MODULE3 - NIB II Project 1 PDF
MODULE3 - NIB II Project 1 PDF
MODULE3 - NIB II Project 1 PDF
BSNL
ES & IT FACULTY
COURSE CODE – BRBCOIF114
INDEX
4. RSVP-TE 166
5. MPLS Based Layer-3 VPN 220
6. Cisco Router Configuration: MPLS based Layer-3 VPN 225
Configuration using MP-iBGP/eBGP, MP-iBGP/OSPF &
MP-iBGP/Static/Default
7. NMS & EMS (Project-1) OSS/BS as part of Project 3 232
8. NGN, Wi-MAX, Voip, IMS 245
BRBRAITT : June-2011 1
―DATA NETWORK‖ FOR JTOs PH-II
NIB-II OVERVIEW
BRBRAITT : June-2011 2
―DATA NETWORK‖ FOR JTOs PH-II
Introduction
BSNL has planned to setup NIB-II to provide world class infrastructure to offer
various value added services to a broader customer base county-wide that will help to
accelerate the Internet revolution in India. Moreover the NIB-II will create a platform,
which enables e-governance, e-banking, e-learning, etc. with the key point of Service
Level Agreements & Guarantee in tune with Global standards and customer
expectations.
NIB-II has been grouped into following three major projects.
BRBRAITT : June-2011 3
―DATA NETWORK‖ FOR JTOs PH-II
Network Architecture:
Core Network:The NIB-II shall constitute an integrated 2-layer IP and MPLS
network. The Layer 1 network will constitute the high speed Backbone comprising of
Core routers with built in redundancies supporting both TCP/IP and MPLS protocols
with link capacities in accordance with the traffic justification. Its function will
primarily be limited to high-speed packet forwarding between the core nodes. All the
A nodes in the NIB-I shall form the Core layer. The five major nodes at Mumbai,
Bangalore, Delhi, Kolkata and Chennai are configured in the full mesh with link
bandwidth of STM-16. The remaining 9 nodes of Pune, Hyderabad, Ahemdabad,
Luchnow, Jullundhar, Jaipur, Indore, Ernakulam and Patna are configured in dual
mesh with link bandwidths of STM-16, (Refer Figure 1(a),1(b) & 1(c)).
BRBRAITT : June-2011 4
―DATA NETWORK‖ FOR JTOs PH-II
Figure (a)
BRBRAITT : June-2011 5
―DATA NETWORK‖ FOR JTOs PH-II
A1 + A2 + A3 POPS
IP MPLS Core Network
Jullunder
Core
A3
Del Lucknow
Jaipur
Core
hi Core
A3
Core A1
A3
Patn
Ahmedabad a
Indore Core
Core A3
A2
Core
A3
Pune Core
Core
A1
A1 Hyderaba Kolkatta
Mumbai Core
A2
d Core
A2
Figure 1(b)
BRBRAITT : June-2011 6
―DATA NETWORK‖ FOR JTOs PH-II
A1 + A2 + A3 + A4 POPS
Jullunder Chandigarh
Core
Core
A4
A3
Delhi Lucknow
Jaipur Allahabad Guwahati
Core Core
A3
Core A1 Core
A3 Core
A4
A4
Ahmedabad
Patna
Core
Core A3 Core
A2 Indore A4
Ranchi
Core Nagpu
A3
r Core
A4
Raipur Core
Core
A1
A1 Pun Hyderabad Core
Mumba Core Kolkatt
A4
A2 e
i Core Core a
A2 A4
Core Bhubaneshw STM -1 LINK
Core
A4
Mangalor A4 ar
Vijayawa STM-16 LINK
e
da Core
Cisco 12416
Core
BangalorA1 Core (P) Router
A1
e Core Cisco 12410
Chenn A2
ai
Router
Ernakula Core Core Coimbatore Core Cisco 12410
A3 A4 A3
m Router
Juniper M40e
Core
A4 Router
Project 1
(MPLS based IP Network infrastructure covering 71 cities along with associated
NMS, PMS, Firewall and Caching platforms.)
MPLS based networks provide a cost effective way to enhance customer networking
quality, rather than setting up and managing individual point-to-point circuits between
each office, customers need to provide only one connection from their office router to
a service-provider edge router. The service-provider edge router either forwards the IP
packets in the IP network or in the case of MPLS configured access labels the packets
and routes them through its MPLS core to the edge closest to destination. IP/TCP
connectivity shall be provided through Provider (P) routers and Provider Edge (PE)
routers. The city-wise categorization of nodes under NIB-II Project 1 is given in Table
1.
BRBRAITT : June-2011 7
―DATA NETWORK‖ FOR JTOs PH-II
The Layer - 2 Edge network is the second layer of the IP backbone network and
primarily supports MPLS edge functionality. The function of this layer is to enforce
QoS and other administrative policies. This layer provides customer access through
following three mechanisms,
Dialup
Dedicated Access and
Broadband access.
This layer provides connectivity to secure VPNs as well as to Internet Data Centers.
Edge routers in 71 cities are connected to the Core layer either locally through the
Gigabit Ethernet interfaces or remotely through dual homed STM-1 links.
BRBRAITT : June-2011 8
―DATA NETWORK‖ FOR JTOs PH-II
The network is envisaged to provide QoS features associated with MPLS technology
with all traffic shaping and traffic engineering features. It provides peering interfaces
to other domains and serves as an Internet Exchange to ISPs. It supports IP
networking and Border Gateway Protocol (BGP)/ Multi Protocol Label Switching
(MPLS) technology. The network supports data, voice and video applications over
Layer 2 and Layer 3 MPLS VPNs.
The network architecture of NIB-II provides for integration of other networks such as
NIB-I and MPLS VPN of BSNL. It shall provide a common Network Management
System (NMS) and VPN / Bandwidth Provisioning System for the entire integrated IP
network infrastructure. The network infrastructure for NIB-II is intended to provide IP
network access, both on retail as well as wholesale basis, to dialup, DSL and leased
access customers. The network provides a common IP infrastructure that supports all
smaller open networks and sub-networks.
The Primary objectives in setting up the MPLS based IP network
Building a common IP infrastructure that shall support all smaller networks
and sub networks. The platform is intended to be used for convergent services,
integrating data, voice and video and shall be the primary source of Internet
bandwidth for ISPs, Corporate, Institutions, Government bodies and retail
users.
Making the service very simple for customers to use even if they lack
experience in IP routing, along with Service Level Agreement (SLA)
offerings.
Make a service very scalable and flexible to facilitate large-scale deployment.
Capable of meeting a wide range of customer requirements, including security,
quality of service (QoS), and any-to-any connectivity.
Capable of offering fully managed services to customers.
Caching Platform:
The Caching platform makes the contents (HTTP, MMS, FTP etc.) available at the
POP/ Core locations and saves upstream International bandwidth. The Caching
platform enables faster responses from web.
BRBRAITT : June-2011 9
―DATA NETWORK‖ FOR JTOs PH-II
1. Encryption Services
2. Multicast Services
3. Firewall Services
Project 2
(Access Gateway Platform)
The NIB-II Access Gateway platform shall provide Internet Access at any time of the
day, from any place, using any device such as PC, analog phone, wireless or mobile
phone, or Personal Digital Assistant (PDA). The Access Gateway Platform (AGP) is
built around two distinct platforms, one supporting a unified dialing network
architecture that delivers voice, data and fax services through an open programmable
gateway and the other supporting a unified always-on Internet Access platform on
Ethernet-IP. The open programmable dialing gateway is dimensioned to provide 80%
plain data RAS and 20% Universal RAS ports. The always-on Internet Access
platform is built around the DSL technology using ADSL, SHDSL and VDSL that
delivers voice, data and video services over increasingly larger bandwidths directly on
Ethernet-IP local networks to residential and corporate users, enabling applications
like Broadcast TV, Video on Demand, Pay per View, Content Delivery, Interactive
gaming, Music Services, Video-Conferencing, IP-Multicasting Services, Education on
Demand, Interactive distant learning, Remote Medical Treatment, GIS based
applications, IP PBX, IP Centrex, VoIP, VoDSL, High speed Internet, MPLS VPN
etc.
BRBRAITT : June-2011 10
―DATA NETWORK‖ FOR JTOs PH-II
The following services are proposed to be provided as part of the scope of work.
Dial VPN/Internet Access service
ADSL, SHDSL & VDSL IP-Ethernet High speed services (0.5 to 50 Mbps
over existing Copper cables)
Wholesale Dial or port retailing service
Internet Call Waiting service
IP based Unified Messaging Service
Teleconferencing Service
Internet Telephony Service
Hosted voice services / IP Centrex.
Project 2.1: - This project is for the deployment of narrow band services in 71 Cities.
Including validation nodes Kolkata (A1), Mumbai (A3), Agra (B1) and Shimla (B2).
City-wise classification of Nodes under Project 2.1 of NIB-II is given in Tables 2 and
3.
Table 2: City-wise classification of Nodes under Project 2.1 of NIB-II for L2 Bidder
(M/s. UTStarcom Inc.)
A1 1 Kolkata
A2 0 --
A4 3 Chandigarh, Guwahati,
Ranchi
Table 3: City-wise classification of Nodes under Project 2.1 of NIB-II for L1 Bidder
(M/s. ITI LTD.)
BRBRAITT : June-2011 11
―DATA NETWORK‖ FOR JTOs PH-II
A1 2 Chennai, Bangalore
Project 2.2:
This Project is for the deployment of broadband services in 198 cities with 69
important cities where Digital Subscriber Line Access Multiplexer (DSLAM) shall be
deployed. The cities are categorized under A1 (3 cites), A2 (3 cites), A3 (6 cites), A4
(10 cites), B1 (21 cites), B2 (26 cites), and others (129 cities). Delhi and Mumbai will
not have any broadband equipment under Project 2.2 of NIB-II.
Services planned through Project 2.2
Primary source of Internet bandwidth for retail users for application such as
Web browsing, e-commerce etc
Multicast video services, video on demand etc through Broadband Remote
Access Server (BRAS).
Allow wholesale BRAS ports to be assigned to smaller ISPs through the
franchises model wherein the later has a separate network of DSLAMs, AAA,
LDAP through a revenue scheme of BSNL.
Dialup VPN (VPDN) user connects to NIB-II through the Narrow band RAS
and is connected to its private network through a secure L2TP tunnel
established between Narrowband RAS and Broadband RAS.
Support for both prepaid and postpaid Broadband services.
BRBRAITT : June-2011 12
―DATA NETWORK‖ FOR JTOs PH-II
BRBRAITT : June-2011 13
―DATA NETWORK‖ FOR JTOs PH-II
Project 3:
[Messaging and Storage Service Platform, Provisioning, Billing & Customer care,
Enterprise Management System (EMS) and Security System.]
The Core messaging system shall be the heart of NIB-II that will enable BSNL to add
users across varied value added services. This shall envisage design and up gradation
of the current messaging system to grow from the existing infrastructure in NIB-I
supporting 650,000 users to support the increasing user base. The messaging systems
and associated Storage will be implemented in phases, in accordance with phased
induction of Access equipment.
The system shall be an integrated provisioning, billing, customer care and accounting
platform and shall support billing for the complete range of IP based services
mentioned and meet next-generation requirements as well.
The salient aspects of the projects are summarized as follows:
Setting up proven, robust, scalable Messaging Solution with best in class
security components.
Roll out across the country supported by 5 Messaging & associated storage
systems at Delhi, Mumbai, Bangalore, Chennai and Kolkata.
Designed with High Availability architecture with no single point of failure.
BRBRAITT : June-2011 14
―DATA NETWORK‖ FOR JTOs PH-II
Such storage device should be compatible with all the Servers of major companies
such as HP, IBM, SUN, Dell etc. so that choice of Application Servers Platform
remains independent of the storage device.
System Dimensioning:
The user base will be serviced through 5 Messaging and associated Storage systems
that will be set up in the 5 cities. Each of the cities will be connected through the IP
Backbone. Since the proposed user base is envisaged to increase in a phased manner,
the associated messaging system is also proposed to be upgraded in phases
correspondingly.
The system should be designed to support:
On-line services such as Internet, pay-per-view TV and video on demand or a
combination of all or some of the above.
Periodic charges, such as telephone line and cable TV rental.
One-time costs, such as connection fees.
Events, such as telephone calls, data service usage, pay-per-view TV
selections, home shopping purchases, utility metered usage – such as
electricity supply (live site example)
Financial services ASP services.
Telephony services.
Enterprise Backup Systems.
The billing system shall be capable of
Providing electronic versions of bills to customers over the Internet.
Creation/modification of service.
Processing Service requests in real time and non-real time and accounting in
real time.
Producing flexible billing depending upon the use of service.
Security Systems
These include the following.
Load Balancers
Firewall Appliances
Intrusion Detection System
Antivirus system, etc.
The network shall be centrally managed from Network Operation Centre (NOC)
located at two sites, one of them being master and the other the disaster recovery site.
The main NOC is at Bangalore with Disaster Recovery is at Pune. Interface to the
NMS back-office facility shall be provided along with Firewall security in the Data
Centre. All customer databases shall reside centrally at NOC.
The NMS of NIB-II project 1 is the comprehensive NMS for entire NIB-II including
NIB-I, MPLS VPN, Project 2.1, Project 2.2, which will support entire F (Fault), C
(Configuration), A (Accounting including Access/Inventory), P (Performance) and S
BRBRAITT : June-2011 15
―DATA NETWORK‖ FOR JTOs PH-II
(Security functionality). The conceptual view of eMS, NMS OSS/BSS for NIB-II is
given in figure 4 and the connectivity Architecture of NOC at Bangalore is shown in
figure 5.
BRBRAITT : June-2011 16
―DATA NETWORK‖ FOR JTOs PH-II
It shall be possible to support SLA i.e. the level of service that the customer can
expect together with any penalties to be levied by the service provider for failure to
deliver. It should be possible to provide at least 4 classes of services. The SLA
parameters shall include measurements of service delivery, availability, latency,
throughput and restoration time etc. It should be possible to generate management
reports providing information on customer node configuration and charges, faults and
achievement against the SLAs. It shall be possible to deliver network management
reports via a secure Website.
Implementation of OSS, Messaging, Storage, Billing, EMS & Security Solutions
Messaging
Messaging Solution of NIB-II will provide the SMTP, POP3, IMAP4,
WEBMAIL, WAPMAIL and Notifications services as a Class Of Service to
all the customers of NIB-II and NIB-I
Will support for Country wide roaming for dial up and message store access
through any data center.
The Messaging Server will support Wireless messaging and Directory services
to WAP enabled phones and laptop users
Message store will be content aware to support different types of services to
be created by BSNL ranging from text email to multi-media messaging service
Will provide Family Mailbox where the head of the family can manage
options for Family members. Options will include setting of allowed and block
senders and recipients and control of Anti-SPAM settings.
Messaging solution shall provide flexible control of message aging to define
the conditions under which messages are automatically erased
Web mail interface will support multimedia message types for voice and fax
mail, providing unified messaging interface in future
Message Transfer Agent (MTA) will be designed to handle peak loads without
service degradation or message loss
MTAs will be designed to handle large message queues. There will be
capability available to analyze and manage large message queues generated
due to unreachability of message store (internal) and mail exchangers of other
ISPs (external) or SPAM
Web Hosting
Web space (Data Storage) on servers based on UNIX and Microsoft for
hosting HTML pages with browser
Ftp access for uploading and downloading pages as per the plan. Restriction
on simultaneous ftp sessions
FrontPage etc. access for Web-publishing
Multiple Email Ids per domain with flexible email quota, as per the plan
Web Interface for centralized administration by user and administrators for
services, usage reports, invoice and other reports
It will provide access to customers for analyzing the Web-site performance
through analysis tools
Interface for online registration of domain name
BRBRAITT : June-2011 17
―DATA NETWORK‖ FOR JTOs PH-II
Web Collocation
Necessary Security measures will be implemented both from customer and
BSNL‘s perspective
Billing for this will be done on the basis of usage
One of the service differentiator will be bandwidth on which the server is
collocated.
Security Solution
Anti-Virus solution: It will provide a mechanism to detect unknown virus. The
solution will protect any Gateway and SMTP traffic from virus
Notification: For mails containing repeated complaints regarding abuse from
the same IP address, mail will be sent automatically to the technical contact of
the assignee of that IP address
Network Intrusion detection System: The NIDS will detect unauthorized
internal/external intrusion attempts into the data centers of NIB-II and will
enable to apply appropriate policies on the firewall so as to prevent such
attacks in real time. Suitable alarms will also be sent to the Security Control
Console
Anti Control System: It is provided for Database servers, Messaging Stores,
Web-Hosting Servers and NIDS
Self-protection: Must be able to prevent hackers with root/administrator access
from circumventing or shutting down the security engine
Resource protection: Must allow controlling of access to all system resources
including data files, devices, processes/services and audit files
Rights delegation: Must provide the ability to designate specific users as
administrators, auditors and password managers etc with appropriate rights
Program Controls: Must provide protection against Back Doors and Trojan
Horses
Enterprise Management System
Objective of EMS is to provide a snap-shot graphical view of the health of
NIB-II IT infrastructure as a whole including networking equipment, servers
and services (business and process view)
Reporting system will be able to generate customized reports such as event-
level, performance -level and service-level reports grouped by specific data
fields such as time period, location, customer, series type, device type etc
Security Management will display alarm and events specified by the criteria
such as alarm type, vendor, service, location, source of attack, type of attack
and impacted services
Event Management will capture all the events that are being generated across
the complete IT infrastructure, correlates them and initiate corrective actions
automatically, as defined
System& Application Management will measure the availability and
performance of heterogeneous host systems on a 24x7x365 basis and initiate
preventive and corrective actions automatically
System& Application Management will monitor and manage multiple
attributes (such as status, memory usage, size and resident size, process time,
threads, response time, average throughput and CPU utilization etc) of a
running process and problems and perform restart when processes go down. It
will generate reports on QOS and capacity planning
BRBRAITT : June-2011 18
―DATA NETWORK‖ FOR JTOs PH-II
OSS ARCHITECTURE
Database DB
Rating
ticketing/Help desk
DB
management
Trouble
Order
GL &
others
Enterprise Management
Database
Voucher Management
Fault Management
Service Activation
Network Inventory
Mediation
Database
system
system
Web Portal
Web Portal will be the gateway for customer and CSR based on their
authorizations for accessing various system, services etc
Portal will have an integration, with NMS, EMS and OSS for providing
services to the BSNL‘s customer service representatives (direct, indirect,
helpdesk, supervisor) and account managers
Portal services Ranging from business, process, network, customer specific
maps/views, trouble-ticketing, pre-sales query, post-sales order-booking, order
tracking, trouble –shooting etc
Portal will integrate with components like Service Provisioning, Order
Management, Billing, Customer Care, EMS and Messaging etc. to provide a
unified view of the network and services to the customers and CSRs for all the
front office functions and some back office functions
BRBRAITT : June-2011 19
―DATA NETWORK‖ FOR JTOs PH-II
Order status and history provide both subscribers and the customer service
representatives with sufficient data to fully manage and monitor the service
selection and delivery process
It will be possible to provide a user friendly interface for customers to plan
and schedule their bandwidth for Band width on Demand services
ORDER MANAGEMENT
OM will have
Customer Interface Management
Order Entry and Validation
Workflow Management
BRBRAITT : June-2011 20
―DATA NETWORK‖ FOR JTOs PH-II
DATABASE
Latest Oracle RDBMS will be used with all applications
RDBMS will work in fail over mode over geographical locations
RDBMS will work in a distributed mode across multiple servers
RDBMS will work in a cluster mode
Provisioning will be made for data replication to or from databases of project
1,2.1 and 2.2
BRBRAITT : June-2011 21
―DATA NETWORK‖ FOR JTOs PH-II
Will be able to generate various customized Service Level Reports e.g. Open
Call Reports, closed Call Reports, problem area/ Location Specific Reports
Will have the capability for accepting queries through various sources
including Telephone, email or Web interface
System will check for tickets status and escalation and notify the management
or next level of support staff based on predefined Service Level Agreement
(SLA) which will include criteria like Service application, Severity and
customer etc
It will have bulletin board to allow CSRs, Managers and Customers to post
and review messages about critical issues
It will be possible to track the time spent on specific case
It will be possible to generate work orders for field staff or technicians for
fault repair
Trouble ticketing system will interface with SLA and performance
management systems to account for the period of network or service
unavailability
Trouble ticketing system will be able to extract all incidents, resolution
progress reports and all affected services via its interface with the inventory
system
The trouble tickets will be attached to a work-flow where ever there are
multiple steps required for resolution
It will be possible to include information about the equipment, circuit built up
details etc in the trouble ticket automatically after obtaining the same from
inventory
Will integrate with web-portal for report trouble ticket status
System will allow CSR to check the network fault status as part of problem
investigation
Billing
Billing engine will cater to all the billing requirements of BSNL include Retail
Billing (Prepaid and Postpaid), Wholesale and third party billing, Inter connect
and content billing, Dealers and Agents Commissions etc
Billing system will support the preparation of detailed bill, Differential tariff,
Cross product discounting, Sponsored/split billing. Bundled accounting, Hot
billing/On-demand billing, Hierarchy/ Corporate billing, Discounts &
Promotions, Taxes, Notification system, Dealers and Agent commissions,
Content Billing
Billing system will allow customers the option of receiving complete event
details along with their invoice or view them online through the Web portal.
Provision will also be available for the customer to print the event-details from
the Web portal in a printable format
Content Billing
System will provide BSNL subscribers to access services provided by external
content providers and be able to handle the revenue sharing with the content
provider within the single billing platform
System will allow content providers who do not have their own customer care
and billing system to use the billing system of BSNL
BRBRAITT : June-2011 22
―DATA NETWORK‖ FOR JTOs PH-II
BRBRAITT : June-2011 23
―DATA NETWORK‖ FOR JTOs PH-II
BRBRAITT : June-2011 24
―DATA NETWORK‖ FOR JTOs PH-II
Frame Relay and ATM were the first technologies widely adopted to implement
VPNs. These networks consisted of various devices, belonging to either the customer
or the service provider, that were components of the VPN solution. Generically, the
VPN realm would consist of the following regions:
Customer network— Consisted of the routers at the various customer sites. The
routers connecting individual customers' sites to the service provider network were
called customer edge (CE) routers.
