MPLS
MPLS
MPLS
(Lahore),27(3),2113-2119,2015
2113
ABSTRACT- Graphical network simulator (GNS) 3 is an excellent complementary tool that allows simulation of
complex networks like implementation of real labs for network engineers, administrators, and researchers. The primary
objective of this paper is to evaluate GNS3 as an educational tool by implementing Multiprotocol Label Switching (MPLS)
Virtual private Networks (VPN) and Internet Protocol Security (IPsec) VPN. A Client Server model is created using FileZilla
Server and Client, then a file of 11,057,507 bytes is transferred and monitored by network tool OpManager. The result
obtained shows that Round-trip time (RTT) value is high for both protocols in GNS3 as compare to real networks. So it is
concluded that network topology used can be implemented in GNS3, and could be used as an educational tool, but it requires a system like
Intel Core 2 Duo or higher processor, having at least 4GB of RAM, as it utilizes considerable system resources.
Index Terms: Graphical Network Simulator (GNS3), Multiprotocol Label Switching (MPLS), Virtual Private
Network (VPN), Internet Protocol Security (IPsec), Round-trip Time (RTT).
1. INTRODUCTION
IT and Telecommunication industry has shown immense
progress over the years as different changes are occurring at a
very fast pace in this sector. It may be due to the demands of
the users, to improve and remove the technological
constraints that may exist like bugs and software up gradation
that are required by system with the passage of time.
Therefore, it is important to conduct different experiments,
tests and research work before launching any brand new
technology into the market and furthermore to ensure that the
fresh technology, application, or software will achieve the
desire results.
Simulators and emulators are used for analysis of existing
methods, new systems, for training and experimentation
purposes. These are cost efficient compared to the physical
equipment and tools used in labs. Furthermore, it needs less
time and resources for set-up of distinctive simulators and
emulators. They are robust for running distinct experiments
and research work. Creation and testing of many applications,
protocols, and network designs used these simulators. The
simulation-based knowledge helps students to develop
updated skills in creative and critical thinking and find out
new problem-solving techniques [1].
GNS3 is an open-source emulator, but it requires Cisco IOS
images for running different routers and Private Internet
Exchange (PIX) firewall, etc. According to Fuszner [2], by
using GNS3 and Cisco Internetwork Operating System (IOS)
emulation of complex networks would be carried out. Cisco
IOS runs in a virtual environment on a laptop and personal
computers. GNS3 is the graphical front end to Dynagen that
runs on top of Dynamips which is the core program that
makes Cisco IOS emulation possible and provides userfriendly text based interface [14]. GNS3 provides graphical
environment. GNS3 is used for preparation of such as Cisco
CCNA, CCNP, CCIP and CCIE as well as Juniper JNCIA,
JNCIS and JNCIE. Thanks to Virtual Box integration, now
even system engineers and administrators can take advantage
of GNS3 to make labs and study for Red hat (RHCE, RHCT),
May-June
2114
Sci.Int.(Lahore),27(3),2113-2119,2015
May-June
Sci.Int.(Lahore),27(3),2113-2119,2015
2115
May-June
2116
4 RESULT ANALYSIS
In this Section we have discussed the layer 3 MPLS VPN
& IPsec VPN, there configuration and results analysis.
4.1 CONFIGURATION OF LAYER 3 MPLS VPN
Configuration of each router as shown in topology scenario
.4.1.1 CUSTOMER EDGE ROUTER
IP addresses are assigned to both serial and Fast Ethernet
interfaces of CE routers. Bandwidth of 1.544 Mbits/sec is
used on the serial interfaces and clock rate is not set on theses
interfaces as these are DTE ends. Routing Information
Protocol IP (version 2) routing protocol is used for
advertising the networks of CE routers.
4.1.2 PROVIDER EDGE ROUTER
Clock rate of 64 kbps is configured on the DCE ends of CE.
MPLS and Label distribution protocol (LDP) are configured
P router interfaces. Open Shortest Path First (OSPF) routing
protocol is used to advertise all networks and RIP (V2)
protocol is used on PE routers loopback interface and serial
interface attached to CE routers. Ipvrf command is used to
configure Virtual Routing and Forwarding (VRF) on PE
routers. PE routers have VRF instances for each attached
VPN. Route Distinguisher (RD) is used to keep the customer
routing information separate from other customers,. Border
Gateway Protocol (BGP) is configured on both PE routers.
RD combines with IPv4 prefix to make vpnv4 prefix which is
transported by IBGP between PE routers. In order to make
aware of different routes RIP is redistributed into BGP and
vice-versa.
