of networked users and devices. Hence the need for new and cleaver ways to do the things we do on a daily basis. We will show that MPLS offers many different benefits in addition to the current IP network. It allows for network traffic engineering to ensure quality of service (QoS), reliability, security and data transfer efficiency. This list is only a mere fraction of the list of benefits MPLS brings to the IP based networking domain. In depth research is needed for one to understand the depth and breadth of the benefits MPLS brings to our current networking architecture.
  • 3. What is wrong with what we have now? As the internet becomes the standard medium to carry information to and from their destination we will see traditional protocols and hardware be pushed to their operating thresholds. How do we solve the problem of increased demands for quality network bandwidth? How do we guarantee our packets will get from our sources to our intended destinations without loss delay and most importantly of all how can we know that are packets are traveling thru authorized secure networks? Traditional networking infrastructure relay packets of information via routers that determine the next best path each packet was to take. Based on different routing algorithms each packet was sent down the shortest path or quickest path whichever is deemed to be the priority. Each time a packet arrived at a router their fate would be determined by a routing table governed by complex algorithms. The most basic constructs of IP routing do not include considerations to the quality of network that the packet will travel nor does it take into account what is the most secure path a packet can take. It is only concerned with how it can get a packet to its destination while minimizing the distance (hops). MPLS or Multi Protocol Label switch is the answer to our concerns above. Since traditional IP networks have no means of labeling, categorizing or monitoring the packets that traverse them it is nearly impossible to track and direct specific packets to ensure that priority packets get to their destination via the right channels. MPLS technology works to solve these IP shortcomings. What is MPLS MPLS is an “overlay” protocol, meaning that MPLS uses the existing structure of traditional IP switching enhanced with label or tags to aid in this new way of relaying packets. MPLS takes advantage of all the benefits of traditional IP switching and adds to it the benefits of network quality assurance and security management. Technically MPLS is nothing more than a label header encapsulated into the IP packet header. This label is used to categorize the packet as it travels across the physical network thus enabling the ability for it to be monitored tracked. MPLS hardware transforms the standard IP packets into MPLS packets adding and subtracting labeling information as they enter and leave the network. This ensures compatibility to current consumer computer equipment and eliminates the need for end users to make hardware upgrades to take advantage of the benefits of MPLS.
  • 4. How it works: MPLS MPLS-equipped networks use MPLS-aware devices known as label edge routers (LERs), positioned at the network’s edges. These devices are designed to inspect IP packets entering the network and add MPLS headers, as well as removing the headers from packets leaving the MPLS network. Inside the boundaries of the MPLS network, devices known as label switch routers (LSRs) look for an MPLS label on each packet as they passes through them. By looking up and following the instructions contained in those labels and routing them based on a list of instructions we obtain the ability to control, monitor and direct packets to and from network paths of our choice. Diagram A - http://www.nwfusion.com/news/tech/0524tech.html Benefits Derivations • Security • Quality of Service (QoS) • Routing Efficiency • Backward compatibility and Cost efficiency • Traffic Engineering
  • 5. Applications: Where can MPLS thrive? MPLS technology main thrives in large network implementations where mass amounts of data needs to be transmitted through different physical networks quickly, efficiently and securely. In many cases finding the optimal path of information is not an easy task. Network administrators need the flexibility to dictate where on the network specific packets of information must flow based on technical or business criteria. MPLS allows network administrators the ability to direct critical traffic thru only secure networks and non critical data thru general network backbone connections. The greatest and simplest example of current technology that can use the strengths of MPLS technology is VPN (Virtual private networking). VPN is the establishment of a secure connection to a host severs thru insecure networks (such as the internet) often known as tunneling. Diagram B - http://www.helpdesk.umd.edu/topics/applications/vpn/3836
  • 6. Diagram C - http://www.helpdesk.umd.edu/topics/applications/vpn/3836 As described in the diagrams above users create a “tunneled” secure connection to specific host servers passing thru unknown physical networks of the internet domain. Packets may very well travel thru networks belonging to malicious hackers. Even though this information is often encrypted hackers can and will find a way to intercept and decrypted messages that pass thru their networks. MPLS can mitigate this security threat completely. As network administrator you may be required to establish a VPN connection between two locations. The data sent maybe extremely sensitive. With MPLS and VPN technology you will be able to establish a connection and ensure that this information only travels via certain trusted networks. Doing so can ensure data is transferred safely, securely and efficiently. In the diagrams below you will see the concepts of VPN without MPLS and VPN with MPLS illustrated. The main difference is VPN connection established via MPSL will travel via Virtually Leased Lines (VLL). These lines are provided by large network service providers which ensure the lines are secure and always are of highest quality.
  • 7. Diagram D - http://www.netcraftsmen.net/welcher/papers/mplsvpn.html Diagram E - http://www.foundrynet.com/solutions/appNotes/PDFs/DM_VLL.pdf
  • 8. Conclusion Since the exponential like growth of the internet we have noticed correlating phenomena that hardware limits are being pushed to dangerously instable levels. By devising new and more cleaver ways to route information to and from different locations we can accommodate the increasing demands while postponing the changing of standards and expenditure. We can use what we have now in smarter more efficient ways postpone the need to expand or upgrade our current network systems. MPLS is the solution to our ever expanding internet usage. By use of cleaver routing techniques not only can we achieve more efficient usage of our physical networks but we can also have the additional benefits of security and flexibility. Bibliography Author Unknown Introduction to MPLS .. Explaining Multi-protocol Label Switching Retrieved Feb 28th, 2004 from http://findvpn.com/articles/mpls.php