BRBRAITT : June-2011 25
―DATA NETWORK‖ FOR JTOs PH-II
When Frame Relay and ATM provided customers with emulated private networks,
the provider did not participate in customer routing. The service provider was only
responsible for providing the customer with transport of customer data using virtual
point-to-point links. As a result, the service provider would only provide customers
with virtual circuit connectivity at Layer 2; this implementation was referred to as the
Overlay model. If the virtual circuit was permanent or available for use by the
customer at all times, it was called a permanent virtual circuit (PVC). If the circuit
was established by the provider on-demand, it was called a switched virtual circuit
(SVC). The primary drawback of an Overlay model was the full mesh of virtual
circuits between all customer sites for optimal connectivity (except in the case of hub
and spoke or partial hub and spoke deployments). If the number of customer sites was
N, N(N-1)/2 was the total number of circuits that would be necessary for optimal
routing.
BRBRAITT : June-2011 26
―DATA NETWORK‖ FOR JTOs PH-II
The peer-to-peer model was developed to overcome the drawbacks of the Overlay
model and provide customers with optimal data transport via the SP backbone. Hence,
BRBRAITT : June-2011 27
―DATA NETWORK‖ FOR JTOs PH-II
the service provider would actively participate in customer routing. In the peer-to-peer
model, routing information is exchanged between the customer routers and the service
provider routers, and customer data is transported across the service provider's core,
optimally. Customer routing information is carried between routers in the provider
network (P and PE routers) and customer network (CE routers). The peer-to-peer
model, consequently, does not require the creation of virtual circuits. As illustrated in
Figure , the CE routers exchange routes with the connected PE routers in the SP
domain. Customer routing information is propagated across the SP backbone between
PE and P routers and identifies the optimal path from one customer site to another.
BRBRAITT : June-2011 28
―DATA NETWORK‖ FOR JTOs PH-II
The MPLS VPN domain, like the traditional VPN, consists of the customer network
and the provider network. The MPLS VPN model is very similar to the dedicated PE
router model in a peer-to-peer VPN implementation. However, instead of deploying a
dedicated PE router per customer, customer traffic is isolated on the same PE router
that provides connectivity into the service provider's network for multiple customers.
The components of an MPLS VPN shown in Figure are highlighted next.
BRBRAITT : June-2011 29
―DATA NETWORK‖ FOR JTOs PH-II
isolation. In Figure , the provider network consists of the routers PE1, PE2,
P1, P2, P3, and P4.
PE routers, which are routers in the provider network that interface or
connect to the customer edge routers in the customer network. PE1 and PE2
are the provider edge routers in the MPLS VPN domain for customers A and
B in Figure .
P routers, which are routers in the core of the provider network that interface
with either other provider core routers or provider edge routers. Routers P1,
P2, P3, and P4 are the provider routers in Figure .
MPLS VPN Routing Model
An MPLS VPN implementation is very similar to a dedicated router peer-to-peer
model implementation. From a CE router's perspective, only IPv4 updates, as well as
data, are forwarded to the PE router. The CE router does not need any specific
configuration to enable it to be a part of a MPLS VPN domain. The only requirement
on the CE router is a routing protocol (or a static/default route) that enables the router
to exchange IPv4 routing information with the connected PE router.
In the MPLS VPN implementation, the PE router performs multiple functions. The PE
router must first be capable of isolating customer traffic if more than one customer is
connected to the PE router. Each customer, therefore, is assigned an independent
routing table similar to a dedicated PE router in the initial peer-to-peer discussion.
Routing across the SP backbone is performed using a routing process in the global
routing table. P routers provide label switching between provider edge routers and are
unaware of VPN routes. CE routers in the customer network are not aware of the P
routers and, thus, the internal topology of the SP network is transparent to the
customer. Figure depicts the PE router's functionality.
The P routers are only responsible for label switching of packets. They do not carry
VPN routes and do not participate in MPLS VPN routing. The PE routers exchange
IPv4 routes with connected CE routers using individual routing protocol contexts. To
enable scaling the network to large number of customer VPNs, multiprotocol BGP is
configured between PE routers to carry customer routes.
BRBRAITT : June-2011 30
―DATA NETWORK‖ FOR JTOs PH-II
The VRF contains an IP routing table analogous to the global IP routing table, a CEF
table, list of interfaces that are part of the VRF, and a set of rules defining routing
protocol exchange with attached CE routers (routing protocol contexts). In addition,
the VRF also contains VPN identifiers as well as VPN membership information (RD
and RT are covered in the next section). Figure shows the function of a VRF on a PE
router to implement customer routing isolation.
BRBRAITT : June-2011 31
―DATA NETWORK‖ FOR JTOs PH-II
Routing contexts were designed to support isolated copies of the same VPN PE-CE
routing protocols. These routing contexts can be implemented as either separated
processes, as in the case of OSPF, or as multiple instances of the same routing
protocol (in BGP, RIP, etc.). If multiple instances of the same routing protocol are in
use, each instance has its own set of parameters.
Cisco IOS currently supports either RIPv2 (multiple contexts), EIGRP (multiple
contexts), OSPFv2 (multiple processes), and BGPv4 (multiple contexts) as routing
protocols that can be used per VRF to exchange customer routing information
between CE and PE.
Note that the VRF interfaces can be either logical or physical, but each interface can
be assigned to only one VRF.
Route Distinguisher, Route Targets, MP-BGP, and Address Families
In the MPLS VPN routing model, the PE router provides isolation between customers
using VRFs. However, this information needs to be carried between PE routers to
enable data transfer between customer sites via the MPLS VPN backbone. The PE
router must be capable of implementing processes that enable overlapping address
spaces in connected customer networks. The PE router must also learn these routes
from attached customer networks and propagate this information using the shared
provider backbone. This is done by the association of a route distinguisher (RD) per
virtual routing table on a PE router.
BRBRAITT : June-2011 32
―DATA NETWORK‖ FOR JTOs PH-II
The protocol used for exchanging these VPNv4 routes between PE routers is
multiprotocol BGP (MP-BGP). BGP capable of carrying VPNv4 (96-bit) prefixes in
addition to other address families is called MP-BGP. The IGP requirement to
implement iBGP (internal BGP) still holds in the case of an MPLS VPN
implementation. Therefore, the PE router must run an IGP that provides NLRI
information for iBGP if both PE routers are in the same AS. Cisco currently supports
both OSPFv2 and ISIS in the MPLS provider network as the IGP. MP-BGP is also
responsible for assignment of a VPN label. Packet forwarding in an MPLS VPN
mandates that the router specified as the next hop in the incoming BGP update is the
same router that assigns the VPN label. Scalability was a primary reason for the
choice of BGP as the protocol to carry customer routing information. In addition,
BGP enables the use of VPNv4 address in an MPLS VPN router environment that
enables overlapping address ranges with multiple customers.
Route targets (RTs) are additional identifiers used in the MPLS VPN domain in the
deployment of MPLS VPN that identify the VPN membership of the routes learned
from that particular site. RTs are implemented by the use of extended BGP
communities in which the higher order 16 bits of the BGP extended community (64
total bits) are encoded with a value corresponding to the VPN membership of the
specific site. When a VPN route learned from a CE router is injected into VPNv4
BGP, a list of VPN route target extended community attributes is associated with it.
The export route target is used in identification of VPN membership and is associated
to each VRF. This export route target is appended to a customer prefix when it is
converted to a VPNv4 prefix by the PE router and propagated in MP-BGP updates.
BRBRAITT : June-2011 33
―DATA NETWORK‖ FOR JTOs PH-II
The import route target is associated with each VRF and identifies the VPNv4 routes
to be imported into the VRF for the specific customer. The format of a RT is the same
as an RD value. The interaction of RT and RD values in the MPLS VPN domain as
the update is converted to an MP-BGP update is shown in Figure .
When implementing complex VPN topologies, such as extranet VPN, Internet access
VPNs, network management VPN, and so on, using MPLS VPN technology, the RT
plays a pivotal role. A single prefix can be associated to more than one export route
target when propagated across the MPLS VPN network. The RT can, as a result, be
associated to sites that might be a member of more than one VPN.
The following processes occur during route propagation in an MPLS VPN, as shown
in Figure :
Routes learned from connected CE routers CE1-A are redistributed into the MP-
BGP process on PE1-AS1 where the prefix 172.16.10.0/24 is prepended with the
RD value of 1:100 and appended with the route target extended community value
(export RT) of 1:100 prior to sending the VPNv4 prefix as part of the MP-iBGP
update between PE routers.
The VPN label (3 bytes) is assigned for each prefix learned from the connected
CE router's IGP process within a VRF by the PE router's MP-BGP process. MP-
BRBRAITT : June-2011 34
―DATA NETWORK‖ FOR JTOs PH-II
BGP running in the service provider MPLS domain thus carries the VPNv4 prefix
(IPv4 prefix + prepended RD) in addition to the BGP route target extended
community. Note that although the RT is a mandatory configuration in an MPLS
VPN for all VRFs configured on a router, the RT values can be used to
implement complex VPN topologies in which a single site can be a part of more
than one VPN. In addition, RT values can also be used to perform selective route
importing into a VRF when VPNv4 routes are learned in MP-iBGP updates. The
VPN label is only understood by the egress PE (data plane) that is directly
connected to the CE router advertising the prefix. Note that the next hops on PE
routers must not be advertised in the BGP process but must be learned from the
IGP for MPLS VPN implementation. The VPN label has been depicted by the
entries V1 and V2 in Figure .
The MP-BGP update is received by the PE router PE2, and the route is stored in
the appropriate VRF table for Customer A based on the VPN label.
The received MP-BGP routes are redistributed into the VRF PE-CE routing
processes, and the route is propagated to CE2-A.
In addition, other BGP extended community attributes such as site of origin (SoO) can
also be applied to the MP-iBGP update prior to propagation. The SoO attribute is used
to identify the specific site from which the PE learns the route and is used in the
identification and prevention of routing loops. The SoO extended community is a
BGP extended community attribute used to identify routes that have originated from a
site so that the re-advertisement of that prefix back to the source site can be prevented,
thus preventing routing loops. The SoO extended community uniquely identifies the
site from which a PE router has learned a route. SoO enables filtering of traffic based
on the site from which it was originated. SoO filtering manages MPLS VPN traffic
and prevents routing loops from occurring in complex and mixed network topologies
in which the customer sites might possess connectivity across the MPLS VPN
backbone as well as possess backdoor links between sites.
The implementation of a MPLS VPN in which all VPN sites belonging to a customer
can speak to all other sites in the same customer domain is called a simple VPN
implementation or intranet VPN. As mentioned earlier, RTs can be used to implement
complex VPN topologies in which certain sites that are part of one customer's domain
are also accessible by other customers' VPN sites. This implementation is called an
extranet VPN. In addition, variants of extranet VPN, such as network management
VPN as well as central services VPN and Internet access VPN, can also be deployed.
It is important to understand the concept of address families and their place in the
operation of MP-BGP to enable the transport of VPNv4 routes with extended
community attributes. Prior to RFC 2283, "Multiprotocol Extensions for BGP-4,"
BGP version 4 was capable of carrying routing information only pertaining to IPv4.
RFC 2283 defines extensions to BGP-4 that enable BGP-4 to carry information for
multiple network layer protocols. RFC 2283 states that to enable BGP-4 to support
routing for multiple network layer protocols, the additions to BGP-4 must account for
the ability of a particular network layer protocol to be associated with a next hop as
well as the NLRI (network layer reachability information). The two new attributes
that were added to BGP were Multiprotocol Reachable NLRI (MP_REACH_NLRI),
BRBRAITT : June-2011 35
―DATA NETWORK‖ FOR JTOs PH-II
The PE router, in essence, is an Edge LSR and performs all the functions of an Edge
LSR. The PE router requires LDP for label assignment and distribution as well as
forward labeled packets. In addition to the functions of an Edge LSR, the PE
implements a routing protocol (or static routes) with connected CE routers per virtual
routing table and requires MP-BGP to propagate prefixes learned from CE routers as
VPNv4 prefixes in MP-iBGP updates to other PE routers along with the VPN label.
The P router's requirements are to run an IGP (either OSPF or ISIS) as well as have
MPLS enabled to forward labeled packets (data plane) between PE routers. The IGP
is used to provide, as well as propagate, NLRI to connected P and PE routers to
implement an MP-iBGP session between PE routers (control plane). As explained in
Chapters 1 and 2, LDP is run on the P router for label assignment and distribution.
MPLS VPN Control Plane Operation
The control plane in MPLS VPN implementation contains all the Layer 3 routing
information and the processes within to exchange reachability information for a
specific Layer 3 IP prefix in addition to label assignment and distribution using LDP
(as explained in Chapter 1). The data plane performs the functions relating to the
forwarding of both labeled as well as IP packets to the next hop toward a destination
network. Figure outlines the interactions of protocols in the control plane in an MPLS
VPN implementation.
BRBRAITT : June-2011 36
―DATA NETWORK‖ FOR JTOs PH-II
The CE routers are connected to the PE routers, and an IGP, BGP, or static route is
required on the CE routers in conjunction with attached PE routers to gather and
advertise NLRI information. In the MPLS VPN backbone consisting of P and PE
routers, an IGP (usually either OSPF or ISIS) in addition to LDP is used between PE
and P routers. LDP is used for allocation as well as distribution of labels in the MPLS
domain. The IGP is used for NLRI information exchange as well as to map this NLRI
into MP-BGP. MP-BGP sessions are maintained between PE routers in an MPLS
VPN domain and exchange MP-BGP updates consisting of unique VPNv4 addresses
in addition to BGP extended community attributes associated with specific VPNv4
addresses.
BRBRAITT : June-2011 37
―DATA NETWORK‖ FOR JTOs PH-II
The following are the steps for control plane operation in MPLS VPN. The steps are
outlined for prefixes advertised by the CEA-1 router and are shown in Figure :
Step 1. IPv4 update for network 172.16.10.0 is received by the egress PE router
(data plane).
BRBRAITT : June-2011 38
―DATA NETWORK‖ FOR JTOs PH-II
The second label in the stack points toward an outgoing interface whenever the CE
router is the next hop of the VPN route. The second label in the stack points to the
VRF table for aggregate VPN routes, VPN routes pointing to null interface, and
routes for directly connected VPN interfaces. This will be explained in more detail in
the section "MPLS VPN Basic Configuration." P routers perform label switching on
the LDP-assigned label toward the egress PE router. The egress PE router identifies
the VPN label assigned with a VRF (that it has previously assigned) and either
forwards the IP packet toward the CE router or performs another IP lookup in the
VRF table to identify the next hop toward the destination.
Figure depicts the various steps in the data plane forwarding of customer data from
one customer site CE2-A to CE1-A connected using the SP's infrastructure.
When data is forwarded to a specific prefix belonging to a VPN across the MPLS-
enabled core, the top label in the label stack is the only one swapped as the packet
traverses the backbone. The VPN label is kept intact and is removed only in the
egress/downstream PE router. The resulting prefix is associated with an outgoing
interface belonging to a specific VRF on the router depending on the value in the
VPN label.
BRBRAITT : June-2011 39
―DATA NETWORK‖ FOR JTOs PH-II
Here are the steps in the data plane forwarding shown in Figure :
Step 1. CE2-A originates a data packet with the source address of 172.16.20.1 and
destination of 172.16.10.1.
Step 2. PE2-AS1 receives the data packet and appends the VPN label V1 and
Step 3. P2-AS1 receives the data packet destined to 172.16.10.1 and swaps LDP
label L2 with L1.
Step 4. P1-AS1 receives the data packet destined to 172.16.10.1 and pops the top
label because it receives an implicit-null label mapping for
10.10.10.101/32 from PE1-AS1. The resulting labeled packet (with VPN
Label V1) is forwarded to PE1-AS1.
Step 5. PE1-AS1 pops the VPN label and forwards the data packet to CE1-A
where the 172.16.10.0 network is located.
The key to understanding the operation of MPLS VPN is that the VPN label is never
touched until it reaches the egress PE router toward the FEC. All the forwarding of
traffic is done as explained in Chapter 1; the next-hop label mapping to the
downstream PE router's loopback is used to forward the packet (in this case, labeled
IP because of the presence of a VPN label) through the MPLS domain.
MPLS VPN Basic Configuration
This section outlines the generic configurations required on the routers in the service
provider domain to implement MPLS VPN. The configurations of the PE and P
routers will be covered in this section. The subsequent sections in this chapter delve
into each of the configuration blocks on the PE and P routers alone. The
configurations required to implement PE-CE routing sessions are discussed in
Chapters 4 through 6, depending on the PE-CE protocol in use.
All configurations outlined in the following sections are performed in the network
shown in Figure . For simplicity, only connected networks that are part of the VRF
will be redistributed into the MP-BGP processes.
BRBRAITT : June-2011 40
―DATA NETWORK‖ FOR JTOs PH-II
The topology in Figure 3-11 attempts to implement a simple intranet VPN between
two sites belonging to Customer A, site 1 and site 2. The customer network consists
of the CE routers CE1-A and CE2-A. In addition, two loopbacks (loopback 1) on
PE1-AS1 and PE2-AS1 will be configured as part of the VRF CustomerA and be
redistributed into the MP-BGP routing contexts.
Configuration of CE Routers
The configuration of route exchange between PE and CE routers involves the
implementation of a routing protocol (or static/default routes) on the CE routers. No
specific configuration other than the regular routing protocol configuration is required
on the CE routers. On the PE router, VRF routing contexts (or address family
contexts) are required for route exchange between the PE and CE. These routes are
then mutually redistributed with the MP-BGP process per VRF. Configurations for
the above based on protocol choice between PE and CE will be covered in Chapters 4
through 6.
Configuring MPLS Forwarding and VRF Definition on PE Routers
Configuring MPLS forwarding is the first step to provision the service provider's
MPLS VPN backbone. This step ensures the service provider's readiness to provide
MPLS-related services to prospective customers. At a minimum, the steps to
configure MPLS forwarding on PE routers are
BRBRAITT : June-2011 41
―DATA NETWORK‖ FOR JTOs PH-II
These steps have already been discussed in Chapters 1 and 2 and thus have not been
shown.
In this section, we configure VRFs on the PE routers. Figure 3-12 shows the
configuration steps on the PE routers to configure VRF definition.
BRBRAITT : June-2011 42
―DATA NETWORK‖ FOR JTOs PH-II
Step 2. Configure the RD—The RD creates routing and forwarding tables. The
RD is added to the beginning of the customer's IPv4 prefixes to convert
them into globally unique VPNv4 prefixes. Example 3-3 shows the
configuration for defining the RD under the VRF.
Example 3-3. Configuring VRF Parameters: RD
PE1-AS1(config-vrf)#rd 1:100
PE1-AS1(config-vrf)#rd 1:100
RD has to be unique for that particular VRF. No two VRFs on the same
router can have similar RD. Trying to set the same RD on the VRF on the
same router results in the message shown in Example 3-5.
Example 3-5. RD Uniqueness
PE1-AS1(config)#ip vrf CustomerA
PE1-AS1(config-vrf)#rd 1:100
% Cannot set RD, check if it's unique
Step 3. Configure the import and export policy—Configure the import and
export policy for the MP-BGP extended communities. The policy is used
for filtering routes for that particular RT. Example 3-6 provides the
relevant configuration for defining import and export policy.
Example 3-6. Configuring VRF Parameters: RT
PE1-AS1(config-vrf)#route-target both 1:100
BRBRAITT : June-2011 43
―DATA NETWORK‖ FOR JTOs PH-II
Building configuration...
ip vrf CustomerA
rd 1:100
ip vrf CustomerA
rd 1:100
BRBRAITT : June-2011 44
―DATA NETWORK‖ FOR JTOs PH-II
interface Serial1/0
Interface Loopback1
Lo1
The show ip vrf interfaces command provides the listing of interfaces that are
activated for a particular VRF. Example 3-12 shows that Serial1/0 is active for VRF
VRF-Static.
Example 3-12. show ip vrf interfaces on PE1-AS1
PE1-AS1#show ip vrf interfaces
BRBRAITT : June-2011 45
―DATA NETWORK‖ FOR JTOs PH-II
Step 1. Configure BGP routing on PE routers—Enable BGP routing and identify the AS on
the PE1-AS1 and PE2-AS1 routers. Example 3-13 highlights the configuration.
PE1-AS1(config)#router bgp 1
________________________________________________________________
PE2-AS1(config)#router bgp 1
BRBRAITT : June-2011 46
―DATA NETWORK‖ FOR JTOs PH-II
Step 2. Configure the MP-iBGP neighbors—Configure the remote MP-iBGP neighbor and use
the loopback interface as the source of BGP messages and updates. Note that you have to
use the update-source command only when the neighbor is peering to your loopback
address. This is irrespective of whether it is an iBGP or eBGP neighbor. Example 3-14
shows the configuration for the PE1-AS1 and PE2-AS1 router.
____________________________________________________________
Step 3. Configure the VPNv4 address family—Configure the address family for VPNv4 under
the BGP configuration process. This step allows you to enter the VPNv4 address family
to activate the VPNv4 neighbors. Activate the iBGP neighbor, which is essential for
transporting VPNv4 prefixes across the service provider backbone. Using next-hop-self is
optional and is primarily used when the service provider has an eBGP PE-CE routing
with the customers, because internal BGP (iBGP) sessions preserve the next-hop attribute
learned from eBGP peers, which is why it is important to have an internal route to the
next hop. Otherwise, the BGP route is unreachable. To make sure you can reach the
eBGP next hop, include the network that the next hop belongs to in the IGP or use the
next-hop-self neighbor command to force the router to advertise itself, rather than the
external peer, as the next hop.
In addition, configure the propagation of the extended communities with BGP routes so
as to enable RT propagation, which identifies the VPNs that the routes have to be
imported into. The configuration of the VPNv4 address family for PE1-AS1 and PE2-
AS1 is shown in Example 3-15. Note that on some versions of IOS, adding the neighbor
for VPNv4 route exchange using the neighbor ip-address activate command also
automatically adds the neighbor ip-address send-community extended command. If the
neighbor needs to be configured for both standard and extended community exchange,
you will explicitly have to configure the neighbor ip-address send-community both
command under the VPNv4 address family.
PE1-AS1(config-router)#address-family vpnv4
BRBRAITT : June-2011 47
―DATA NETWORK‖ FOR JTOs PH-II
________________________________________________________________________
PE2-AS1(config-router)#address-family vpnv4
Step 4. Configure the IPv4 address family—Configure the peer VRF IPv4 address family
under the BGP configuration process. This step allows you to enter the IPv4 networks
that will be converted to VPNv4 routes in MP-BGP updates. In Chapters 4, 5, and 6, the
individual PE-CE routing protocol interaction configuration involving redistribution of
PE-CE routing protocol contexts or instances will be configured in the IPv4 address
family per VRF under the BGP process. For simplicity, redistribution of all connected
networks is configured into the MP-BGP process. Example 3-16 shows the configuration
on PE1-AS1 and PE2-AS1 routers.