4.1.3 PROVIDER INTERNAL ROUTER
Bandwidth 1.544 Mbits/sec and clock rate of 64 Kbps is
configured on both serial interfaces. MPLS and LDP are
configured on serial interfaces. OSPF routing protocol is
configured for dynamic routing.
4.2 RESULTS OF LAYER3 MPLS VPN
Trace route command is used on CE2 router to check the
route to fast Ethernet interface of CE1 router. Output shows
that four devices (Labeled 1, 2, 3 & 4) are involved in
reaching the interface as depicted in Table 2. This is different
from overlay VPN network.
Routing Table of CE2 router shown in Table 3 shows all the
connected interfaces and the routes advertise by MP-BGP. In
Peer to Peer VPN technology, CE2 router includes the route
information of both CE1 and PE2 routers. The routing peer is
established between customer edge and provider edge routers.
File is downloaded from FileZilla server and time is noted as
shown in the Table 4, minimum and maximum time for
downloading the file is 140 (2.33 minutes) and 268 seconds
(4.46 minutes)respectively. Average time taken for file
transfer is 218.14 seconds (3.6 minutes) and Standard
deviation is 55.19. There is variation in file transfer time; it is
due to variation in the number of processes that are running
in Windows operating system and load on the CPU.
Sci.Int.(Lahore),27(3),2113-2119,2015
May-June
Sci.Int.(Lahore),27(3),2113-2119,2015
2117
Status:
Status:
Status:
Status:
Status:
Status:
Status:
May-June
2118
Sci.Int.(Lahore),27(3),2113-2119,2015
5. CONCLUSION
Simulators and emulators are playing vital role in different
fields of science and technology. Simulators are admired by
researchers and students due to the fact that, either access to
the equipment is not available or time and finance is required
for establishing the lab. So therefore they are used for
research work and getting hands on experience in different
technologies. MPLS VPN and IPsec VPN are implemented
with the objective to generate traffic in GNS3 for comparison
between the two techniques. Both techniques are successfully
implemented. Average file download time in MPLS and
IPsec VPN is 218.14 seconds and 234.57 seconds
respectively. IPsec appends more overhead as compare to
MPLS so due to this reason the time taken for file transfer in
IPsec VPN network is more than the MPLS VPN
implementation. Finally according to OpManager report, the
RTT average value is higher in IPsec VPN as compare to
MPLS VPN, because IPsec provides security but it adds more
overhead which may affect the network performance. The
main drawback of GNS3 is that it utilizes a lot of system
resources, for all the technologies implemented in this paper,
the CPU usage was 100 % as reported by Windows task
manager.
REFERENCES
[1]
Khadijah Wan Mohd Ghazali, Rosilah Hassan,
Zulkarnain Md. Ali, Simulation tool for active learning
of introductory computer network subjects, 1st
National Conference on Active Learning, NCAL,
pp.119, 122, 2011.
[2]
GNS3 Documentation (21, March 14).[Online].
Available: http:// www.gns3.net
[3]
Nogueira, Antnio, and Paulo Salvador. "Teaching
Networking: A Hands-on Approach that Relies on
Emulation-based Projects." INFOCOMP 2014, The
Fourth International Conference on Advanced
Communications and Computation. 2014.
[4]
K. N. Rao, N. T. Rao, M. Sitharam, K. A. Vardhan and
P. K. Routhu, "A Study on Performance Analysis of
IPSec VPN and MPLS VPN," International Journal of
Futuristic Science and Technology, vol. 1, no. 3, pp.
184-190, 2013.
[5]
Luc De Ghein, MPLS Fundamentals, Cisco Press,
2007.
[6]
Morgan, B., Lovering, N. CCNP ISCW Official Exam
Certification Guide, Cisco Press, 2007.
[7]
Lancy Lobo, Umesh Lakshman, MPLS Configuration
on Cisco IOS, Cisco Press, 2005.
[8]
Badran,
H.F.,
"Service
provider
networking
infrastructures with MPLS,"
Computers and
Communications, 2001. Proceedings. Sixth IEEE
Symposium on, vol., no., pp.312,318, 2001.
[9]
Azam, M.A.; Zaka-Ul-Mustafa; Tahir, U.; Ahsan, S.M.;
Naseem, M.A.;Rashid, I.; Adeel, M., "Overhead
analysis of security implementation using IPSec,"
Information and Communication Technologies, 2009.
ICICT '09. International Conference on, vol., no.,
pp.70, 76, 15-16 Aug. 2009.
[10]
May-June
Sci.Int.(Lahore),27(3),2113-2119,2015
May-June
2119