Example 3-16. Configuring BGP per VRF IPv4 Address Family (Routing Context)
PE1-AS1(config-router-af)# exit-address-family
_________________________________________________________
PE2-AS1(config-router-af)# exit-address-family
BGP PE-PE Routing Final Configuration on PE1-AS1 and PE2-AS1 Router
Example 3-17 shows the final BGP PE-PE routing configuration on the PE1-AS1 and
PE2-AS1 router.
Example 3-17. BGP PE-PE Configurations of PE1-AS1 and PE2-AS1 Routers
!PE1-AS1 Router:
router bgp 1
no synchronization
no auto-summary
BRBRAITT : June-2011 48
―DATA NETWORK‖ FOR JTOs PH-II
address-family vpnv4
exit-address-family
redistribute connected
no auto-summary
no synchronization
exit-address-family
_____________________________________________________________________
!PE2-AS1 Router:
router bgp 1
no synchronization
bgp log-neighbor-changes
no auto-summary
address-family vpnv4
exit-address-family
redistribute connected
no auto-summary
no synchronization
exit-address-family
BRBRAITT : June-2011 49
―DATA NETWORK‖ FOR JTOs PH-II
10.10.10.101 4 1 11 11 1 0 0 00:07:16 0
Configuration of P Router
No special configurations need to be performed on the P routers P1-AS1 and P1-AS2
for MPLS VPN support. Because the P routers only participate in MPLS labeled
packet forwarding, the only requirements are those of an LSR in an MPLS network,
namely, IGP for NLRI exchange and LDP for label assignment and distribution. As
always, CEF needs to be enabled on all interfaces configured for MPLS forwarding.
Configuration of the P1-AS1 router is shown in Example 3-19.
interface Serial0/0
BRBRAITT : June-2011 50
―DATA NETWORK‖ FOR JTOs PH-II
mpls ip
interface Serial1/0
mpls ip
Interface loopback0
router ospf 1
The control plane and data plane operation for network 172.16.100.1 as part of VRF
CustomerA is depicted in Figure 3-14. Note that the outgoing label mapped to prefix
172.16.100.1 on PE1-AS1 is aggregate and not untagged. For all networks that are
BRBRAITT : June-2011 51
―DATA NETWORK‖ FOR JTOs PH-II
directly connected to the PE router (like loopbacks or interface IP networks) that are
part of a VRF, the outgoing label mapped in the LFIB is the aggregate label. If,
however, the incoming VPN packet is to be forwarded to a next-hop address (like that
of a connected CE router), the outgoing label mapping is untagged. Thus, aggregate
and untagged labels that were explained in Chapter 1 are encountered in MPLS VPN
implementations.
Outbound Route Filters
When implementing large-scale MPLS VPN networks, sites belonging to different
customers might not be connected to all the PE routers in the MPLS VPN domain.
The PE router in the MPLS VPN network can, therefore, conserve resources by
importing only VPNv4 routes that are to be imported into VRF instances configured
on the PE router. To enable such filtering of VPNv4 route information, the PE router
must be capable of filtering MP-iBGP updates so that information pertaining to these
superfluous routes is not received. The procedure for filtering routes based on the
VRF configuration on the PE routers is called automatic route filtering. Automatic
route filtering is enabled by default on all Cisco routers that are configured as PE
routers. The exception is in the case of a PE router also performing the functions of a
route-reflector. The route-reflector must be capable of receiving routes that might not
be associated to any locally configured VRFs and reflect them to clients. Therefore,
on a PE router functioning as a route-reflector, the automatic route filtering process is
disabled to enable propagation of VPNv4 routes between route-reflector clients.
Outbound route filtering (ORF) enables a PE router to advertise to its peers, outbound
route filters that peering PE routers can use while sending information to a PE router.
The ORF feature on PE routers works in conjunction with the route-refresh BGP
capability. The route-refresh BGP capability enables the PE router to request routing
updates from its MP-iBGP peers after undergoing a configuration change. In the event
of an addition, deletion, or modification of VRFs or their associated configurations on
a PE router, the route-refresh capability enables the PE router to update its routing
tables. The route-refresh feature is enabled by default on all Cisco routers configured
for PE functionality. The ORF entries are exchanged during session establishment
between two PE routers through the use of the BGP OPEN message as part of the
route-refresh message. The format of a route-refresh message is shown in Figure 3-15.
BRBRAITT : June-2011 52
―DATA NETWORK‖ FOR JTOs PH-II
In large networks, the PE router might receive updates and then filter a list of
unwanted routes based on its local inbound route filter. The ORF feature enables a PE
router to push its inbound route filter to a remote peer and apply a filter from a remote
peer as its outbound route filter. ORFs can be either prefix-based or extended-
community based in VPNv4 route filtering. The prefix-based ORF allows a PE to
export and/or receive the inbound route filter information with a peer based on the
prefix associated with the route. In the extended-community based ORF, the PE can
export/receive inbound route filter based on the extended community attributes
associated with a VPNv4 route. Because the RT values are coded as part of the
extended-community attributes in VPNv4 routes, the ORF feature can be used to
advertise a subset of RTs for which the PE router can receive VPNv4 routing
information. This process essentially reduces the burden of superfluous routing
information being propagated in the MP-iBGP backbone as the peering PE router
does not send VPNv4 routes pertaining to the subset of RTs configured as part of the
ORF.
Figure 3-16 shows the operation and sample configuration for implementation of a
prefix-based ORF. PE1-AS1 is configured with an inbound prefix-list that is
propagated using the ORF capability configuration to PE2-AS1. PE2-AS1 will not
accept this filter if the command neighbor 10.10.10.1 capability orf prefix-list
receive is configured under the VPNv4 address-family. The verification of the ORF
application on PE2-AS1 is also illustrated in Figure 3-16 with the output of the show
ip bgp neighbor command. The output of this command depicts the ORF has been
received with two entries. Note that because this ORF applies only to VPNv4 routes
learned from PE2-AS1, this will not affect regular IPv4 route exchanges between
PE1-AS1 and PE2-AS1.
BRBRAITT : June-2011 53
―DATA NETWORK‖ FOR JTOs PH-II
BRBRAITT : June-2011 54
―DATA NETWORK‖ FOR JTOs PH-II
Command Reference
Command Description
BRBRAITT : June-2011 55
―DATA NETWORK‖ FOR JTOs PH-II
Command Description
Router#show ip vrf [brief | detail | interfaces | Displays the set of defined VPN
id] [vrf-name] [output-modifiers] VRFs and associated interfaces.
BRBRAITT : June-2011 56
―DATA NETWORK‖ FOR JTOs PH-II
sophisticated mechanisms for committing resources at each hop; that's why ensuring
a specified QoS is so difficult over an IP network. Two mechanisms have attempting
to solve this problem unsuccessfully.
The Differentiated Services (DiffServ) protocol was defined to enable different levels
of services to be provided across IP networks, Their protocol uses a space in the IP
header to indicate different traffic types and priorities. Routers in the network are able
to look at this information and prioritize traffic accordingly while DiffServ provides
no guarantees. For example, congestion and queuing can increase latency, reduce
available bandwidth, and thereby reduce voice quality. By itself, DiffServ is not
adequate for VoIP.
The alternative has been to over-provision the IP network so that in the absence of
congestion, traffic can be forwarded through the network with minimum latency, jitter
and packet loss. Throwing bandwidth at the problem is certainly not a sustainable
solution fora large-scale network. To deliver IP QoS, embryonic stage intelligence
service layers schemes such as MPLS are in development. With MPLS, service
providers can define specific packet delivery paths for traffic through the IP networks,
rather than allow intermediate routers to make the packet-forwarding decisions.
Conventional packet routing sends traffic along the shortest available path through the
network. By moving traffic flows onto less congested paths, MPLS can better balance
a networks traffic load and overall network response time and throughput.
BRBRAITT : June-2011 57
―DATA NETWORK‖ FOR JTOs PH-II
Multi-Protocol Label Switching (MPLS) solves the QoS issue by setting up explicit
paths through the network. MPLS is a technique that facilitates high-performance
transport of IP traffic across Wide Area Networks. In particular, it marries
connectionless IP technology to connection-oriented technologies like ATM. MPLS
assigns labels to IP flows placing them in IP frames. The frames can then be
transported across packet or cell-based networks and switched on the labels rather
then being routed using IP address lookup. Using MPLS techniques it is possible to
set up explicit routes for data flows that are constrained by path, resource availability
and requested Quality of Service.
The path is defined by the sequence of IP addresses of the nodes to be traversed. All
of the data that constitutes a flow is given the same label (fixed format data field
inserted at the front of each packet) on entry into the MLPS network. At each node
the packet is routed based on the label value and incoming interface and sent on its
way with a new label value on the outgoing interface. The paths are referred to as
label-switched paths (LSP). Since an LSP is a well-defined path through an IP
network, it provides a means for ensuring a specified quality of service where QoS is
provided by the underlying infrastructure. The multi-protocol nature of MPLS means
it can be used to support IP networks over any Layer 2 infrastructure – Asynchronous
Transfer mode (ATM), packetover-SONET, Gigabit Ethernet, frame relay, etc.
BRBRAITT : June-2011 58
―DATA NETWORK‖ FOR JTOs PH-II
MPLS-VPN Lab
2. Type ‗‘cmd‘‘ in the command window and press ok to get C:\> (Command
Prompt)
3. Enter the telnet command as shown in the following table against your Router.
Eg. to access PE-3 Router:
C:\> telnet 210.212.90.11 2007
PE-3>
4. Enter the enable command and the enable password as shown in the following
table
PE-3>enable
Password:xxxxx
PE-3#
BRBRAITT : June-2011 59
―DATA NETWORK‖ FOR JTOs PH-II
Password:xxxxx
P-1>en
Password:xxxxx
P-1# conf t
P-1(config)#hostname Kolkata-PE
Kolkata-PE(config)#interface GigabitEthernet2/2
Kolkata-PE(config-if)#no shut
Kolkata-PE(config-if)#end
Kolkata-PE#write memory
Building configuration...
[OK]
Kolkata-PE#
Password:xxxxx
P-1>en
Password:xxxxx
P-1# conf t
P-1(config)#hostname PUNE-PE
PUNE-PE(config)#interface GigabitEthernet2/2
BRBRAITT : June-2011 60
―DATA NETWORK‖ FOR JTOs PH-II
PUNE-PE(config-if)#no shut
PUNE-PE(config-if)#end
PUNE-PE#write memory
Building configuration...
[OK]
PUNE-PE#
YDERABAD (Old hostname: P-3) Preliminary configuration
User Access Verification
Password:xxxxx
P-2>en
Password:xxxxx
P-2# conf t
P-2(config)#hostname HYDERABAD
HYDERABAD(config)#interface GigabitEthernet2/2
HYDERABAD(config-if)# no shutdown
HYDERABAD(config-if)#end
HYDERABAD#write memory
Building configuration...
[OK]
HYDERABAD#
Password:xxxxx
P-2>en
Password:xxxxx
BRBRAITT : June-2011 61
―DATA NETWORK‖ FOR JTOs PH-II
P-2# conf t
P-2(config)#hostname BANGALORE
BANGALORE(config)#interface GigabitEthernet2/2
BANGALORE(config-if)#no shutdown
BANGALORE(config-if)#end
BANGALORE#write memory
Building configuration...
[OK]
BANGALORE#
GUWAHATI (Old hostname: PE-1) Preliminary configuration
User Access Verification
Password:xxxxx
PE-1>en
Password:xxxxx
PE-1# conf t
PE-1(config)#hostname GUWAHATI
GUWAHATI(config)#interface GigabitEthernet3/1
GUWAHATI(config-if)#no shutdown
GUWAHATI(config-if)#interface GigabitEthernet2/2
GUWAHATI(config-if)# no shutdown
GUWAHATI(config-if)# end
GUWAHATI#write memory
BRBRAITT : June-2011 62
―DATA NETWORK‖ FOR JTOs PH-II
Building configuration...
[OK]
GUWAHATI#
AHMEDABAD (Old hostname: PE-2) Preliminary configuration
User Access Verification
Password:xxxxx
PE-1>en
Password:xxxxx
PE-1# conf t
PE-1(config)#hostname AHMEDABAD
AHMEDABAD(config)#interface GigabitEthernet3/1
AHMEDABAD(config-if)#no shutdown
AHMEDABAD(config-if)#interface GigabitEthernet2/2
AHMEDABAD(config-if)# no shutdown
AHMEDABAD(config-if)# end
AHMEDABAD#write memory
Building configuration...
[OK]
AHMEDABAD#
BRBRAITT : June-2011 63
―DATA NETWORK‖ FOR JTOs PH-II
Password:xxxxx
PE-2>en
Password:xxxxx
PE-2# conf t
PE-2(config)#hostname CHENNAI
CHENNAI(config)#controller e1 4/0/0
CHENNAI(config- controller)#exit
CHENNAI(config-if)# no shutdown
CHENNAI#write memory
Building configuration...
[OK]
CHENNAI#
Password:xxxxx
PE-2>en
Password:xxxxx
PE-2# conf t
PE-2(config)#hostname TRIVANDRUM
BRBRAITT : June-2011 64
―DATA NETWORK‖ FOR JTOs PH-II
TRIVANDRUM(config)#controller e1 4/0/0
TRIVANDRUM(config- controller)#exit
TRIVANDRUM(config-if)# no shutdown
TRIVANDRUM#write memory
Building configuration...
[OK]
TRIVANDRUM#
Password:xxxxx
P-3>en
Password:xxxxx
P-3# conf t
DELHI-P(config-if)# no shutdown
DELHI-P(config-if)# no shutdown
DELHI-P(config-if)# no shutdown
BRBRAITT : June-2011 65
―DATA NETWORK‖ FOR JTOs PH-II
DELHI-P(config-if)# no shutdown
DELHI-P(config-if)#end
DELHI-P#wr
Building configuration...
[OK]
DELHI-P#
Password:xxxxx
P-3>en
Password:xxxxx
P-3# conf t
MUMBAI-P(config-if)# no shutdown
MUMBAI-P(config-if)# no shutdown
MUMBAI-P(config-if)# no shutdown
BRBRAITT : June-2011 66
―DATA NETWORK‖ FOR JTOs PH-II
MUMBAI-P(config-if)#end
MUMBAI-P#wr
Building configuration...
[OK]
MUMBAI-P#
BRBRAITT : June-2011 67
―DATA NETWORK‖ FOR JTOs PH-II
Password:xxxxx
DELHI-P >en
Password:xxxxx
DELHI-P # conf t
DELHI-P (config-router)#exit
DELHI-P (config)#
DELHI-P(config)#mpls ip
DELHI-P(config-if)# mpls ip
BRBRAITT : June-2011 68
―DATA NETWORK‖ FOR JTOs PH-II
DELHI-P(config-if)# mpls ip
DELHI-P(config-if)# mpls ip
DELHI-P(config-if)# mpls ip
DELHI-P(config-if)#end
DELHI-P#wr
Building configuration...
[OK]
DELHI-P#
MUMBAI-P
Password:xxxxx
MUMBAI-P >en
Password:xxxxx
MUMBAI-P # conf t
BRBRAITT : June-2011 69
―DATA NETWORK‖ FOR JTOs PH-II
MUMBAI-P (config-router)#exit
MUMBAI-P (config)#
MUMBAI-P(config)#mpls ip
MUMBAI-P(config-if)# mpls ip
MUMBAI-P(config-if)# mpls ip
MUMBAI-P(config-if)# mpls ip
MUMBAI-P(config-if)# mpls ip
MUMBAI-P(config-if)#end
MUMBAI-P#wr
Building configuration...
[OK]
MUMBAI-P#
KOLKATA-PE
BRBRAITT : June-2011 70
―DATA NETWORK‖ FOR JTOs PH-II
Password:xxxxx
KOLKATA-PE >en
Password:xxxxx
KOLKATA-PE # conf t
KOLKATA-PE (config-router)#exit
KOLKATA-PE (config)#
Configuring/saving MPLS/Cisco Express Forwarding(cef) on all interfaces:-
KOLKATA-PE(config)# ip cef distributed
KOLKATA-PE(config)#mpls ip
KOLKATA-PE(config-if)# mpls ip
KOLKATA-PE(config-if)# mpls ip
BRBRAITT : June-2011 71
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE(config-if)# mpls ip
KOLKATA-PE(config-if)# mpls ip
KOLKATA-PE(config-if)#end
KOLKATA-PE#wr
Building configuration...
[OK]
KOLKATA-PE#
PUNE-PE
Password:xxxxx
PUNE-PE >en
Password:xxxxx
PUNE-PE # conf t
BRBRAITT : June-2011 72
―DATA NETWORK‖ FOR JTOs PH-II
PUNE-PE (config-router)#exit
PUNE-PE (config)#
Configuring/saving MPLS/Cisco Express Forwarding(cef) on all interfaces:-
PUNE-PE(config)#mpls ip
PUNE-PE(config-if)# mpls ip
PUNE-PE(config-if)# mpls ip
PUNE-PE(config-if)# mpls ip
PUNE-PE(config-if)# mpls ip
PUNE-PE(config-if)#end
PUNE-PE#wr
Building configuration...
[OK]
PUNE-PE#
GUWAHATI
User Access Verification
Password:xxxxx
GUWAHATI >en
BRBRAITT : June-2011 73
―DATA NETWORK‖ FOR JTOs PH-II
Password:xxxxx
GUWAHATI # conf t
GUWAHATI (config-router)#exit
GUWAHATI (config)#
Configuring/saving MPLS/Cisco Express Forwarding(cef) on all interfaces:-
GUWAHATI(config)# ip cef distributed
GUWAHATI(config)#mpls ip
GUWAHATI(config-if)# mpls ip
GUWAHATI(config-if)# mpls ip
GUWAHATI(config-if)# mpls ip
GUWAHATI(config-if)#end
GUWAHATI#wr
BRBRAITT : June-2011 74
―DATA NETWORK‖ FOR JTOs PH-II
Building configuration...
[OK]
GUWAHATI#
AHMEDABAD
User Access Verification
Password:xxxxx
AHMEDABAD >en
Password:xxxxx
AHMEDABAD # conf t
AHMEDABAD (config-router)#exit
AHMEDABAD (config)#
Configuring/saving MPLS/Cisco Express Forwarding(cef) on all interfaces:-
AHMEDABAD(config)#mpls ip
AHMEDABAD(config-if)# mpls ip
BRBRAITT : June-2011 75
―DATA NETWORK‖ FOR JTOs PH-II
AHMEDABAD(config-if)# mpls ip
AHMEDABAD(config-if)# mpls ip
AHMEDABAD(config-if)#end
AHMEDABAD#wr
Building configuration...
[OK]
AHMEDABAD#
HYDERABAD
Password:xxxxx
HYDERABAD >en
Password:xxxxx
HYDERABAD # conf t
BRBRAITT : June-2011 76
―DATA NETWORK‖ FOR JTOs PH-II
HYDERABAD (config-router)#exit
HYDERABAD (config)#
HYDERABAD(config)#mpls ip
HYDERABAD(config-if)# mpls ip
HYDERABAD(config-if)# mpls ip
HYDERABAD(config-if)# mpls ip
HYDERABAD(config-if)# mpls ip
HYDERABAD(config-if)#end
HYDERABAD#wr
Building configuration...
[OK]
HYDERABAD#
BANGALORE
User Access Verification
Password:xxxxx
BRBRAITT : June-2011 77
―DATA NETWORK‖ FOR JTOs PH-II
BANGALORE >en
Password:xxxxx
BANGALORE # conf t
BANGALORE (config-router)#exit
BANGALORE (config)#
BANGALORE(config)#mpls ip
BANGALORE(config-if)# mpls ip
BANGALORE(config-if)# mpls ip
BANGALORE(config-if)# mpls ip
BRBRAITT : June-2011 78
―DATA NETWORK‖ FOR JTOs PH-II
BANGALORE(config-if)# mpls ip
BANGALORE(config-if)#end
BANGALORE#wr
Building configuration...
[OK]
BANGALORE#
CHENNAI-PE
Password:xxxxx
CHENNAI-PE >en
Password:xxxxx
CHENNAI-PE # conf t
CHENNAI-PE (config-router)#exit
CHENNAI-PE (config)#
BRBRAITT : June-2011 79
―DATA NETWORK‖ FOR JTOs PH-II
CHENNAI-PE(config)#mpls ip
CHENNAI-PE(config-if)# mpls ip
CHENNAI-PE(config-if)# mpls ip
CHENNAI-PE(config-if)#end
CHENNAI-PE#wr
Building configuration...
[OK]
CHENNAI-PE#
TRIVANDRUM
Password:xxxxx
TRIVANDRUM >en
Password:xxxxx
TRIVANDRUM # conf t
BRBRAITT : June-2011 80
―DATA NETWORK‖ FOR JTOs PH-II
TRIVANDRUM (config-router)#exit
TRIVANDRUM (config)#
TRIVANDRUM(config)#mpls ip
TRIVANDRUM(config-if)# mpls ip
TRIVANDRUM(config-if)# mpls ip
TRIVANDRUM(config-if)#end
TRIVANDRUM#wr
Building configuration...
[OK]
TRIVANDRUM#
BRBRAITT : June-2011 81
―DATA NETWORK‖ FOR JTOs PH-II
DELHI-P
Global Configuration Commands on all MPLS-TE Routers:
DELHI-P#conf t
DELHI-P(config- router)#end
DELHI-P#wr
Building configuration...
[OK]
DELHI-P#
MUMBAI-P
MUMBAI-P#conf t
BRBRAITT : June-2011 82
―DATA NETWORK‖ FOR JTOs PH-II
MUMBAI-P(config- router)#end
MUMBAI-P#wr
Building configuration...
[OK]
MUMBAI-P#
KOLKATA-PE
KOLKATA-PE#conf t
BRBRAITT : June-2011 83
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE(chg-ip-expl-path)#next-address 172.16.16.13
KOLKATA-PE(chg-ip-expl-path)#next-address 172.16.16.9
KOLKATA-PE(chg-ip-expl-path)#next-address 172.16.16.5
KOLKATA-PE(chg-ip-expl-path)#end
KOLKATA-PE#wr
PUNE-PE
PUNE-PE#conf t
BRBRAITT : June-2011 84
―DATA NETWORK‖ FOR JTOs PH-II
PUNE-PE(chg-ip-expl-path)#next-address 172.16.16.6
PUNE-PE(chg-ip-expl-path)#next-address 172.16.16.10
PUNE-PE(chg-ip-expl-path)#next-address 172.16.16.14
PUNE-PE(chg-ip-expl-path)#end
BRBRAITT : June-2011 85
―DATA NETWORK‖ FOR JTOs PH-II
PUNE-PE#wr
HYDERABAD
HYDERABAD#conf t
BRBRAITT : June-2011 86
―DATA NETWORK‖ FOR JTOs PH-II
HYDERABAD(chg-ip-expl-path)#next-address 172.16.16.14
HYDERABAD(chg-ip-expl-path)#next-address 172.16.16.45
HYDERABAD(chg-ip-expl-path)#next-address 172.16.16.42
HYDERABAD(chg-ip-expl-path)#next-address 172.16.16.50
HYDERABAD(chg-ip-expl-path)#next-address 172.16.16.6
HYDERABAD(chg-ip-expl-path)#end
HYDERABAD#wr
BANGALORE
BANGALORE#conf t
BRBRAITT : June-2011 87
―DATA NETWORK‖ FOR JTOs PH-II
BANGALORE(chg-ip-expl-path)#next-address 172.16.16.5
BANGALORE(chg-ip-expl-path)#next-address 172.16.16.49
BANGALORE(chg-ip-expl-path)#next-address 172.16.16.41
BANGALORE(chg-ip-expl-path)#next-address 172.16.16.46
BANGALORE(chg-ip-expl-path)#next-address 172.16.16.13
BANGALORE(chg-ip-expl-path)#end
BANGALORE#wr
CHENNAI-PE
No Configuration
TRIVANDRUM
No Configuration
BRBRAITT : June-2011 88
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE(config)#interface tunnel 2
KOLKATA-PE(config-if)#end
KOLKATA-PE#wr
PUNE-PE
PUNE-PE#conf t
PUNE-PE(config)#interface tunnel 2
HYDERABAD(config)#interface tunnel 1
BANGALORE#conf t
BANGALORE(config)#interface tunnel 1
BRBRAITT : June-2011 89
―DATA NETWORK‖ FOR JTOs PH-II
AHMEDABAD
AHMEDABAD#conf t
AHMEDABAD(config)#interface tunnel 1
BRBRAITT : June-2011 90
―DATA NETWORK‖ FOR JTOs PH-II
AHMEDABAD(config)#interface tunnel 2
AHMEDABAD(config)#interface tunnel 3
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.21
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.1
BRBRAITT : June-2011 91
―DATA NETWORK‖ FOR JTOs PH-II
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.18
AHMEDABAD(chg-ip-expl-path)#exit
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.57
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.41
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.46
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.18
AHMEDABAD(chg-ip-expl-path)#exit
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.21
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.49
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.41
AHMEDABAD(chg-ip-expl-path)#next-address 172.16.16.54
AHMEDABAD(chg-ip-expl-path)#end
AHMEDABAD#wr
GUWAHATI
GUWAHATI#conf t
BRBRAITT : June-2011 92
―DATA NETWORK‖ FOR JTOs PH-II
GUWAHATI(config)#interface tunnel 1
GUWAHATI(config)#interface tunnel 2
BRBRAITT : June-2011 93
―DATA NETWORK‖ FOR JTOs PH-II
GUWAHATI(config)#interface tunnel 3
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.17
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.2
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.22
GUWAHATI(chg-ip-expl-path)#exit
GUWAHATI(config)#ipexplicitpathname
NODE_PROTECTION_FOR_KOLKATA
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.53
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.42
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.50
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.22
GUWAHATI(chg-ip-expl-path)#exit
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.17
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.45
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.42
GUWAHATI(chg-ip-expl-path)#next-address 172.16.16.58
BRBRAITT : June-2011 94
―DATA NETWORK‖ FOR JTOs PH-II
GUWAHATI(chg-ip-expl-path)#end
GUWAHATI#wr
PUNE-PE
PUNE-PE(config-if)#end
PUNE-PE#wr
KOLKATA-PE
KOLKATA-PE(config-if)#end
KOLKATA-PE#wr
BRBRAITT : June-2011 95
―DATA NETWORK‖ FOR JTOs PH-II
DELHI-P:
Enabling & disabling interfaces:-
DELHI-P(config)#int gi 7/1/1
DELHI-P(config-if)#no shut
DELHI-P(config-if)#int gi 7/1/0
DELHI-P(config-if)#shut
DELHI-P#conf t
DELHI-P(config-router)#passive-interface loopback 0
DELHI-P(config-router)#end
DELHI-P#write memory
Building configuration...
[OK]
DELHI-P#
BRBRAITT : June-2011 96
―DATA NETWORK‖ FOR JTOs PH-II
MUMBAI-P:
MUMBAI-P(config-if)#int gi 7/1/0
MUMBAI-P(config-if)#shut
MUMBAI-P#conf t
MUMBAI-P(config-router)#passive-interface loopback 0
MUMBAI-P(config-router)#end
MUMBAI-P#write memory
Building configuration...
[OK]
MUMBAI-P#
BRBRAITT : June-2011 97
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE (config-if)#shut
KOLKATA-PE#conf t
KOLKATA-PE(config-router)#passive-interface loopback 0
KOLKATA-PE(config-router)#exit
KOLKATA-PE(config)#
KOLKATA-PE(config)#interface GigabitEthernet2/1
KOLKATA-PE(config-if)#no mpls ip
KOLKATA-PE(config-if)#exit
KOLKATA-PE(config-if)#no mpls ip
KOLKATA-PE(config-if)#end
BRBRAITT : June-2011 98
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE#write memory
Building configuration...
[OK]
KOLKATA-PE#
Creation of VPN (vrf-table) and assigning Route-distinquisher/Route-target:-
KOLKATA-PE#conf t
KOLKATA-PE(config-vrf)#rd 9829:1
KOLKATA-PE(config-vrf)#exit
KOLKATA-PE(config-vrf)#rd 9829:2
KOLKATA-PE(config-vrf)#exit
KOLKATA-PE(config)#
KOLKATA-PE(config-if)#exit
BRBRAITT : June-2011 99
―DATA NETWORK‖ FOR JTOs PH-II
KOLKATA-PE(config-if)#end
KOLKATA-PE#write memory
Building configuration...
[OK]
KOLKATA-PE#
Configuring MP-BGP
KOLKATA-PE#conf t
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router)#address-family vpnv4
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router)#no synchronization
KOLKATA-PE(config-router)#no auto-summary
KOLKATA-PE(config-router)#end
KOLKATA-PE#wr
Building configuration...
[OK]
KOLKATA-PE#
PUNE-PE (config-c0ntroller)#exit
PUNE-PE (config-if)#shut
PUNE-PE (config-if)#shut
PUNE-PE#conf t
PUNE-PE(config-router)#passive-interface loopback 0
PUNE-PE(config-router)#exit
PUNE-PE(config)#
PUNE-PE(config-if)#no mpls ip
PUNE-PE(config-if)#end
PUNE-PE#write memory
Building configuration...
[OK]
PUNE-PE#
PUNE-PE#conf t
PUNE-PE(config-vrf)#rd 9829:1
PUNE-PE(config-vrf)#exit
PUNE-PE(config-vrf)#rd 9829:2
PUNE-PE(config-vrf)#exit
PUNE-PE(config)#
PUNE-PE(config-if)#exit
PUNE-PE(config-if)#end
PUNE-PE#write memory
Building configuration...
[OK]
PUNE-PE#
Configuring MP-BGP
PUNE-PE#conf t
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router)#address-family vpnv4
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router)#no synchronization
PUNE-PE(config-router)#no auto-summary
PUNE-PE(config-router)#end
PUNE-PE#wr
Building configuration...
[OK]
PUNE-PE#
CHENNAI-PE:
CHENNAI-PE (config-if)#shut
CHENNAI-PE#conf t
CHENNAI-PE(config-router)#passive-interface loopback 0
CHENNAI-PE(config-router)#exit
CHENNAI-PE(config)#
CHENNAI-PE(config)#interface GigabitEthernet2/1
CHENNAI-PE(config-if)#no mpls ip
CHENNAI-PE(config-if)#exit
CHENNAI-PE#conf t
CHENNAI-PE(config-vrf)#rd 9829:1
CHENNAI-PE(config-vrf)#exit
CHENNAI-PE(config)#
CHENNAI-PE(config-if)#end
CHENNAI-PE#write memory
Building configuration...
[OK]
CHENNAI-PE#
Configuring MP-BGP
CHENNAI-PE#conf t
CHENNAI-PE(config-router-af)#exit-address-family
CHENNAI-PE(config-router)#address-family vpnv4
CHENNAI-PE(config-router-af)#exit-address-family
CHENNAI-PE(config-router)#no synchronization
CHENNAI-PE(config-router)#no auto-summary
CHENNAI-PE(config-router)#end
CHENNAI-PE#wr
Building configuration...
[OK]
CHENNAI-PE#
IBM-CE-1 (config-c0ntroller)#exit
IBM-CE-1 (config-if)#shut
IBM-CE-1 (config-if)#exit
IBM-CE-1# conf t
IBM-CE-1(config)#
IBM-CE-1# conf t
IBM-CE-1(config)#interface loopback 1
IBM-CE-1(config-if)#exit
IBM-CE-1(config)#router bgp 10
IBM-CE-1(config-router)#no synchronization
IBM-CE-1(config-router)#no auto-summary
IBM-CE-1(config-router)#end
IBM-PE#write memory
Building configuration...
[OK]
IBM-CE-1#
IBM-CE-2 (config-if)#shut
IBM-CE-2# conf t
IBM-CE-2(config)#
IBM-CE-2# conf t
IBM-CE-2(config)#interface loopback 1
IBM-CE-2(config-if)#exit
IBM-CE-2(config)#router bgp 20
IBM-CE-2(config-router)#no synchronization
IBM-CE-2(config-router)#no auto-summary
IBM-CE-2(config-router)#end
IBM-PE#write memory
Building configuration...
[OK]
IBM-CE-2#
IBM-CE-3 (config-c0ntroller)#exit
IBM-CE-3 (config-if)#exit
IBM-CE-3# conf t
IBM-CE-3(config)#
IBM-CE-3# conf t
IBM-CE-3(config)#interface loopback 1
IBM-CE-3(config-if)#exit
IBM-CE-3(config)#router bgp 30
IBM-CE-3(config-router)#no synchronization
IBM-CE-3(config-router)#no auto-summary
IBM-CE-3(config-router)#end
IBM-PE#write memory
Building configuration...
[OK]
IBM-CE-3#
SUN-CE-1# conf t
SUN-CE-1(config)#
SUN-CE-1(config)#no mpls ip
SUN-CE-1(config-if)#no mpls ip
SUN-CE-1(config-if)#end
SUN-PE#write memory
Building configuration...
[OK]
SUN-CE-1#
SUN-CE-1# conf t
SUN-CE-1(config)#interface loopback 1
SUN-CE-1(config-if)#no shutdown
SUN-CE-1(config-if)#exit
SUN-CE-1(config)#router bgp 40
SUN-CE-1(config-router)#no synchronization
SUN-CE-1(config-router)#no auto-summary
SUN-CE-1(config-router)#end
SUN-PE#write memory
Building configuration...
[OK]
SUN-CE-1#
SUN-CE-2# conf t
SUN-CE-2(config)#
SUN-CE-2(config)#controller e1 4/0/0
SUN-CE-2(config-controller)#exit
SUN-CE-2(config)#no mpls ip
SUN-CE-2(config)#interface GigabitEthernet2/1
SUN-CE-2(config-if)#no mpls ip
SUN-CE-2(config-if)#end
SUN-CE-2#write memory
Building configuration...
[OK]
SUN-CE-2#
SUN-CE-2# conf t
SUN-CE-2(config)#interface loopback 1
SUN-CE-2(config-if)#no shutdown
SUN-CE-2(config-if)#exit
SUN-CE-2(config)#router bgp 50
SUN-CE-2(config-router)#no synchronization
SUN-CE-2(config-router)#no auto-summary
SUN-CE-2(config-router)#end
SUN-PE#write memory
Building configuration...
[OK]
SUN-CE-2#
Verification commands:-
PUNE-PE#show ip vrf
Delhi-P:
Mumbai-P:
PUNE-PE:
PUNE-PE# conf t
PUNE-PE(config-router)#exit
PUNE-PE(config)#
PUNE-PE(config-router)#exit
PUNE-PE(config)#
PUNE-PE#conf t
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router)#end
PUNE-PE#wr
Building configuration...
[OK]
PUNE-PE#
KOLKATA-PE:
KOLKATA-PE# conf t
KOLKATA-PE(config-router)#exit
KOLKATA-PE(config)#
KOLKATA-PE(config-router)#exit
KOLKATA-PE(config)#
KOLKATA-PE#conf t
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router)#end
KOLKATA-PE#wr
Building configuration...
[OK]
KOLKATA-PE#
CHENNAI-PE:
CHENNAI-PE# conf t
CHENNAI-PE(config-router)#exit
CHENNAI-PE(config)#
CHENNAI-PE#conf t
CHENNAI-PE(config-router-af)#exit-address-family
CHENNAI-PE(config-router)#end
CHENNAI-PE#wr
Building configuration...
[OK]
CHENNAI-PE#
IBM-CE-1# conf t
IBM-CE-1(config)#router ospf 10
IBM-CE-1(config-router)#passive-interface loopback 1
IBM-CE-1(config-router)#end
IBM-CE-1#write memory
Building configuration...
[OK]
IBM-CE-1#
IBM-CE-2# conf t
IBM-CE-2(config)#router ospf 20
IBM-CE-2(config-router)#passive-interface loopback 1
IBM-CE-2(config-router)#end
IBM-CE-2#write memory
Building configuration...
[OK]
IBM-CE-2#
IBM-CE-3# conf t
IBM-CE-3(config)#router ospf 30
IBM-CE-3(config-router)#passive-interface loopback 1
IBM-CE-3(config-router)#end
IBM-CE-3#write memory
Building configuration...
[OK]
IBM-CE-2#
SUN-CE-1# conf t
SUN-CE-1(config)#router ospf 40
SUN-CE-1(config-router)#passive-interface loopback 1
SUN-CE-1(config-router)#end
SUN-CE-1#write memory
Building configuration...
[OK]
SUN-CE-1#
SUN-CE-2# conf t
SUN-CE-2(config)#router ospf 50
SUN-CE-2(config-router)#passive-interface loopback 1
SUN-CE-2(config-router)#end
SUN-CE-2#write memory
Building configuration...
[OK]
SUN-CE-2#
SUN-CE-2#
Delhi-P:
Mumbai-P:
PUNE-PE:
PUNE-PE (config)#
PUNE-PE#conf t
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router)#end
PUNE-PE#wr
Building configuration...
[OK]
PUNE-PE#
KOLKATA-PE:
KOLKATA-PE (config)#
KOLKATA-PE#conf t
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router-af)#exit-address-family
KOLKATA-PE(config-router)#end
KOLKATA-PE#wr
Building configuration...
[OK]
KOLKATA-PE#
PUNE-PE:
PUNE-PE (config)#
PUNE-PE#conf t
PUNE-PE(config-router-af)#exit-address-family
PUNE-PE(config-router)#end
PUNE-PE#wr
Building configuration...
[OK]
PUNE-PE#
IBM-CE-1 :
Removing OSPF & Configuring Default route:-
IBM-CE-1# conf t
IBM-CE-1(config)#end
IBM-CE-1#write memory
Building configuration...
[OK]
IBM-CE-1#
IBM-CE-2 :
IBM-CE-2# conf t
IBM-CE-2(config)#end
IBM-CE-2#write memory
Building configuration...
[OK]
IBM-CE-2#
IBM-CE-3 :
IBM-CE-3# conf t
IBM-CE-3(config)#end
IBM-CE-3#write memory
Building configuration...
[OK]
IBM-CE-2#
SUN-CE-1 :
SUN-CE-1# conf t
SUN-CE-1(config)#end
SUN-CE-1#write memory
Building configuration...
[OK]
SUN-CE-1#
SUN-CE-2 :
SUN-CE-2# conf t
SUN-CE-2(config)#end
SUN-CE-2#write memory
Building configuration...
[OK]
SUN-CE-2#
Delhi-P:
Mumbai-P :
Chennai-PE:
CHENNAI-PE#conf t
CHENNAI-PE(config-if)#no shut
CHENNAI-PE(config-if)#encapsulation ppp
CHENNAI -PE(config-if)#mpls ip
CHENNAI-PE(config-if)#exit
CHENNAI-PE(config)#
CHENNAI-PE(config)#frame-relay switching
CHENNAI-PE(config-if)#exit
CHENNAI-PE(config)#
CHENNAI-PE(config-psw-)#end
CHENNAI-PE#wr
PUNE-PE:
PUNE-PE(config)#frame-relay switching
PUNE-PE(config-if)#no ip address
PUNE-PE(config-if)#exit
PUNE-PE(config)#
PUNE-PE(config-psw-)#end
PUNE-PE#wr
PUNE-PE(config-if)#no shut
PUNE-PE(config-if)#no ip add
PUNE-PE(config-if)#end
PUNE-PE#wr
KOLKATA-PE:
KOLKATA-PE(config-if)#no shut
KOLKATA-PE(config-if)#no ip add
KOLKATA-PE(config-if)#end
KOLKATA-PE#wr
IBM-CE-1 :
IBM-CE-1(config)#frame-relay switching
IBM-CE-1 (config-if)#exit
IBM-CE-1 (config-if)#end
IBM-CE-1#wr
IBM-CE-2 :
IBM-CE-1(config)#frame-relay switching
IBM-CE-1 (config-if)#exit
IBM-CE-1 (config-if)#end
IBM-CE-1#wr
SUN-CE-1 :
SUN-CE-1 (config-if)#end
SUN-CE-1#wr
SUN-CE-2 :
SUN-CE-2 (config-if)#end
SUN-CE-2 #wr
Delhi-P:
DELHI-P#conf t
DELHI-P(config)#mpls ip
DELHI-P(config-if)#int gi 7/0/0
DELHI-P(config-if)#mpls ip
DELHI-P(config-if)#int gi 7/0/1
DELHI-P(config-if)#no mpls ip
DELHI-P(config-if)#exit
DELHI-P(config)#rd 9829:1
DELHI-P(config)#route-target 9829:1
DELHI-P(config)#exit
DELHI-P(config)#int gi 7/0/1
DELHI-P(config-if)#exit
DELHI-P(config-router)#exit
DELHI-P(config-router-af)#address-family vpnv4
DELHI-P(config-router-af)#end
DELHI-P# wr
Mumbai-P :
MUMBAI-P#conf t
MUMBAI-P(config)#mpls ip
MUMBAI-P(config-if)#int gi 7/0/0
MUMBAI-P(config-if)#mpls ip
MUMBAI-P(config-if)#int gi 7/0/1
MUMBAI-P(config-if)#no mpls ip
MUMBAI-P(config-if)#exit
MUMBAI-P(config)#rd 9829:1
MUMBAI-P(config)#route-target 9829:1
MUMBAI-P(config)#exit
MUMBAI-P(config)#int gi 7/0/1
MUMBAI-P(config-if)#exit
MUMBAI-P(config-router)#exit
MUMBAI-P(config-router-af)#address-family vpnv4
MUMBAI-P(config-router-af)#end
MUMBAI-P# wr
KOLKATA-PE:
KOLKATA-PE#conf t
KOLKATA-PE(config)#mpls ip
KOLKATA-PE(config-if)#int gi 2/1
KOLKATA-PE(config-if)#mpls ip
KOLKATA-PE(config-if)#no shut
KOLKATA-PE(config-if)#int gi 2/2
KOLKATA-PE(config-if)#no shut
KOLKATA-PE(config-if)#no mpls ip
KOLKATA-PE(config-if)#exit
KOLKATA-PE(config-router)#exit
KOLKATA-PE(config-router)#end
KOLKATA-PE# wr
PUNE-PE:
PUNE-PE#conf t
PUNE-PE(config)#mpls ip
PUNE-PE(config-if)#int gi 2/1
PUNE-PE(config-if)#mpls ip
PUNE-PE(config-if)#no shut
PUNE-PE(config-if)#int gi 2/2
PUNE-PE(config-if)#no shut
PUNE-PE(config-if)#no mpls ip
PUNE-PE(config-if)#exit
PUNE-PE(config-router)#exit
PUNE-PE(config-router)#end
PUNE-PE# wr
GUHAWATI:
GUHAWATI#conf t
GUHAWATI(config)#mpls ip
GUHAWATI(config-if)#int gi 2/1
GUHAWATI(config-if)#mpls ip
GUHAWATI(config-if)#no shut
GUHAWATI(config-if)#int gi 2/2
GUHAWATI(config-if)#no shut
GUHAWATI(config-if)#mpls ip
GUHAWATI(config-if)#exit
GUHAWATI(config-router)#exit
GUHAWATI(config-router)#end
GUHAWATI# wr
AHMEDABAD:
AHMEDABAD#conf t
AHMEDABAD(config)#mpls ip
AHMEDABAD(config-if)#int gi 2/1
AHMEDABAD(config-if)#mpls ip
AHMEDABAD(config-if)#no shut
AHMEDABAD(config-if)#int gi 2/2
AHMEDABAD(config-if)#no shut
AHMEDABAD(config-if)#mpls ip
AHMEDABAD(config-if)#exit
AHMEDABAD(config-router)#exit
AHMEDABAD(config-router)#end
AHMEDABAD# wr
HYDERABAD:
HYDERABAD#conf t
HYDERABAD(config)#mpls ip
HYDERABAD(config)#rd 1000:1
HYDERABAD(config-if)#int gi 2/1
HYDERABAD(config-if)#no mpls ip
HYDERABAD(config-if)#no shut
HYDERABAD(config-if)#int gi 2/2
HYDERABAD(config-if)#no shut
HYDERABAD(config-if)#mpls ip
HYDERABAD(config-if)#exit
HYDERABAD(config-router)#exit
HYDERABAD(config-router-af)#exit
HYDERABAD(config-router)#address-family vpnv4
HYDERABAD(config-router-af)#end
HYDERABAD# wr
BANGALORE:
BANGALORE#conf t
BANGALORE(config)#mpls ip
BANGALORE(config)#rd 1000:1
BANGALORE(config-if)#int gi 2/1
BANGALORE(config-if)#no mpls ip
BANGALORE(config-if)#no shut
BANGALORE(config-if)#int gi 2/2
BANGALORE(config-if)#no shut
BANGALORE(config-if)#mpls ip
BANGALORE(config-if)#exit
BANGALORE(config-router)#exit
BANGALORE(config-router-af)#exit
BANGALORE(config-router)#address-family vpnv4
BANGALORE(config-router-af)#end
BANGALORE# wr
CHENNAI-PE:
CHENNAI-PE#conf t
CHENNAI-PE(config)#int lo0
CHENNAI-PE(config-if)#int gi 2/1
CHENNAI-PE(config-if)#no mpls ip
CHENNAI-PE(config-if)#no shut
CHENNAI-PE(config-if)#int gi 2/2
CHENNAI-PE(config-if)#shut
CHENNAI-PE(config-if)#exit
CHENNAI-PE(config)#router bgp 50
CHENNAI-PE(config-router)#end
CHENNAI-PE# wr
TRIVANDRUM:
TRIVANDRUM#conf t
TRIVANDRUM(config)#int lo0
TRIVANDRUM(config-if)#int gi 2/1
TRIVANDRUM(config-if)#no mpls ip
TRIVANDRUM(config-if)#no shut
TRIVANDRUM(config-if)#int gi 2/2
TRIVANDRUM(config-if)#shut
TRIVANDRUM(config-if)#exit
TRIVANDRUM(config)#router bgp 40
TRIVANDRUM(config-router)#end
TRIVANDRUM# wr
The path set up by these bilateral agreement is called label switched path(LSP
LDP
CR-LDP
RSVP-TE
LDP Messages
LDP communicate using messages
There are 4 categories of LDP messages
Discovery Messages
Session Messages
Advertisement Messages
Notification Messages
LDP Messages
Discovery messages provide a mechanism by which the LSRs indicate their
presence in a network by sending Hello message periodically
This is transmitted as a UDP packet
When an LSR chooses to establish a session with another LSR learned via
Hello message, uses LDP initialisation procedure over TCP transport
When multiple sessions are required between two LSRs there is one TCP
session for each LDP session
LDP Messages
Upon successful completion of the initialisation procedure, the two LSRs
are LDP peers and may exchange advertisement messages
LDP peers communicate over an LDP session created between them
An LSP can be viewed as a series of LDP peers and their associated sessions
Correct operation of LDP requires reliable and in order delivery of messages
Uses the TCP transport for Session, Advertisement and Notification
messages(Port-646)
Uses UDP transport for Discovery messages(Port-646)
T UDP TCP
N IP
LDP Messages
Length(2B)
Total PDU length in octets
U=1, the unknown message is silently ignored and the rest of message
is processed
LDP Messages
Message Type (15 b)
Identifies the type of message
Optional Parameters
Message ID (4B)
Notification messages, if to be sent, in response to this message carry
Type-Length-Value Encoding
LDP messages carry information, encoded in Type-Length-Value (TLV)
format
Maximum allowable length is 4096 Bytes
Type-Length-Value Encoding
U bit-Unknown TLV bit
Upon receipt of an unknown TLV, if
Type-Length-Value Encoding
Type (14b)
Identifies the various message types
Length (2B)
Length in octets of ONLY the value field
Value-Variable
String of octets that encodes the information
TLVs can be nested i.e. Value field itself may contain further TLV
encodings
LDP OPERATION
LDP Discovery
Session Establishment
Label Distribution
Error Notification
LDP Discovery
LDP discovery is a mechanism that enables an LSR to discover potential
LDP peers
Basic discovery
To discover LSR neighbors that are directly connected at the link level
LSR periodically sends LDP link hellos out the interface as UDP
packets using group multicast address
Extended discovery
To discover LSRs that are not directly connected at the link level
LSR periodically sends LDP targeted hellos as UDP packets to a
specific address
Hello Message
Hold Time-Seconds
0000-Default time of 15 sec for Link Hello and 45 sec for Targeted
Hello
FFFF-Means infinite
1-Targeted Hello
LDP Discovery
LSR receiving hellos from another LSR maintains a hello adjacency
If the parameters contained in the hello are acceptable
LSRs proceed for LDP session establishment
Session intialisation
Active LSR
LSRs will compare the Transport Address exchanged in the optional
parameter of Hellos
The LSR with greater Transport Address will become Active LSR
intialisation messages
LDP Protocol version
Label Distribution Method
Timer Values etc.
If the parameters are acceptable the session is established and keep-
Initialisation Message
Protocol Version (2B)
LDP protocol version
1-Downstream on demand
D-Bit-Loop Detection
0-Loop Detection Disabled
Initialisation Message
PV Limit-Path Vector Limit (1B)
Configured maximum path vector length
enables the receiver to match the initialisation message with its hello
adjacencies
Address Message
An LSR sends the address message to advertise the interface address.
requested them
Both of these techniques may be used in the same network at the same time
peer may not continue to use specific FEC-Label mappings the LSR
had previously advertised
Label Retention
Distribution Mode
Specifies whether
Label Release an LSR maintains a label binding for a FEC learned from
Message
aneighbor that is LSR
An upstream not itssends
next hop
this for the FEC
message to a downstream LSR that the
Conservative
peer no longer Labelneeds
Retention Mode
specific FEC-Label mappings previously
Label mapping advertisements of all routes are received from all peers
requested
Error Notification
Sent by LSR to inform LDP peer of a significant event
Two types of Notification Messages
Error Notification
Shutdown by a node
Advisory Notification
Outcome of processing an LDP message
Notification Message
Status TLV
Indicates the event being signaled
Malformed PDU
Malformed TLV
Notification Message
Notification Message
Status TLV
U-Bit
0-Advisory Notification
1-Fatal Error Notification
F-Bit- Forward Bit
RSVP-TE
This chapter provides you with information on the operation and configuration of
MPLS TE on Cisco routers.
TE Basics
TE is the process of steering traffic across to the backbone to facilitate efficient use of
available bandwidth between a pair of routers. Prior to MPLS TE, traffic engineering
was performed either by IP or by ATM, depending on the protocol in use between two
edge routers in a network. Though the term "traffic engineering" has attained
popularity and is used more in the context of MPLS TE today, traditional TE in IP
networks was performed either by IP or by ATM.
As illustrated in Figure, two paths exist between customer routers CE1-A and CE2-A
via the provider network. If all links between the routers in Figure were of equal cost,
the preferred path between customer routers CE1-A and CE2-A would be the one
with the minimum cost (via routers PE1-AS1, P3-AS1, and PE2-AS1) or PATH1. The
same would apply for the customer routers CE1-B and CE2-B belonging to Customer
B. If all the links were T3 links, for example, in the event of CE1-A sending 45 Mbps
of traffic and CE1-B simultaneously sending 10 Mbps of traffic, some packets will be
dropped at PE1-AS1 because the preferred path for both customers is using PATH1.
The path PATH2 will not be utilized for traffic forwarding; therefore, TE can utilize
this available bandwidth. To implement TE using IP whereby the paths PATH1 and
PATH2 are either load balanced or used equally, we will need to implement IGP
features such as maximum paths with variance or change the cost associated with the
suboptimal path, PATH2, to make it equal to the current optimal path, PATH1. In an
SP environment, this is often cumbersome to implement as the number of routers is
much larger.
With ATM networks, the solution is a lot more feasible; PVCs can be configured
between routers PE1-AS1 and PE2-AS1 with the same cost, but this would create a
full mesh of PVCs between a group of routers. Implementing ATM for TE, however,
has an inherent problem when a link or a node goes down. During link or node failure
used in conjunction with ATM for TE, messages are flooded on the network. The
Layer 3 topology must be predominantly fully meshed to take advantage of the Layer
2 TE implementation. Often, this might prove to be a scalability constraint for the IGP
in use, due to issues with reconvergence at Layer 3.
MPLS TE
MPLS TE Theory
This section introduces you to the theoretical nuances in the implementation of MPLS
TE. The primary topics covered will be the components of MPLS TE as well as RSVP
and its function in the implementation of MPLS TE.
MPLS TE Overview
In a traditional IP forwarding paradigm, packets are forwarded on a per-hop basis
where a route lookup is performed on each router from source to destination. As cited
earlier, the destination-based forwarding paradigm leads to suboptimal use of
available bandwidth between a pair of routers in the service provider network.
Predominantly, the suboptimal paths are under-utilized in IP networks. To avoid
packet drops due to inefficient use of available bandwidth and to provide better
performance, TE is employed to steer some of the traffic destined to follow the
optimal path to a suboptimal path to enable better bandwidth management and
utilization between a pair of routers. TE, hence, relieves temporary congestion in the
core of the network on the primary or optimal cost links. TE maps flows between two
routers appropriately to enable efficient use of already available bandwidth in the core
of the network. The key to implementing a scalable and efficient TE methodology in
the core of the network is to gather information on the traffic patterns as they traverse
the core of the network so that bandwidth guarantees can be established. As illustrated
in Figure, TE tunnels, Tunnel1 and Tunnel2, can be configured on PE1-AS1 that can
map to separate paths (PATH1, PATH2), enabling efficient bandwidth utilization.
MPLS TE can also map to certain classes of traffic versus destinations. If Customer A
CE routers are connected into the SP network using OC3 links versus Customer B
connecting into the SP network using a 64 K dialup link, preferential treatment can be
configured on TE tunnels so that TE Tunnel1 can carry Customer A traffic and
Tunnel2 can carry Customer B traffic. This is shown in Figure. Also note that Figure
illustrates tunnels configured on both PE1-AS1 and PE2-AS1.
TE Tunnels Based on Customer CoS
TE tunnels are, thus, data flows between a specific source and destination that might
have properties or attributes associated with them. The attributes associated with a
tunnel, in addition to the ingress (headend) and egress (tailend) points of the network,
can include the bandwidth requirements and the CoS for data that will be forwarded
utilizing this tunnel. Traffic is forwarded along the path defined as the TE tunnel by
using MPLS label switching. Hence, TE tunnels are assigned specific label switched
paths (LSPs) in the network from source to destination, which are usually PE routers.
MPLS LSPs have a one-to-one mapping with TE tunnels, and TE tunnels are not
bound to a specific path through the SP network to a destination PE router. Unless
configured explicitly, TE tunnels can reroute packets via any path through the
network associated with an MPLS LSP. This path might be defined by the IGP used
in the core, which are discussed in the section on MPLS TE extensions.
The primary reason for the implementation of MPLS TE is to control paths along
which traffic flows through a network. MPLS TE also lends itself to a resilient design
in which a secondary path can be used when the primary path fails between two
routers in a network. Data plane information is forwarded using label switching; a
packet arriving on a PE from the CE router is applied labels and forwarded to the
egress PE router. The labels are removed at the egress router and forwarded out to the
appropriate destination as an IP packet.
OSPF or IS-IS with extensions for TE is used to carry information pertaining to the
tunnel configured on a router. The extensions carry information on available resources
for building a tunnel, like bandwidth on a link. As a result, a link that does not have
the requested resources (like bandwidth) is not chosen to be a part of the LSP tunnel
or TE tunnel. Signaling in an MPLS TE environment uses resource reservation
protocol (RSVP) with extensions to support TE tunnel features.
The data plane ingress (headend) router in the MPLS domain requires information
pertaining to the resource availability on all links capable of being a part of the MPLS
TE tunnel. This information is provided by IGPs like OSPF and IS-IS due to the
inherent operation of flooding information about links to all routers in the IGP
domain. In IS-IS, a new TLV (type 22) has been developed to transmit information
pertaining to resource availability and link status in the LS-PDUs. In OSPF, the type
10 LSA provides resource and links status information. When this information is
flooded in IGP updates, the ingress (headend) router gathers information on all the
available resources in the network along with the topology, which defines tunnels
through the network between a set of MPLS-enabled routers.
The inspiration behind MPLS TE is Constraint Based Routing (CBR), which takes
into account the possibility of multiple paths between a specific source/destination
pair in a network. With CBR, the operation of an IP network is enhanced so the least
cost routing can be implemented as well as variables to find paths from a source to
destination. CBR requires an IGP, like OSPF or IS-IS, for its operation. CBR is the
backbone of the TE tunnel definition and is defined on the ingress routers to the
MPLS domain when implementing MPLS TE. Resource availability and link status
information are calculated using a constrained SPF calculation in which factors such
as the bandwidth, policies, and topology are taken into consideration to define
probable paths from a source to destination.
CSPF calculation results with an ordered set of IP addresses that map to next-hop IP
addresses of routers forming an LSP, in turn mapping to the TE tunnel. This ordered
set is defined by the headend router that is propagated to other routers in the LSP. The
intermediate routers, thus, do not perform the function of path selection. RSVP with
TE extensions is used to reserve resources in the LSP path as well as label association
to the TE tunnel. The operation of RSVP for MPLS TE is introduced in the next
section.
RSVP with TE Extensions: Signaling
RSVP reserves bandwidth along a path from a specific source to destination. RSVP
messages are sent by the headend router in a network to identify resource availability
along the path from a specific source to destination. The headend router is always the
source of the MPLS TE tunnel, and the tailend router is the router that functions as the
endpoint for the TE tunnel. After the RSVP messages are sent, the status of routers in
the path (resource availability) information is stored in the path message as it
traverses the network. RSVP, therefore, communicates the requirements of a specific
traffic flow to the network and gathers information about whether the requirements
can be fulfilled by the network.
The four main messages used in implementation of RSVP for TE are the RSVP PATH
message, the RSVP RESERVATION message, RSVP error messages, and RSVP tear
messages. In MPLS TE, RSVP is used to ensure and verify resource availability, as
well as apply the MPLS labels to form the MPLS TE LSP through the routers in the
network:
RSVP PATH message— Generated by the headend router and is forwarded through
the network along the path of a future TE LSP. At each hop, the PATH message
checks the availability of requested resources and stores this information. In our
network, shown in Figure 9-4, the PATH message is generated by Router PE1-AS1,
the headend router, and is forwarded downstream where it checks resource
availability at each hop (P1-AS1 and PE2-AS1). The RSVP PATH message functions
as a label request in MPLS TE domain. Because all TE domains function with
downstream-on-demand label allocation mode, the request to assign a label is
generated at the headend router and propagated downstream.
RSVP PATH and RESERVATION Messages
RSVP error messages— In the event of unavailability of the requested resources, the
router generates RSVP error messages and sends them to the router from which the
request or reply was received. If Router P1-AS1 is unable to accommodate requested
resources as defined in the PATH message generated by PE1-AS1 (headend router),
the router generates a PATH ERROR (PATHERR) message and sends it to its
upstream LSR PE1-AS1, as depicted in Figure 9-5.
If the RSVP PATH message successfully reaches the tailend router, the tailend Router
PE2-AS1 generates a RESERVATION message. If in the time lapsed between P1-
AS1 receiving the PATH message from PE1-AS1 to receiving the RESERVATION
message from PE2-AS1, P1-AS1 identifies a lack of resources to confirm the request,
P1-AS1 will send a RESERVATION ERROR (RESVERR) message to its
downstream LSR PE2-AS1 denying the reservation, as depicted in Figure 9-5.
RSVP tear messages— RSVP creates two types of tear messages, namely, the PATH
tear message and the RESERVATION tear message. These tear messages clear the
PATH or RESERVATION states on the router instantaneously. The process of
clearing a PATH or RESERVATION state on a router using tear messages enables
the reuse of resources on the router for other requests. The PATH tear messages are
usually generated in inter-area LSP creation where the inter-area LSP is not
configured to be fast reroutable, and if a link failure occurs within an area, the LSR to
which the failed link is directly attached will generate an RSVP PATH error and an
RESV tear message to the headend. The headend will then generate an RSVP PATH
tear message. The corresponding path option will be marked as invalid for a certain
amount of time and the next path option will be immediately evaluated if it exists.
RSVP Operation in MPLS TE
As mentioned earlier, the result of a CSPF or CBR calculation on the headend router
is an ordered list of IP addresses that identifies the next hops along the path of the TE
tunnel or LSP. This list of routers is computed and is known only to the headend
router that is the source of the TE tunnel. Other routers in the domain do not perform
a CBR calculation. The headend router provides information to the routers in the TE
tunnel path via RSVP signaling to request and confirm resource availability for the
tunnel. RSVP with extensions for TE reserves appropriate resources on each LSR in
the path defined by the headend router and assigns labels mapping to the TE tunnel
LSP.
The RSVP extensions to enable RSVP use for signaling in an MPLS environment to
implement TE are defined in Table 9-1. The functions of each of these
extensions/objects in the messages are also outlined.
During the path setup process for LSP TE tunnels, RSVP messages containing one or
more of these extensions are used to identify the significance of each message type
and its contents.
Object Message
SESSION Defines the source and the destination of the LSP tunnel.
Usually identified by IP addresses of corresponding
loopback interfaces on headend and tailend routers.
Object Message
EXPLICIT_ROUTE Populated by the list of next hops that are either manually
specified or calculated using constraint-based SPF. The
previous hop (PHOP) is set to the router's outgoing
interface address. The Record_Route (RRO) is populated
with the same address as well.
The steps in the PATH and RESV message propagation in Figure are depicted here:
Step 1. The appropriate values for the fields mentioned in Table 9-1 applied by the
headend Router PE1-AS1 and the PATH message is sent to the next-hop
router in the LSP tunnel path.
Step 2. When P1-AS1 receives this PATH message, the router checks the
EXPLICIT_ROUTE object to see if the next hop is a directly connected
network. This is checked in the L-bit of the RSVP path message. If the L-bit
is set, the local router is not directly connected to the next hop in the LSP
tunnel path. Therefore, the router would perform a constrained-SPF
calculation to identify the next hop in the tunnel path.
If the L-bit is unset, the Router P1-AS1 knows that it is directly connected to
the next hop in the LSP tunnel path. It then removes all entries in the
EXPLICIT_ROUTE mapping to the local router (P1-AS1) and forwards the
PATH message to the next hop as defined in the EXPLICIT_ROUTE object.
In addition, P2-AS1 updates and appends the RECORD_ROUTE object to
depict the local outgoing interface in the path of the LSP tunnel. Figure 9-6
depicts the PATH message values as the PATH message is forwarded from
P1-AS1 to P2-AS1 after the appropriate values are updated. As previously
mentioned, P1-AS1 removes references to its local interface in the
EXPLICIT_ROUTE object and adds the outgoing interface in the
RECORD_ROUTE object.
Step 3. The process is repeated at P2-AS1 in which references to its local interface in
the EXPLICIT_ROUTE object are removed and appends the outgoing
interface in the RECORD_ROUTE object.
Step 4. After the RSVP PATH message is received by the tailend Router PE2-AS1, it
triggers the creation of a RESERVATION message. The key concept to note
is that the label allocation process begins at the tailend router upon
generation of the RESERVATION message upstream. Therefore, when PE2-
AS1 generates a RESERVATION message, the router assigns a POP label to
the LSP tunnel (penultimate hop popping). The RESERVATION message
now has the RECORD_ROUTE object pointing to the outgoing interface on
the tailend router toward the headend router. Therefore, the
RECORD_ROUTE object is reinitiated in the RESERVATION message. The
values are depicted in Figure 9-6.
Step 6. This process is again repeated on P1-AS1 and the RESERVATION message
is then received by PE1-AS1.
In the implementation of RSVP for MPLS TE, RSVP with extensions for TE requests
as well as confirms the LSP, reserves resources as requested on all LSP path routers,
and applies MPLS labels to form the MPLS LSP through the network. Note that the
routers store a copy of the PATH request as the request is forwarded to the next-hop
LSR. This information identifies the interface as reservation messages are received on
the same LSR to an egress interface to the headend router. In the next section, you
will be introduced to the constraint-based SPF calculation process and the need for a
link-state protocol to enable MPLS TE dynamically in a service provider core.
Constraint-Based Routing and Operation in MPLS TE
The most important requirement of TE is that the characteristics, as well as resource
availability, on links on the network (in addition to bandwidth that would be used for
cost computations) be propagated across the network to allow efficient choice of
possible TE LSP paths. In link-state routing protocols, the preferred path still
predominantly takes into consideration the bandwidth on the link between any two
routers to compute the cost or metric associated with that path, prior to preferred path
allocation. Enabling the use of link-state routing protocols to efficiently propagate
information pertaining to resource availability in their routing updates is performed by
additional extensions to the actual operation of the link-state routing protocol. The
mechanics of operation of a link-state routing protocol involves the flooding of
updates in the network upon link-state or metric change or, in better terms, bandwidth
availability from a TE perspective. The resource attributes are flooded by the routers
in the network to make them available by the headend router in the TE tunnel during
LSP path computation (dynamic tunnels). Link-state announcements carry
information that lists that router's neighbors, attached networks, network resource
information, and other relevant information pertaining to the actual resource
availability that might be later required to perform a constraint-based SPF calculation.
OSPF and IS-IS have been provided with extensions to enable their use in an MPLS
TE environment to propagate information pertaining to resource availability and in
dynamic LSP path selection.
Maximum Versus Available Bandwidth
Available bandwidth (AB) is a key value taken into consideration during the LSP path
computation process to identify the preferred path for the TE tunnel. The available
bandwidths on interfaces are configured on a priority basis. The number of priorities
that can be configured in conjunction with the available bandwidth is 8: 0–7, where 0
represents the highest priority. When the available bandwidth for a certain priority
level on an interface is configured, it is subtracted from the available bandwidth on
all priority levels below the one it is configured on.
If Router PE1-AS1 has a serial interface (T1-1.544 Mbps), 1 Ethernet interface (10
Mbps) and one Fast Ethernet interface (100 Mbps), the actual bandwidths on the
interfaces map to the maximum bandwidth (MB) values on the respective links. The
available bandwidth is usually the bandwidth of the required reservation subtracted
from the maximum bandwidth. However, this does not hold true if the available
bandwidth value on the link is configured to be higher than the maximum bandwidth
value on the link. Though the available bandwidth on the link can be configured to be
higher than the max-bandwidth value, reservations exceeding the maximum
bandwidth value are rejected.
When a tunnel request is accepted and the bandwidth deducted from the available
bandwidth at a certain priority, it is also deducted from all the priorities lower than the
priority at which the resource request was performed. If an LSP tunnel creation on
PE1-AS1 consumes 40 Mbps of bandwidth on the Fast Ethernet interface at a priority
level of 5, the available bandwidth values at the appropriate priorities on the Fast
Ethernet interface would change for priorities 5 and above (100 – 40 = 60 Mbps).
AB AB AB AB AB AB AB AB
P = 0 P = 1 P = 2 P = 3 P = 4 P = 5 P = 6 P = 7
Interface (Mbps) (Mbps) (Mbps) (Mbps) (Mbps) (Mbps) (Mbps) (Mbps)
Ethernet 10 10 - 10 10 - 10 10 - 10 10 - 10 10 - 10 10 - 10 10 - 10
=0 =0 =0 =0 =0 =0 =0
The outputs of Table do not reflect the request for 2 Mbps of bandwidth on the
Ethernet interface at priority 3. This request is rejected due to unavailable bandwidth
at this priority level on the interface when the request is received. Link-state updates
pertaining to resource availability are flooded when the status of the link changes,
during manual reconfiguration of parameters mapping to the resource availability on
the link, periodic updates on links and their status, and when the LSP path setup fails
due to unavailability of requested resources for the LSP TE tunnel.
If the resources pertaining to the link change constantly, it will trigger update
generation, which clearly must be avoided. During the instant when the resources
pertaining to the links change constantly, the headend router might view the link as a
probable link in the LSP path. Therefore, this probable nonupdated link might be used
in path computation even though the link might not have the resources required for
LSP path setup. However, after LSP path computation when the LSP path
establishment is attempted, the router containing the link with the unavailable
resources generates an update with information affirming a lack of resources.
Thresholds can be set up on a per interface or link basis on a router whereby updates
are generated within a configured range of resource availabilities. Therefore, the
upper limit, as well as the lower limit, when an update will be generated on the router
containing the link, can be configured. For example, if the lower limit was configured
to be 50% of link bandwidth with steps at 60, 70, 80, and 90 with the upper limit
configured at 100%, updates with regards to link resource availability are generated
and flooded in the network when 50%, 60%, 70%, 80%, 90%, and 100% of
bandwidth are achieved.
Constraint-Based SPF
In the normal SPF calculation process, a router places itself at the head of the tree
with shortest paths calculated to each of the destinations, only taking into account the
least metric or cost route to the destination.
During regular SPF operation in the network, illustrated in Figure 9-7, only the cost is
taken into consideration, and the least cost path from a loopback on PE1-AS1 to a
loopback on PE2-AS1 is PE1-AS1->P1-AS1->PE2-AS1. In this calculation, a key
concept to note is no consideration to the bandwidth of the links on the other paths
from PE1-AS1 to PE2-AS1, namely via routers P3-AS1->P4-AS1 and P2-AS1. The
bandwidth of the links is shown as an ordered pair in Figure 9-7 with the first value
showing the cost of the link and the second showing the bandwidth across the link.
SPF
If the parameters chosen for the preferred path are not the least cost alone but also a
requirement to support a bandwidth of 50 Mbps in Figure 9-7, we can eliminate the
links that do not allow for the mentioned requirement. The network capable of
supporting the requirement would look like what's shown in Figure 9-8.
CSPF
With the just mentioned constraints, the only path capable of being used as an LSP for
TE is the path from PE1-AS1 to PE2-AS1 via P3-AS1 and P4-AS1. If any of the links
between P1-AS1, P2-AS1, and PE2-AS1 were to support a bandwidth more than the
requirement, they would become a part of the CSPF tree structure with Router PE1-
AS1 or the headend router as the root of the tree.
With CSPF, we use more than the link cost to identify the probable paths that can be
used for TE LSP paths. The decision as to which path is chosen to set up a TE LSP
path is performed at the headend router after ruling out all links that do not meet a
certain criteria, such as bandwidth requirements in addition to the cost of the link. The
result of the CSPF calculation at the headend router is an ordered set of IP addresses
that maps to the next-hop addresses of routers that form the TE LSP. Therefore,
multiple TE LSPs could be used by the use of CSPF to identify probable links in the
network that meet the criteria. In addition, the user can configure a static TE tunnel or
LSP on the headend router that outlines the next hops in the TE LSP path and,
therefore, can use the statically defined LSP as the backup LSP path in the event of
the primary TE LSP failing.
The result of the CSPF calculation is then passed over to the RSVP process to begin
the RSVP request and reservation process, as mentioned in the earlier section. RSVP
thus is used along with the result computed by CSPF or list of next hops configured
by the user for LSP signaling and final establishment of the TE LSP. Note the TE LSP
formed as a result of this process is unidirectional in nature.
Constraint-based SPF can use either administrative weights or IGP metric (also called
TE metric) during the constraint-based computation. In the event of a tie, the path
with the highest minimum bandwidth takes precedence, followed by the least number
of hops along the path. If all else is equal, CSPF picks a path at random and chooses
the same to be the TE LSP path of preference.
Therefore, the sequence of steps in the creation of an MPLS TE tunnel LSP in the
network is as follows:
Step 1. CSPF calculation is performed from the headend router based on the
constraints defined in the tunnel definition and requirements. This
calculation is performed by the IGP in use, either OSPF or IS-IS.
Step 2. After the LSP path is calculated using the CSPF process, the output of the
CSPF process, which is an ordered set of IP addresses mapping to next-
hop addresses in the TE LSP, is passed to RSVP.
Step 3. RSVP now performs the resource reservation request and confirmation on
the LSP, as defined by the CSPF process, to determine if the LSP meets
the requirements of the specific resources requested by the tunnel
definition.
Step 4. After the RSVP process receives a reservation message, it signals that the
LSP is now established.
Step 5. At this juncture, the TE tunnel is available for the IGP to use. By default,
the tunnel information is not added into the routing table; however, the
router can be configured so that the tunnel interface is added to the routing
table. You will be introduced to the configurations involved for TE on
Cisco routers in the next section.
Link admission control performs a check at each hop in the desired LSP path to see if
the resources requested are available prior to TE tunnel creation. The link admission
control function is performed on a per hop basis with each router in the LSP path
checking resource availability. If the requested resources are available, bandwidth is
reserved and the router waits for the RESERVATION message to confirm this
resource allocation. If, however, the resources requested are unavailable, the IGP in
use sends messages stating resource unavailability. Link admission control then
informs RSVP about lack of resources, and RSVP sends PATHERR messages to the
headend requesting the resources and notifying a lack of resources.
When setting up TE LSP paths in link admission control, it is important that the
priorities assigned to the available bandwidths are checked. Therefore, if the
requested bandwidth is in use by a lower priority session (priorities 0–7, with 0
having highest priority), the lower priority session can be preempted. If preemption is
supported, each preempted reservation leads to creation of PATHERR and RESVERR
messages because the preempted session no longer fits the profile of the resource
allocation.
OSPF Extension for MPLS TE
OSPF can be used as the link-state protocol of choice in MPLS TE for resource
allocation information flooding through the network by implementing OSPF
extensions or Opaque LSAs. The type of Opaque LSA in use is defined by the
flooding scope of the LSA. OSPF also now possesses TLV and sub-TLV attributes
that can be configured to propagate resource availability information in link-state
routing updates.
Opaque LSAs are of Type 9, 10, and 11 and differ in the flooding scope. Type 9 LSAs
are not flooded beyond the local subnet and are of link-local scope. Type 10 LSAs are
not flooded beyond the ABR and have an area-local scope. Type 11 LSAs are flooded
throughout the autonomous system (AS). Cisco currently supports only Type 10 LSAs
that have area-local scopes and are flooded within the area.
The Type 10 LSA, which is used in MPLS TE, has a number of TLV and sub-TLV
values that map to specific resources in a TE domain. Figure 9-9 depicts the TLV and
sub-TLV values and the appropriate values that they map to enable OSPF use for
MPLS TE.
The most important sub-TLV values pertaining to TE are 6, 7, and 8. Values for sub-
TLVs 6 and 7 are received from the RSVP configuration on the specific interface.
Sub-TLV 8 defines the bandwidth available for reservation on each of the eight
priorities. The value for sub-TLV 8 is received from the reservations active on the
specific interface.
IS-IS Extensions for MPLS TE
Similar to OSPF, IS-IS can also be used as the link-state protocol of choice in the TE
domain. IS-IS with extensions and newly defined TLVs can be used to propagate
information pertaining to resource allocation in an MPLS TE domain. The following
TLVs have been defined for the use of IS-IS as the link-state IGP in a MPLS TE
domain:
TLV22: Extended IS reachability— This TLV propagates information about
the state of links in the network and allows the use of "wide" metrics. In
addition, this TLV provides information on resource availability, like link
bandwidths.
TLV134: Router ID— This TLV is used to identify the router with a distinct
IP address, usually a loopback address. The source and destination IP
addresses used to identify and define the tunnel endpoints must match the
router ID.
TLV135: Extended IP reachability— This TLV uses "wide" metrics and
determines if a prefix is a level-1 or level-2 prefix. It also allows the flagging
of routes when a prefix is leaked from level 2 into level 1.
In addition to the just mentioned TLVs, sub-TLVs have been defined that affix
information pertaining to TE resource allocations to updates. Each sub-TLV consists
of three octets except those explicitly mentioned in Figure 9-10. Most of the sub-
TLVs are defined in draft-ietf-isis-traffic-xx.txt. Figure 9-10 depicts the TLVs and
sub-TLVs in use by IS-IS to support MPLS TE functionality.
The key TLVs to note are Sub-TLV 6 and 8, which map to the tunnel endpoints or
source and destination IP addresses that are usually loopback addresses; Sub-TLV 9
and 10, which map to the RSVP settings on a specific interface; and Sub-TLV 11,
which maps to the unreserved bandwidth per priority on an interface after current
resource allocations for active sessions have been established.
Configuring MPLS TE
This section introduces you to the steps involved in the configuration of Cisco routers
to implement MPLS TE. The first subsection identifies the stepwise procedure
involved in the configuration of Cisco routers for TE. It is then followed by a
subsection depicting the actual configuration process on a topology consisting of six
routers in which multiple paths can be used for TE purposes from a headend to tailend
router.
Step 2. The next step is the first configuration performed in relevance to enabling TE
on the Cisco router. Figure 9-12 outlines the configurations performed on the
Cisco router to enable TE functions globally on the router as well as interfaces
that are possible candidates to be chosen for TE LSP paths.
MPLS TE Configuration: Step 2
[View full size image]
Step 3. Configure RSVP bandwidth parameters that will be used on the interface for
signaling purposes and resource allocation for traffic engineered sessions.
Figure outlines the configurations that need to be performed on the interface.
Step 4. After the interfaces that can be chosen to be a part of the LSP have been
enabled for TE as well as RSVP parameters configured, the next step is to
configure the tunnel interface. The main configurations of the tunnel interface
would be association of the tunnel interface IP address to the loopback address
configured earlier, the mode of the tunnel operation, and the destination
address of the tunnel endpoint, which would map to the IP address of a
loopback on the tailend router as well as the process by which the tunnel LSP
path is chosen. In this step, if the path chosen for the LSP is done using the
IGP and CSPF, the path option is chosen to be dynamic. Figure depicts the
configuration involved in setting up the tunnel interface.
Figure 9-14. MPLS TE Configuration: Step 4
Step 5. In addition to using the IGP for LSP path setup, the user can also define an
explicit-path that will be used for the TE LSP. This optional step can be
performed on the headend router so that the dynamic tunnel can be chosen to
be the tunnel of choice for traffic forwarding and the explicit-path tunnel or
user-defined static tunnel can be the backup path. In some cases, load
balancing can also be achieved between the two types. Figure depicts the
configurations to set up an explicit-path LSP.
Step 6. By default, the tunnel interface is not announced into the IGP for use in the
routing table. This will have to be configured explicitly for the tunnel interface
to be used as the next hop in the routing table by the IGP. Figure outlines the
configurations that will have to be performed on the headend router to enable
tunnel interface use as the next-hop address in the routing table for TE.
MPLS TE Configuration: Step 6
Step 7. The final step in the configuration of MPLS TE is the configuration of the IGP
for TE support. The IGP in use can be either OSPF or IS-IS. The IGP process
used for TE is the same as what's defined for NLRI reachability. The
configurations involved for enabling TE extensions for both these protocols
are outlined in Figure 9-17.
The following steps show how to configure dynamic paths and explicit paths with
MPLS TE:
Step 1. Configure a loopback interface for tunnel association. This IP address can
be used as the router ID in the various processes on the router (see
Example
Configure Loopback Interface for Tunnel Association
PE1-AS1(config)#interface loopback 0
Step 2. Enable TE globally on the router and per interface. Because we want the
headend router to take all links in the network as possible links for LSP
path setup, this interface-specific configuration is performed on all links in
the network topology shown in Figure. Only the configuration pertaining
to PE1-AS1 is shown in Example .
PE1-AS1(config)#interface Tunnel0
Step 5. Configuring dynamic tunnel announcement into IGP—In this step, the
tunnel interface is configured to be added into the IGP routing table to
enable traffic forwarding along the tunnel. See Example
Announce Tunnel Interface into IGP
PE1-AS1(config)#interface Tunnel0
PE1-AS1(cfg-ip-expl-path)#next-address 10.10.10.10
1: next-address 10.10.10.10
PE1-AS1(cfg-ip-expl-path)#next-address 10.10.10.14
1: next-address 10.10.10.10
2: next-address 10.10.10.14
PE1-AS1(cfg-ip-expl-path)#next-address 10.10.10.103
1: next-address 10.10.10.10
2: next-address 10.10.10.14
3: next-address 10.10.10.103
Step 8. Configure the tunnel interface to be announced into IGP to be the preferred
path for traffic engineered traffic in the domain. See Example
Announce Tunnel Interface into IGP
PE1-AS1(config)#interface Tunnel1
Step 1. Perform a show mpls traffic-eng tunnels brief on the headend Routers PE1-
AS1 and P1-AS1 in the LSP path, as well as the tailend Router PE2-AS1 to
verify the tunnel state is up/up. The output of the command also gives us
information on the LSP path in the tunnel setup. UP IF defines the upstream
interface for the tunnel, and DOWN IF defines the downstream interface for
the tunnel. See Example .
Example show mpls traffic-eng tunnels brief on Tunnel LSP Path Routers
Signalling Summary:
Forwarding: enabled
________________________________________________________________
______________
Signalling Summary:
Forwarding: enabled
Signalling Summary:
Forwarding: enabled
Step 2. A view of the actual parameters of the tunnel can be retrieved by performing a
show mpls traffic-eng tunnels destination ip-address (only Tunnel 0 depicted
in Example ) or a show mpls traffic-eng tunnels tunnel interface-number. As
illustrated in Example , the output shows the status of the tunnel and the
information about the parameters associated with the tunnel. In addition, it
shows the preferred path chosen by the CSPF process under the explicit-path
field in the output of the command, as shaded in Example
Status:
path option 1, type dynamic (Basis for Setup, path weight 20)
Config Parameters:
auto-bw: disabled
InLabel : -
OutLabel : Serial3/0, 26
My Address: 10.10.10.101
History:
Tunnel:
Current LSP:
Status:
path option 1, type dynamic (Basis for Setup, path weight 20)
Config Parameters:
Au
to-bw: disabled
InLabel : -
OutLabel : Serial3/0, 26
My Address: 10.10.10.101
History:
Tunnel:
Current LSP:
Step 3. Verify that the next hop to the destination IP address points to the tunnel
interfaces in the IGP routing table. Only routes to network 10.10.10.103
(destination) pointing to the tunnel interface as the next hop are shown for
brevity. See Example 9-12. Because we have two tunnels configured on Router
PE1-AS1 (dynamic and explicit) with the same parameters, the traffic to
destination 10.10.10.103 is load balanced equally among the two paths, as
shown in, because the bandwidths configured on the TE tunnels are the same.
Traffic from PE1-AS1 to PE2-AS1 is equally load balanced across the two
tunnels.
Known via "ospf 100", distance 110, metric 97, type intra area
PE2-AS1#ping
Protocol [ip]:
Number of hops [ 9 ]: 4
Record route:
(10.10.10.103)
(10.10.10.6)
(10.10.10.2)
(10.10.10.101) <*>
End of list
Record route:
(10.10.10.103)
(10.10.10.14)
(10.10.10.10)
(10.10.10.101) <*>
End of list
Final Configurations for Dynamic and Explicit Tunnels with MPLS TE
Example and Example outline the final configurations for all devices in Figure for
implementation of dynamic and explicit tunnels from PE1-AS1 to PE2-AS1.
Example Final Configurations for PE1-AS1 and PE2-AS1 to Implement Dynamic
and Explicit Tunnels
hostname PE1-AS1
ip cef
interface Loopback0
interface Tunnel0
ip unnumbered Loopback0
interface Tunnel1
ip unnumbered Loopback0
interface Serial2/0
tag-switching ip
fair-queue 64 256 48
interface Serial3/0
mpls ip
interface Serial4/0
MPLS ip
next-address 10.10.10.10
next-address 10.10.10.14
next-address 10.10.10.103
end
hostname PE2-AS1
ip cef
interface Loopback0
interface Serial2/0
mpls ip
interface Serial3/0
mpls ip
interface Serial4/0
mpls ip
end
Example 9-15. Final Configurations for P1-AS1, P2-AS1, and P3-AS1 to Implement
Dynamic and Explicit Tunnels
hostname P1-AS1
ip cef
interface Loopback0
interface Serial2/0
mpls ip
interface Serial3/0
mpls ip
interface Serial4/0
mpls ip
end
hostname P2-AS1
ip cef
interface Loopback0
interface Serial2/0
MPLS ip
interface Serial3/0
mpls ip
end
hostname P3-AS1
ip cef
interface Loopback0
interface Serial2/0
mpls ip
interface Serial3/0
no ip directed-broadcast
mpls ip
interface Serial4/0
mpls ip
!
end
1: next-address 10.10.10.18
1: next-address 10.10.10.18
2: next-address 10.10.10.22
1: next-address 10.10.10.18
2: next-address 10.10.10.22
3: next-address 10.10.10.103
PE1-AS1(cfg-ip-expl-path)#end
After the configuration is performed, the output of the routing table entry for
10.10.10.103/32 shows the unequal cost load balancing in effect (see Example).
Example. Verification of Unequal Cost Load Balancing
PE1-AS1#show ip route 10.10.10.103
Known via "ospf 100", distance 110, metric 97, type intra area
Therefore, the final configuration for PE1-AS1 includes, in addition to Example 9-14,
the configuration shown in Example.
Example . Additional Configuration on PE1-AS1 for Unequal Cost Load
Balancing
interface Tunnel2
ip unnumbered Loopback0
no ip directed-broadcast
The configuration for implementing FRR for link protection is simple to implement.
If you use a subset of the network shown in Figure 9-18 to implement link protection,
as illustrated in Figure 9-19, you can configure a backup tunnel on the LSR P1-AS1.
If the primary tunnel from PE1-AS1 via P1-AS1 to PE2-AS1 fails due to link failure
between P1-AS1 and PE2-AS1, the backup tunnel is used to forward traffic.
Verification of FRR capabilities can be performed by issuing the show mpls traffic-
eng fast-reroute database detail command on the downstream LSR configured with
a backup tunnel, as shown in Figure .
Implementing MPLS VPNs over MPLS TE
MPLS was initially adopted due to its inherent properties to deliver VPNs. However,
in recent years, MPLS TE has gained popularity due to the robust TE capabilities it
provides. In this section, we will discuss the configurations involved in the
implementation of MPLS VPN over TE tunnels. TE tunnels can be configured
between PE to PE routers as well as from PE to provider core or P routers. The
configurations involved in both of these implementations of MPLS TE in the provider
core are introduced. The network used to implement MPLS VPN over TE tunnels is
shown in Figure
MPLS VPN Over TE Network Topology/Configuration
The configurations on Routers P1-AS1, CE1-A, and CE2-A are illustrated in Figure
9-20. Configurations for PE1-AS1 and PE2-AS1 are illustrated in Example 9-19. A
tunnel is already configured with a dynamic path-option between PE1-AS1 and PE2-
AS1.
PE1-AS1 and PE2-AS1 Configuration: MPLS VPN Over TE with PE to PE Tunnels
hostname PE1-AS1
ip cef
ip vrf VPNoverTE
rd 1:100
interface Loopback0
interface Tunnel0
ip unnumbered Loopback0
interface Serial2/0
interface Serial3/0
mpls ip
no auto-summary
address-family vpnv4
exit-address-family
exit-address-family
end
hostname PE2-AS1
ip cef
ip vrf VPNoverTE
rd 1:100
interface Loopback0
interface Serial3/0
mpls ip
interface Serial4/0
address-family vpnv4
exit-address-family
exit-address-family
end
Figure illustrates the routing tables on CE routers in which the CE routers learn the
routes from the remote CEs via the MPLS backbone and place them in their local
routing tables as OSPF IA routes, though all CE routes are in area 0 because sham-
links are not configured.
Figure also shows the routing table on the respective PE routers for the VRF
VPNoverTE to check for route propagation in the MPLS VPN domain. As can be
derived from the output, the appropriate VPN routes obtained from the remote CEs
are learned from the next hop that maps to the remote PE loopback.
A closer look at the prefix 172.16.1.102 (loopback0 on CE2-A), learned across the
MPLS domain one PE1-AS1, indicates a next-hop address of the remote PE loopback
10.10.10.103 (lo0 on PE2-AS1). In the global routing table, if this VPN forwards
traffic over the MPLS TE tunnel configured on PE1-AS1, the next-hop address of
10.10.10.103 must point to the tunnel interface (Tunnel0) as shown in Figure 9-21 by
the output of show ip route 10.10.10.103 on PE1-AS1. In addition, note that in the
label-stack imposed on the packets in the MPLS domain when implementing MPLS
VPN over TE (one label for MPLS VPN and the top label for TE), the top label maps
to the label assigned by RSVP for the traffic engineered LSP path. Therefore, the out-
label value in the output of show MPLS traffic-eng tunnels tunnel0 (16) maps to the
top label in the label stack, as highlighted in the output of show ip cef vrf
VPNoverTE 172.16.1.102 in Figure
Command Reference
Command Description
Command Description
or
Command Description
Router(config-if)# tunnel mpls traffic-eng Enables the MPLS tunnel for FRR
fast-reroute protection.
Layer 3 VPN is without doubt the MPLS application that has caused the most ink to
flow. RFC 2547 proposes a peer architecture in which customer edge (CE) routers
exchange routes with service provider edge routers (universally called PE, for
provider edge). Unlike a Frame Relay or ATM VPN service, there are no point-to-
point connections between customer sites.
Even though each site has just one link into the service provider cloud, thanks to the
MPLS-VPN architecture, there can be a full-mesh connectivity between the sites. In
fact, the intersite IP topology can be of arbitrary complexity. MPLS-VPN
implementations default to full mesh and must be constrained to provide a more
hierarchical connectivity model, such as hub and spoke.
The MPLS-VPN model makes it easier to route between CEs, compared to the costly
approach of using dedicated WAN connections between sites and the relative
For CEs to communicate, the service provider needs to exchange (private and
possibly overlapping) customer IP routes and carry packets to those routes across its
network. MPLS provides a solution that supports customer address-space
independence using a forwarding mechanism that uses a two-label hierarchy in which
the inner label identifies the VPN and the outer label identifies the destination PE
device. RFC 2547 mandates the use of the Border Gateway Protocol (BGP) to
exchange prefixes and labels between PE devices and introduces some new attributes
to provide this functionality.
PE A imports the prefixes announced by the CE into the route table for this VPN. If
other interfaces on the same PE belong to the same VPN, routes are announced to the
local peers. Each VPN has its own routing table.
PE A uses iBGP to announce reachability for each of its attached customer sites. In
Figure PE A has one iBGP session with PE C for the red VPN and another with PE D
for the green VPN. PE C imports the routes into the routing table used for the red
VPN, and PE D imports the routes for the green VPN. The PEs are in a full iBGP
mesh and each can run many different VPNs.
When traffic must go between sites, the CE forwards IP packets to the PE as it would
to any other router. Figure shows a packet going from CE green1 to CE green2,
following this sequence:
PE A identifies the next hop (PE D) for this packet as a BGP neighbor.
PE A first imposes a label, 22, that will identify the VPN routing table to PE D. This
label was advertised by the neighbor, PE D, during the exchange of BGP prefixes,
which happened some time before the preceding step.
The packet must now travel across the MPLS network, so PE A imposes another
label, 96, that identifies the next-hop LSR on the IGP path to PE D. This label was
advertised by the downstream LSR (LSR B) from 10.0.0.2.
Each LSR in the core swaps labels and forwards the packet as normal toward PE D.
The penultimate hop pops the outer label. In Figure 4-14, there is only one hop to the
egress LSR, so LSR B removes the outer label.
PE D uses the remaining label, 22, to identify which VPN routing table to use for the
packet, and then pops the label from the packet.
PE D does an IP lookup in the VPN routing table to find the outgoing interface and
then forwards the IP packet to CE green2, which will route it to its destination.
It is very important to understand that the LSRs have no visibility of the VPN traffic.
They forward labeled traffic along LSPs established by whatever routing protocol is
running in the service provider core. Of course, this IGP can be completely different
from the IGPs running on the CE-PE links.
MPLS-VPN Attributes
Defining an MPLS VPN is harder than you might expect. For the longest time, the
Cisco IOS implementation had no single number or string that would define a VPN in
a network. Fortunately, a VPN ID has since been introduced to address this problem.
Note that every VPN on a Cisco router has the following attributes:
Rules that determine how VPN routes are advertised to peer routers
Route reachability within an MPLS VPN is established through the selective import
of BGP routes. Several new extended attributes have been added to BGP in
accordance with the specifications in RFC 2547. Figure shows how PEs exchange
these attributes.
MPLS-VPNs require private routing tables in each VPN so that they can peer with the
CEs in the different domains. In Cisco jargon, these are called VRFs, as shown in
Figure , and the standard routing table is called the global routing table. In the
example given that described the operation of Figure, the VPN routing tables
referenced in the text are VRFs.
VRFs
VRFs are populated by routing processes associated with each VPN. Note that in
other implementations, separate processes run in each VPN, but Cisco IOS does a mix
of both. BGP, for example, is a single process across the whole router, but there are
independent OSPF processes for each VPN. LFIBs are populated using information
from VRFs.
Even though each VPN on a PE router has its very own VRF, no VRFs are required
on CE routers. (There is an optional exception to this called, rather unimaginatively,
multi-VRF CE, but the basic RFC 2547 scenario requires no such thing.)
This section gives the extracts necessary to deploy a simple MPLS VPN. Example is
the configuration of a PE. The underlying network topology is the same as used in the
examples in Chapter .
ip vrf RED
rd 101:1
interface Loopback0
no ip directed-broadcast
interface Ethernet1/0/0
no ip directed-broadcast
interface FastEthernet0/0/0
tag-switching ip
no ip directed-broadcast
full-duplex
no cdp enable
redistribute connected
redistribute static
no auto-summary
no synchronization
exit-address-family
address-family vpnv4
exit-address-family
Example shows the first PE configuration. There are three basic sections. The first
global command sets up a VRF for the VPN, with some name, route-distinguisher,
and route-target values. Then, every CE-PE link needs to be added to the VRF. There
is no VRF on core-facing links, which simply do label switching. The final section is
iBGP, which in this example established two sessions to peers at 12.0.0.1 and
12.0.0.2. Each VPN has its own address-family configuration, where you can
configure which networks to announce and so forth. The VPNv4 address-family
establishes the peers as being MPLS-VPN savvy, so BGP peers understand the
necessary extended communities.
Example gives the LSR configuration, which, as you can see, is very straightforward.
interface FastEthernet1/0/1
tag-switching ip
no ip directed-broadcast
full-duplex
no cdp enable
interface FastEthernet2/0/1
tag-switching ip
no ip directed-broadcast
full-duplex
no cdp enable
ip vrf RED
rd 101:1
interface Loopback0
no ip directed-broadcast
interface Ethernet1/0/0
no ip directed-broadcast
interface FastEthernet0/0/0
tag-switching ip
no ip directed-broadcast
full-duplex
no cdp enable
redistribute connected
redistribute static
no auto-summary
no synchronization
exit-address-family
address-family vpnv4
exit-address-family
Note
ping, telnet, and traceroute have VRF options so that they can be used between PEs.
Why don't the standard commands work? Remember that a VRF represents an
entirely private routing space. Commands issued from the Cisco IOS command line
use the global routing table. On a PE, this means that all the LSRs are reachable, but
no device in a VPN address space is. Therefore, these commands need a new
parameter to tell the router which VPN to originate a ping in, for example. Of course,
a ping within a VRF, or from any CE, will not see any LSR, because those are in a
different address space. This makes sense enough in theory, but can take some getting
used to in practice.
If a spoke imports routes only from a hub, then traffic will in turn flow through the
hub to get somewhere else. (Remember, PEs forward to BGP next hops.) Because a
hub must know all the routes, it imports from all spokes. Spokes must never import
from each other. This scenario is shown in Figure, with correct use of route-targets.
Examples through show how to configure the route-targets to match the figure.
Example PE A Hub
vrf green
rd 200:1
Example PE B Spoke
Example PE C Spoke
Although the details will not be provided here, route-targets are also used to build
extranets. An extranet is a VPN with limited reachability of destinations inside other
VPNs.
GENERAL
BSNL has planned to setup NIB-II to provide world class infrastructure to offer
various value added services to a broader customer base county-wide that will help to
accelerate the Internet revolution in India. Moreover the NIB-II will create a platform,
which enables e-governance, e-banking, e-learning, etc. with the key point of Service
Level Agreements & Guarantee in tune with Global standards and customer
expectations.
The network shall seamlessly integrate with the already existing network
infrastructure comprising of the TCP/IP based NIB-I and MPLS VPN network. The
NIB-II project comprises of Technology solutions from different product
manufacturers with the provision for future expansion.
Project
[Messaging and Storage Service Platform, Provisioning, Billing & Customer care,
Enterprise Management System (EMS) and Security System.]
The Core messaging system shall be the heart of NIB-II that will enable BSNL to add
users across varied value added services. This shall envisage design and up gradation
of the current messaging system to grow from the existing infrastructure in NIB-I
supporting 650,000 users to support the increasing user base. The messaging systems
and associated Storage will be implemented in phases, in accordance with phased
induction of Access equipment.
The system shall be an integrated provisioning, billing, customer care and accounting
platform and shall support billing for the complete range of IP based services
mentioned and meet next-generation requirements as well.
(i) Setting up proven, robust, scalable Messaging Solution with best in class
security components.
(ii) Roll out across the country supported by 5 Messaging & associated storage
systems at Delhi, Mumbai, Bangalore, Chennai and Kolkata.
(iii) Designed with High Availability architecture with no single point of
failure.
Components of the Solution:
The proposed solution shall consist of the following components with the items of
functionality listed below:
(i) Messaging
a) DNS, AAA
b) MMP
c) LDAP (Consumer, Replicator Hub, Primary and Secondary)
d) SMTP IN & OUT
e) Messaging Servers
f) Address Book Servers, etc.
(ii) Storage
a) SAN Switch & SAN Storage
b) Tape Library
c) Staging Servers, etc.
Storage platform
Various Applications servers placed at the 5 Messaging Storage locations like LDAP,
AAA, EMS, Messaging, UMS & Billing etc. would require Data storage capacities
for storing User‘s mailboxes, Billing data etc. Such huge storage requirements need to
be met with the Fast, Reliable & Scalable storage devices that would be deployed as
―End to End High Performance Switched Architecture Fiber Channel SAN (Storage
Area Networks) providing No Single Point of Failure‖.
Such storage device should be compatible with all the Servers of major companies
such as HP, IBM, SUN, Dell etc. so that choice of Application Servers Platform
remains independent of the storage device.
System Dimensioning:
The user base will be serviced through 5 Messaging and associated Storage systems
that will be set up in the 5 cities. Each of the cities will be connected through the IP
Backbone. Since the proposed user base is envisaged to increase in a phased manner,
the associated messaging system is also proposed to be upgraded in phases
correspondingly.
The system should be designed to support:
On-line services such as Internet, pay-per-view TV and video on demand or a
combination of all or some of the above.
Periodic charges, such as telephone line and cable TV rental.
One-time costs, such as connection fees.
Events, such as telephone calls, data service usage, pay-per-view TV
selections, home shopping purchases, utility metered usage – such as
electricity supply (live site example)
Financial services ASP services.
Telephony services.
Security Systems
These include the following.
Load Balancers
Firewall Appliances
Intrusion Detection System
Antivirus system, etc.
The network shall be centrally managed from Network Operation Centre (NOC)
located at two sites, one of them being master and the other the disaster recovery site.
The main NOC is at Bangalore with Disaster Recovery is at Pune. Interface to the
NMS back-office facility shall be provided along with Firewall security in the Data
Centre. All customer databases shall reside centrally at NOC.
The NMS of NIB-II project 1 is the comprehensive NMS for entire NIB-II including
NIB-I, MPLS VPN, Project 2.1, Project 2.2, which will support entire F (Fault), C
(Configuration), A (Accounting including Access/Inventory), P (Performance) and S
(Security functionality). The conceptual view of eMS, NMS OSS/BSS for NIB-II is
given in figure 4 and the connectivity Architecture of NOC at Bangalore is shown in
figure .
Web Hosting
Web space (Data Storage) on servers based on UNIX and Microsoft for
hosting HTML pages with browser
Ftp access for uploading and downloading pages as per the plan. Restriction
on simultaneous ftp sessions
FrontPage etc. access for Web-publishing
Multiple Email Ids per domain with flexible email quota, as per the plan
Web Interface for centralized administration by user and administrators for
services, usage reports, invoice and other reports
It will provide access to customers for analyzing the Web-site performance
through analysis tools
Interface for online registration of domain name
Web Collocation
Necessary Security measures will be implemented both from customer and
BSNL‘s perspective
Billing for this will be done on the basis of usage
One of the service differentiator will be bandwidth on which the server is
collocated.
Security Solution
Anti-Virus solution: It will provide a mechanism to detect unknown virus. The
solution will protect any Gateway and SMTP traffic from virus
Notification: For mails containing repeated complaints regarding abuse from
the same IP address, mail will be sent automatically to the technical contact of
the assignee of that IP address
Network Intrusion detection System: The NIDS will detect unauthorized
internal/external intrusion attempts into the data centers of NIB-II and will
enable to apply appropriate policies on the firewall so as to prevent such
attacks in real time. Suitable alarms will also be sent to the Security Control
Console
Anti Control System: It is provided for Database servers, Messaging Stores,
Web-Hosting Servers and NIDS
Self-protection: Must be able to prevent hackers with root/administrator access
from circumventing or shutting down the security engine
Resource protection: Must allow controlling of access to all system resources
including data files, devices, processes/services and audit files
Rights delegation: Must provide the ability to designate specific users as
administrators, auditors and password managers etc with appropriate rights
Program Controls: Must provide protection against Back Doors and Trojan
Horses
Enterprise Management System
Objective of EMS is to provide a snap-shot graphical view of the health of
NIB-II IT infrastructure as a whole including networking equipment, servers
and services (business and process view)
Reporting system will be able to generate customized reports such as event-
level, performance -level and service-level reports grouped by specific data
fields such as time period, location, customer, series type, device type etc
Security Management will display alarm and events specified by the criteria
such as alarm type, vendor, service, location, source of attack, type of attack
and impacted services
Event Management will capture all the events that are being generated across
the complete IT infrastructure, correlates them and initiate corrective actions
automatically, as defined
System& Application Management will measure the availability and
performance of heterogeneous host systems on a 24x7x365 basis and initiate
preventive and corrective actions automatically
System& Application Management will monitor and manage multiple
attributes (such as status, memory usage, size and resident size, process time,
threads, response time, average throughput and CPU utilization etc) of a
running process and problems and perform restart when processes go down. It
will generate reports on QOS and capacity planning
OSS ARCHITECTURE
Database DB
Rating
ticketing/Help desk
DB
management
Payment Reporting
Provisioning
Accounting
Subscriber
Trouble
Order
GL &
others
Enterprise Management
Database
Voucher Management
Fault Management
Service Activation
Network Inventory
Mediation
Database system
system
NIB-II Network Infrastructure (NE&NEManagers) All NIB-II Servers (Networking and
procured in project 1,2.1,2.2 Security Appliances and their Element
Managers)
Web Portal
Web Portal will be the gateway for customer and CSR based on their
authorizations for accessing various system, services etc
Portal will have an integration, with NMS, EMS and OSS for providing
services to the BSNL‘s customer service representatives (direct, indirect,
helpdesk, supervisor) and account managers
Portal services Ranging from business, process, network, customer specific
maps/views, trouble-ticketing, pre-sales query, post-sales order-booking, order
tracking, trouble –shooting etc
Portal will integrate with components like Service Provisioning, Order
Management, Billing, Customer Care, EMS and Messaging etc. to provide a
unified view of the network and services to the customers and CSRs for all the
front office functions and some back office functions
Order status and history provide both subscribers and the customer service
representatives with sufficient data to fully manage and monitor the service
selection and delivery process
It will be possible to provide a user friendly interface for customers to plan
and schedule their bandwidth for Band width on Demand services
Services provided by portal to the customers
Customer registration services for both pre-paid and post-paid customer
Self-registration for getting information about products and services
Self-registration for availing services such as post-paid dialup service based on
telephone number authentication
Shopping cart for procuring services
Access to services such as messaging, web-hosting, storage and content-
services etc. This will include on demand services like video on demand and
online gaming etc
Booking an order for services. Allow the user to submit, and track service
requests online at any time
View current bill status in real time including billed, unbilled and pre-billed
services, payment-details and other related information
Reporting a problem by opening a fault docket and tracking its solution
View the status of related network and services subscribed
View the status of SLA compliance, SLA resolution and rebates applied
through integration with billing and NMS
ORDER MANAGEMENT
OM will have
Customer Interface Management
Order Entry and Validation
Workflow Management
SPMS will cover the provisioning of following services under project 2.1 and project
3 through configurations in files. Subscriber Provisioning will be fully flexible to
support all the requirements of services
Dial up Internet Access with different variants
Messaging with different Variants
Web Hosting
Web Collocation
Domain Hosting
Broadband Internet Access with Content delivery through SSSC.
Mediation
Billing mediation will be responsible for collecting usage and other charging data
from the various network nodes, normalize the data into a consistent format and
distribute it to other applications and billing system for processing this information
System will collect different parameters from different sources to provide
Cflow and Netflow based collection and mediation for usage based billing of
different services including MPLS-VPN, Web-hosting, Message-Hosting etc
Parameters are
Bandwidth
Volume
Time of day/ day of week/ month (Peak/off peak)
Application (WWW, Email (POP3/IMAP4), Video, E-commerce etc )
Destination
Type of Service (Gold, Silver, Bronze/best efforts) etc
DATABASE
Latest Oracle RDBMS will be used with all applications
RDBMS will work in fail over mode over geographical locations
RDBMS will work in a distributed mode across multiple servers
RDBMS will work in a cluster mode
Provisioning will be made for data replication to or from databases of project
1,2.1 and 2.2
Billing
Billing engine will cater to all the billing requirements of BSNL include Retail
Billing (Prepaid and Postpaid), Wholesale and third party billing, Inter connect
and content billing, Dealers and Agents Commissions etc
Billing system will support the preparation of detailed bill, Differential tariff,
Cross product discounting, Sponsored/split billing. Bundled accounting, Hot
billing/On-demand billing, Hierarchy/ Corporate billing, Discounts &
Promotions, Taxes, Notification system, Dealers and Agent commissions,
Content Billing
Billing system will allow customers the option of receiving complete event
details along with their invoice or view them online through the Web portal.
Provision will also be available for the customer to print the event-details from
the Web portal in a printable format
Content Billing
Objectives
The objective of this chapter is to: -
To understand the concept of the Next Generation Network
To understand the technological features of the NGN
To understand the Evolution of the NGN
To understand the role of the NGN
To understand the Architecture of the Next Generation Network
INTRODUCTION
NGN, or Next Generation Network, is new communication network architecture. The
principle is to use packet mode transmission technologies, reserved up till now for
data, to transport all the various types of telecommunication services. In addition,
interfaces are separated from the different layers of the communication network
(transmission, control and applications) to allow for a greater evolution of the
network. Finally, NGN uses the new packet technologies to offer broadband services.
The objective of NGN is to have a single network for all the services. The next-
generation network seamlessly blends the public switched telephone network (PSTN)
and the public switched data network (PSDN), creating a single multi service
network. Convergence is the process of interconnection of traditional switched circuit
networks (PSTN and mobile networks) and packet-switched networks based on the
Internet Protocol (IP) for routing. Convergence introduces new requirements.
NGN definition
User perspective
NGN enables users to get the information content they want in any
media/format, over any facilities, anytime, anywhere and in any volume.
Operator-provider perspective
NGN enables simpler, more competitive creation, operation and provisioning
of services of different nature and requirements over a convergent transport
network independently on the access network. [ETSI]
NGN is a model for future telecommunication networks
NGN is not a new network to be build
NGN is a concept for defining and deploying networks, which, due to their formal
separation into different layers and planes and use of open interfaces, offers service
providers and operators a platform which can evolve in a step-by-step manner to
create, deploy and manage innovative services
Vision of NGN
The vision of the Next Generation Network (NGN) is captured in the following
features:
Packet network transport with adequate Quality of Service is used for real-
time services such as packet telephony and videoconferencing
Internet Protocol (IP) is used as the dominant network layer protocol,
particularly as presented at the network edge and as seen by the end user
(Other protocols such as ATM may be used for backbone transport but will be
transparent to the user)
Voice over IP (VoIP) telephony is seen to be the first service to be
implemented in the NGN with other services following over time
IP access at the customer premises is made available through a standardised
gateway
Intelligence is distributed across the network (initially supported by signalling
interworking rather than a full distributed processing environment);
The NGN must interwork with Switched Circuit Networks (SCN) via media,
trunking and signalling gateways with gateway controllers
Efficient offloading of dial-up data traffic from the PSTN will be achieved by
access servers closely coupled to end exchanges
Because the NGN is basically a packet network and has no intelligence in the
routers, service platforms such as IP telephony servers and billing servers will
be provided as computing nodes in the IP network
VoIP users of the NGN must have access to value added services at least
similar to those available in the PSTN (free phone, call forwarding, call
waiting). Value-added services may be provided by access to classical IN
service platforms in the PSTN or to specialised platforms in the IP network
Full Operations System Support (OSS) is essential to the effective operation of
the NGN
Comprehensive accounting facilities in the network supporting flexible billing.
Standards for NGN is spread over a wide range of different technical committees both
inside and outside ETSI.
Resulting in duplicate work, conflicting requirements and lack of clear
definition of both the nature and scope of the remaining issues that still require
standardization
Situation recognized by many other SDOs and for a
Clear need for consolidation but subject is too huge to be covered by a single
global forum
ETSI should take a leading role in pushing for global consolidation of NGN
standardization. Most useful approach for ETSI is to push for a number of related, but
independent, initiatives. ETSI should become involved in a set of related, but
independent, initiatives covering the field of NGN standards.
NGN provides converged services based on the open common service platform,
Common IP core network combines various access networks and user services.
Legacy service networks were dedicated and isolated network with service specific
signaling and routing for service connection. NGN service networks have common IP
core network and provide a nomadically accessible common IP application regardless
of a specific access link and user devices.
NGN architecture
Next Generation network is designed in layered architecture. It has an Open standard
interfaces. It is consists of the following layers: -
Service layer
Rapid and simple service creation, implementation and provisioning
Secure access to the network capabilities from un-trusted domain
Open access to the network capabilities to large developers community
Basic building blocks of services capabilities
Transparency to the underlying network technology
Possible integration of telecom, IT, enterprise applications
Access to external resources (DB, presence, media servers, …)
Control layer
Signalling for real-time services
Control of other layers
Transport network
Support of services with different requirements (delay, jitter, packet loss, ... )
The rationale for using an IP based transport network is the reduced cost of switching
relative to PSTN exchanges. Also, core network transmission, already inexpensive in
relation to switching in the PSTN, offers greater capacities in future due to
exploitation of the wide bandwidth available on optic fiber and more efficient
methods of carrying packetised traffic. Access is at present the major cost component
in providing PSTN services. Access technologies for the Next Generation Network
include Asynchronous Digital Subscriber Loops (ADSL) and digital radio loop
systems. Fiber based access for low traffic users are a long way in the future. ADSL
uses existing copper subscriber loops. While providing greater bandwidth to the end
user, ADSL is subject to the operational problems of the current copper loop access.
The cost trends of access to the Next Generation Network are not clear and cost is
likely to continue to be a factor in providing services to underserved communities.
Further research is clearly needed in the access area.
In the next section, we take as an example of the Next Generation Network in the
service of underserved communities, namely a proposal for the Next Generation
Telecentre being researched at CeTAS [4].
Softswitch Architecture
In softswitch architecture, the service provider replaces the Class 5 switch with a
softswitch, media gateway, and application server such as BroadWorks. The
Softswitch provides trunking, SS7 networking, translations, routing and network
services, such as local number portability. BroadWorks acts as a peer to a softswitch,
using the SIP connection between the two as an "IP Inter Machine Trunk".
Unlike the class 5 switch, the softswitch and BroadWorks are not involved in the
transport or switching of the packetized voice stream. However, the softswitch does
communicate with BroadWorks for access to the IP Centrex/Hosted PBX features.
Also, if the terminating party is part of the IP Centrex/Hosted PBX group, then the
softswitch instructs the originating and terminating party to establish communications,
and keeps the entire call on the network, and as VoIP. If the terminating party resides
outside the IP Centrex/Hosted PBX group, the softswitch interacts via a network
gateway, with the Public Switched Telephone Network (PSTN). On the PSTN, a
Class 4 or Class 5 switch will handle the transport and switching of voice calls.
Class 5 Extension Architecture
A Class 5 Extension architecture allows service providers to continue to use their
existing voice network, while still offering their customers the advantages of VoIP
and IP Centrex/Hosted PBX. In this architecture, BroadWorks provides dial tone,
calling features, unified messaging, and other features provided by IP Centrex/Hosted
PBX applications. The Class 5 switch provides the network functionality such as 911,
number portability, billing, and SS7 interconnection.
BroadWorks provides the flexibility to introduce IP voice services without the need to
invest softswitch infrastructure. In this architecture, a single BroadWorks system can
leverage existing voice infrastructure, and support multiple points of presence (POP).
Providers seeking a region-by-region rollout can launch service one POP at a time,
starting with smaller capacity gateways as needed.
Another important driver is service differentiation. The initial focus of many NGNs is
to support traditional data/voice services, but today, there are service providers
building complete business strategies around new converged service platforms. They
are taking advantage of the benefits convergence provides them today and investing in
future proven technology that they believe shall provide a platform for application
growth.
NGN Equipment Types
Along with traditional voice and data equipment the NGN architecture contains
converged network equipment types such as Call Agents (e.g. Media Gateway
Controller - MGC, Gatekeeper - GK, SIP Server and Softswitch - SS), Media
Gateways (MG), Signalling Gateways (SG), Feature Servers, Application Servers,
Media Servers and provides Management, Provisioning and Billing interfaces.
The Softswitch
Softswitches are a software-based call control device that plays one of the most
significant parts in the NGN. The Softswitch provides call control interworking
between NGN protocols such as MGCP, H.248 / Megaco, SIP, H.323, and Sigtran as
well as more traditional telephony protocols such as CAS, ISDN, SS7, TCAP, and
INAP. The Softswitch can contain multiple call agent functions (e.g. MGC, SIP
Server & GK) and in some cases a SG function.
One of the many roles of a Softswitch is interfacing to the PSTN (Public Switched
Telephony Network). It does this by interworking signalling systems via SGs and the
voice circuits via MGs from PSTN switches and Intelligent Network platforms.
The choice of softswitch today is large and is influenced by factors such as target
market, scale of deployment, required functionality, available budget and service
strategy.
Who are implementing NGNs
Traditional carriers with traditional legacy equipment and services must carefully
address how they migrate to a NGN. They must decide whether to replace current
operational infrastructures, cap investment & grow organically or implement a new
parallel platform & migrate over time. Whatever the decision the scale of network
infrastructure involved will lead to significant costs and protracted timescales for
migration activities.
New operators with less legacy infrastructure and greenfield networks can plan for,
design and implement the NGN more readily. Their IP network can be designed to
provide some level of quality, a vendor can be chosen to provide an end-to-end
solution and interconnects to the PSTN and Internet can be put in place. Advances
Operational Support Systems can be utilised effectively to monitor, control, police
and bill with less integration than with traditional operators.
ISPs are looking at a potential change in their business model. Converged services
will allow the ISP to differentiate themselves while entering into a new
telecommunications market without the capital outlay of traditional networks.
Bandwidth increases brought about by DSL to the home will play a major part and so
ISPs can offer more bandwidth hungry services without the constraints of slower
speed access.
WiMAX
WiMAX is a single wireless technology that can:
Bridge the digital divide by delivering broadband in low-density areas,
Connect enterprises and residential users in urban and suburban environments
where access to copper plant is difficult,
Make portable Internet a reality by extending public WLAN hotspots to city
hotzones,
Further expand hotzones to metropolitan area coverage for mobile data-centric
service delivery.
WiMAX is state-of-the-art radio technology, offers Broadband wireless access at data
rates of several tens of Mbit/s (up to 75 Mbit/s per base station) and within a range of
several tens of kilometers (up to 50 km). This same radio technology offers high-
speed data services to all nomadic terminals (laptops, PDAs, etc.) at a better cost :
performance ratio than 3G, given an optimized trade off between throughput and
mobility. Finally, WiMAX incorporates Quality of Service elements to offer
multimedia services, including voice. Given its huge benefits, WiMAX will develop
as a self-standing radio access solution in the global network architecture. WiMAX
will also enable end-users to benefit from an "Always Best Connected" experience
when accessing their applications via the best available network, at home, on the
pause, or on the move. A technology with such enormous potential is destined for a
bright future.
Introduction
Broadband Wireless Access (BWA) has been serving enterprises and operators for
years, to the great satisfaction of its users. However, the new IP-based standard
developed by the IEEE 802.16 is likely to accelerate adoption of the technology. It
will expand the scope of usage thanks to: the possibility of operating in unlicensed
frequency bands, unique performance under Non-Line-of-Sight (NLOS) conditions,
Quality of Service (QoS) awareness, extension to mobility, and more. In parallel, the
WiMAX forum, backed by industry leaders, will encourage the widespread adoption
of broadband wireless access by establishing a brand for the technology and pushing
interoperability between products. The purpose of this White Paper is to highlight and
assess the value of WiMAX as the right solution to:
Bridge the digital divide in low-density areas where technical and economic
factors make broadband deployment very challenging,
Offer fixed broadband access in urban and suburban areas where copper
quality is poor or unbundling difficult,
Extend the currently limited coverage of public WLAN (hotspots) to citywide
coverage (hotzones) – the same technology being usable at home and on the
move,
Blanket metropolitan areas for mobile data-centric service delivery.
In addition to these uses, it has other potential applications, such as telephony or an
effective point-to-multipoint backhauling solution for operators or enterprises.
The WiMAX Forum intends to do for 802.16 what the Wi-Fi Alliance did for 802.11:
Harmonize standards and certify interoperability between equipment from
different vendors. Standardized interoperable solutions will result in mass
volume and bring down costs,
Promote and establish a brand for the technology.
WiMAX offers broadband wireless access at data rates of several tens of Mbit/s (up to
75 Mbit/s per base station) and within a range of several tens of kilometers (up to 50
km). However,
75 Mbit/s is achievable with a 20 MHz channel. Regulators will often allow only
smaller channels (10 MHz or less) reducing the maximum bandwidth,
50 km is achievable only under optimal conditions and with a reduced data rate (a few
Mbit/s). Typical coverage will be around 5 km with indoor CPE (NLOS) and around
15 km with a CPE connected to an external antenna (LOS),
Mobility will target only urban usage, with up to 60 km/h vehicle speed to
maintain optimum throughput performance.
WiMAX product availability
Mass deployment of WiMAX products is planned in two main steps:
mid-2005, availability of the 802.16REVd chipset, allowing the development
of cost optimized CPE operating indoors (NLOS),
in 2006, availability of 802.16e chipsets embedded in laptops and later on in
other mobile devices, enabling mobility (portable Internet).
Current pre-WiMAX products and initial 802.16a WiMAX products available in early
2005, operating similarly to current proprietary equipment (LOS, not cost-optimized
CPE) and at similar cost, will not be widely deployed.
Market for WiMAX
WiMAX will boost today‘s highly fragmented BWA market thanks to standardization
and interoperability, state-of-the-art radio efficiency with NLOS capability, and
strong support from the radio equipment manufacturers and chipset industries.
WiMAX will also target the mobility market with the introduction of low power-
consumption chipsets. The strong support from some of the most important chipsets
manufacturers such as Intel or Fujitsu is a key enabler for the success of WiMAX,
since it will lead to wide availability of affordable WiMAX-enabled terminals (e.g.,
laptops, PDAs, etc.).
WiMAX will open up three main markets – see Figure This will happen in three
waves:
It will bridge the digital divide in low-density areas where technical and
economic factors inhibit cost effective broadband deployments. The prime
markets are in Western Europe, North America, and some Asia-Pacific
countries. This will be the first market to take off - in 2005.
It will offer high-speed Internet and voice access in urban and suburban areas
where access to the copper plant is difficult. It will also support nomadic usage
for operators wishing to stand out from competition (the same subscription
could be used throughout a city). This market will also start in 2005, with
WiMAX progressively replacing current proprietary products.
It will then introduce the portable Internet application by providing broadband
access on the move, extending the currently limited coverage of public
WLANs to city-wide coverage (hotzones). Later expansion will be to
Metropolitan areas, providing high-speed data services under mobility
conditions. This market will first emerge in North America, followed by most
of the developed and developing countries. It will take off with the availability
of WiMAX-enabled laptops in 2006.
This section gives a more detailed analysis of WiMAX integration into fixed and the
mobile markets.
The service gap can be categorized by two characteristics: the type of area (rural or
urban) and the level of national development. See Table 1. In developed countries,
DSL service deployment has been massive in urban and sub-urban deployments,
whereas coverage of remote areas -smaller towns and rural areas - is lagging behind.
Hurdles to overcome are the poor line quality of the installed copper base, the large
distances to the central offices or cabinets, or the low population density. In this
context, WiMAX, with its QoS support, longer reach, and data rates similar to DSL, is
naturally positioned as a viable last mile option to offer broadband access to
residential users.
In emerging countries, the main focus of broadband deployment is on urban and sub-
urban areas, and will remain so in the near future. The low POTS penetration and the
low quality of the copper pair prevent mass scale DSL deployment and foster the need
for alternate broadband technologies. In this context, WiMAX is positioned as an
excellent option. Moreover, the possibility of offering broadband services in
combination with voice services will gradually lead to narrowband WLL substitution.
Mobile networks offer mobility, ubiquitous coverage, and voice support, but at the
expense of limited data rates. WiMAX can be positioned as a complementary solution
by offering high bandwidth when required, in particular in dense urban areas.
Public WLAN, while offering clear benefits, is limited in coverage and mobility
capabilities. WiMAX bypasses these limitations and offers broadband connectivity in
larger areas (hotzones). Wi-Fi and WiMAX solutions are also complementary, with
Wi-Fi being more adapted for short-range, indoor connections (in particular in the
enterprise and at home) and WiMAX for long- range outdoor connections.
From nomadicity to full mobility
While nomadicity offers mobility within the coverage area of a single base station,
limited mobility access implies session continuity throughout the network possibly
with between base stations.
A new generation of networks with multi-access (3G, Wi-Fi, WiMAX, DSL, FTTU,
etc.) enables end-users to enjoy an ―Always Best Connected‖ experience when
accessing their applications via the best available network at home, on the pause, or
on the move. See Figure WiMAX becomes an additional radio access solution in the
global network architecture.
WiMAX, the obvious choice for operators
By integrating WiMAX into their networks, mobile operators can boost their service
with high bandwidth, when necessary, the same applications (messaging, agenda,
location-based services) being offered on both networks with a single billing.
Mobile operators can also reuse existing radio sites and backhauling equipment to
facilitate the deployment of WiMAX.
Fixed operators, incumbent or alternate, will offer nomadic and mobile usage as an
addition to their fixed access offering to complement their DSL and Wi-Fi bundle. For
those having deployed WiMAX for fixed access, this is also a natural evolution of
their offering.
WiMAX Technology Challenge WiMAX, more flexibility and security
Unlike WLAN, WiMAX provides a media access control (MAC) layer that uses a
grant-request mechanism to authorize the exchange of data. This feature allows better
exploitation of the radio resources, in particular with smart antennas, and independent
management of the traffic of every user. This simplifies the support of real-time and
voice applications.
One of the inhibitors to widespread deployment of WLAN was the poor security
feature of the first releases. WiMAX proposes the full range of security features to
ensure secured data exchange:
Terminal authentication by exchanging certificates to prevent rogue devices,
User authentication using the Extensible Authentication Protocol (EAP),
The WiMAX system relies on a new radio physical (PHY) layer and appropriate
MAC layer to support all demands driven by the target applications.
However, in contrast to single carrier modulation, the OFDM signal has an increased
peak: average ratio and increased frequency accuracy requirements. Therefore,
selection of appropriate power amplifiers and frequency recovery concepts are
crucial.
An important and very challenging function of the WiMAX system is the support of
various advanced antenna techniques, which are essential to provide high spectral
efficiency, capacity, system performance, and reliability:
Beam forming using smart antennas provides additional gain to bridge long
distances or to increase indoor coverage; it reduces inter-cell interference and
improves frequency reuse,
Transmit diversity and MIMO techniques using multiple antennas take
advantage of multipath reflections to improve reliability and capacity.
System performance
Table gives typical cell size and throughput at 3.5 GHz in various configuration and environments.
Although 2.4 GHz and 5 GHz non-licensed bands are largely available, their usage
could be limited to trials because of the risks of interference preventing QoS
commitments.
The 2.5 and 3.5 GHz licensed bands will be the most common bands for WiMAX
applications. It should be noted that the 5 GHz band is also partially licensed in some
countries.
chipsets are integrated into laptops and other portable devices, it will provide high
speed data services on the move, extending today‘s limited coverage of public WLAN
to metropolitan areas. Integrated into new generation networks with seamless roaming
between various accesses, it will enable end users to enjoy an ―Always Best
Connected‖ experience. The combination of these capabilities makes WiMAX
attractive for a wide diversity of people: fixed operators, mobile operators, and
wireless ISPs, but also for many vertical markets and local authorities. Alcatel, the
worldwide broadband market leader with a market share in excess of 37%, is
committed to offer complete support across the entire investment and operational
cycle required for successful deployment of WiMAX services.
VOIP Introduction
In the late eighties and early nineties it was realized that integrating these networks
into a single integrated network, such that all services would use common facilities,
would result in efficiency and cost savings. This was the new mantra that made
possible the creation and deployment of ISDN and similar networks, bringing data
and voice communication together. However, nearly all these networks were built and
operated by major telecommunication equipment manufacturers and service
providers. Although, the major international standards bodies such as ITU-T
(formerly CCITT), or the ETSI defined a relevant set of standards for implementation
and to assure inter-operability between products from different telecom equipment
manufacturers, these standards were still inadequate to reduce the proprietary nature
of most implementations. It meant that even if the standards assured inter-operability
among equipment and networks for existing communication services (which number
only in dozens), they fell woefully short, on account of proprietary implementations,
for being able to spawn and envisage even greater types of potential communication
services. Consider what the Internet has done for conceiving and spawning
innumerable types of web-based applications at progressively lower costs.
Subsequently, from the mid-nineties onwards, the Internet has proved to be the major
all-encompassing network that demonstrated its prowess in delivering all types of
media (data, voice and video) at lowest cost. Data communication equipment
manufacturing companies, such as Cisco, have also been instrumental in driving up
the reach of the Internet and Internet protocols. Internet protocols became the
preferred protocol for delivering communication payload for all types of networks,
mainly for their open and widely accepted interface implementations. Contrast this
with ATM, which somehow has been left behind.
However, a major shortcoming in the Internet protocols – TCP, UDP over IP has been
their inability to transfer real-time application data such as voice and video. The major
issues were jitter, network latency, echo cancellation, quality of service and security.
To overcome this shortcoming, newer implementations of IP (e.g. IP version 6) and a
flurry of associated protocol specifications (e.g. H.323 or SIP) were defined to plug
the gap between the Internet protocols and other telecom application-oriented
protocols. These activities of developing and implementing new IP-based protocol
definitions for multimedia communications; their underlying network architecture and
also integration with existing networks are collectively termed as Voice over IP or
VoIP in short.
ISDN
PSTN
TEL
EX
TELEGRA INTERNET
PH
ACCESS
ACCESS TRANSMISI SWITCHIN GATEWAY ROTERS LAN
ON G
The effort to integrate all communication services over IP is a transition effort on two
major fronts. First, the Telecommunication equipment manufacturers were interested
in integrating the currently deployed services and network protocols to IP. Second, the
Data communication equipment manufacturers, who were already using IP for data
communication services were moving upward to provide voice and multimedia
services over data networks.
The culmination of the above efforts and various standards making bodies is supposed
to achieve the objectives of service portability, network convergence and secured
network access. It is hoped that with the transition of voice (multimedia) over to
Internet protocols would open the doors to the conceptualisation and implementation
of numbers services in thousands from the current dozens.
Issues in voice communication over networks
As the IP network was primarily designed to carry data, it does not provide real-time
guarantees but only provides best effort services, which is inadequate for voice
communication. Upper layer protocols were designed to provide such guarantees.
Further, as there are several vendors in the market implementing these protocols,
conformance to standards and interoperability issues have become important. The
major issues governing transfer of a voice stream over the Internet or using Internet
protocols are listed below.
Bandwidth requirement
In the analog world, the voice transmission frequency spectrum requirement is 0-3.4
KHz in the base band, and is nominally called a 4 KHz voice channel for
convenience. For digital telecommunication, the signal is sampled at twice the rate.
The minimum-sampling rate required is thus 8 KHz. If each sample contains 8 bits,
the digital bandwidth required works out to be 64 Kbps.
Telco quality voice requires sampling at 8 KHz. The bandwidth then depends on the
level of quantization. With linear quantization at 8 bits/sample or at 16 bits/sample,
the bandwidth is either 64 Kbps or 128 Kbps. Further, the quantization (e.g. PCM) is
modified by using an A-law or µ-law companding curve.
Pulse code modulation (PCM) and adaptive differential PCM (ADPCM) are examples
of ―waveform‖ CODEC techniques. Waveform CODECs are compression techniques
that exploit the redundant characteristics of the waveform itself. In addition to
waveform CODECs, there are source CODECs that compress speech by sending only
simplified parametric information about voice transmission; these CODECs require
less bandwidth.
Some algorithms for voice compression and decompression are given in the table
below.
Table-Coding Algorithms
Input Range Transmission Rate Standard
G.711
G.729 A
Compression Method Bit Rate (Kbps) Framing Size (ms) MOS Score
Although it might seem logical from a resource usage standpoint to convert all calls to
low bit-rate CODECs to save on infrastructure costs, there are drawbacks to
compressing voice. One of the main drawbacks is signal distortion due to multiple
encodings (called tandem encodings). For example, when a G.729 voice signal is
tandem-encoded three times, the MOS score drops from 3.92 (very good) to 2.68
(unacceptable.
Telco-grade voice refers to MOS scores of 4 or above.
Delay
A very important design consideration in implementing voice communications
networks is minizing one-way, end-to-end delay. Voice traffic is real-time traffic and
if there is too long a delay in voice packet delivery, speech will be unrecognisable. An
acceptable delay is less than 200 milliseconds. Delay is inherent in voice networking
and is caused by a number of different factors.
There are basically two kinds of delay inherent in today‘s telephony networks:
Propagation delay – caused by the characteristics of the speed of light
traveling via a fiber-optic-based or copper-based medium of the underlying
network.
Handling delay (also called serialization delay) – caused by the devices that
handle voice information and have a signicant impact on voice quality in a
packet network. This delay includes the time it takes to generate a voice
packet. DSPs may take 5ms to 20ms to generate a frame and usually one or
more frames are placed in a voice packet. Another component of this delay is
the time taken to move the packet to the output queue. Some devices expedite
this process by determining packet destination and getting the packet to output
queue quickly. The actual delay at the output queue, in terms of time spent in
the queue before being serviced, is yet another component of this handling
delay and is normally around 10ms. A CODEC-induced delay is considered a
handling delay. The table below shows the delay introduced by different
CODECs.
Serialization delay
Serialization delay is the amount of time a router takes to place a packet on a wire for
transmission. Fragmentation helps to eliminate serialization delay, but fragmentation,
such as FRF.12, doesn‘t help without a queuing mechanism in place. For example, if a
1000-byte packet enters a router‘s queue and is fragmented into ten 100-byte packets,
without a queuing mechanism in place, a router will still send all 1000-bytes before it
starts to send another packet. Conversely, if there is a queuing mechanism in place,
but no fragmentation, voice traffic can still fail. If a router receives a 1000-byte packet
in its queue and begins sending this packet in an instant before it receives a voice
packet, the voice packet will have to wait until all 1000 bytes are sent across the wire,
before entering the queue, because once a router starts sending a packet, it will
continue to do so until the full packet is processed. Therefore, it is essential that there
is a method for a router to break large data packets into smaller ones, and a queuing
strategy in place to help voice packets jump to the front of a queue ahead of data
packets for transmission.
End-to-End delay
End-to-end delay depends on the end-to-end signal paths/data paths, the CODEC, and
the payload size of the packets.
Jitter
Jitter is variation in the delay of arrivals of voice packets at the receiver. This causes a
discontinuity of the voice stream. It is usually compensated for by using a play-out
buffer for playing out the voice smoothly. Play-out control can be exercised both in
adaptive or non-adaptive play-out delay mode.
Echo Cancellation
Echo is hearing your own voice in the telephone receiver while you are talking. When
timed properly, echo is reassuring to the speaker. If the echo exceeds approximately
25ms, it can be distracting and cause breaks in the conversation. In a traditional
telephony network, echo is normally caused by a mismatch in impedance from the
four-wire network switch conversion to the two-wire local loop and is controlled by
echo cancellers.
In voice over packet-based networks or VoIP, echo cancellers are built into the low
bit-rate CODECs and are operated on echo DSP. Echo cancellers are limited by
design by the total amount of time they will wait for the reflected speech to be
received, which is known as an echo trail. The echo trail is normally 32ms.
Reliability
Traditional data communication strives to provide reliable end-to-end communication
between two peers. They use checksum and sequence numbering for error control and
some form of negative acknowledgement with a packet retransmission handshake for
error recovery. The negative acknowledgement with subsequent re-transmission
handshake adds more than a round trip delay to transmission. For time-critical data,
the retransmitted message/packet might therefore be entirely useless. Thus, VoIP
networks should leave the proper error control and error recovery scheme to higher
communication layers. They can thus provide the level of reliability required, taking
into account the impact of the delay characteristics. Therefore, UDP is the transport
level protocol of choice for voice and like communications. Reliability is built into
higher layers.
Audio data is delay-sensitive and requires the transmitted voice packets to reach the
destination with minimum delay and minimum delay jitter. Although TCP/IP provides
reliable connection, it is at the cost of packet delay or higher network latency. On the
other hand, UDP is faster compared to TCP. However, as packet sequencing and some
degree of reliability are required over UDP/IP, RTP over UDP/IP is usually used for
voice and video communication.
Interoperability
In a public network environment, in order for products from different vendors to inter-
operate with each other, they need to conform to standards. These standards are being
devised by the ITU-T and the IETF. H.323 from ITU-T is by far the more popular
standard. However, SIP/MGCP standards from IETF are rapidly gaining more
acceptance as relatively light weight and easily scalable protocols.
Security
On the Internet, since anybody can capture packets meant for someone else, security
of voice communication becomes an important issue. Some measure of security can
be provided by using encryption and tunneling. Usually, the common tunneling
protocol used is Layer 2 Tunneling protocol, and the common encryption mechanism
used is Secure Sockets Layer (SSL).
Integration with PSTN and ISDN
IP Telephony needs to co-exist with traditional PSTN for still some more time. It
means that both PSTN and IP telephony networks should appear as a single network
to users. This is achieved through the use of gateways between the Internet on the one
hand and PSTN or ISDN on the other.
Scalability
As succeeding VoIP products strive to provide Telco-grade voice quality over IP as is
true for PSTN, but at a progressively lower cost, there is a potential for high growth
rates in VoIP systems. in such a scenario, it is essential that these systems be flexible
enough to grow into large user markets.
Typical voice call handling in a VoIP application
It is useful to understand what happens at an application level when a call is placed
using VoIP. The diagram below describes the general flow of a two-party voice call
using VoIP.
IP PSTN
Network
Step 2
Dial Tone Step 4-IP Address
resolution
Ringin
g
Step 5- Off Hook
Step 5-Call
Request
CODEC using H.323/SIP
Talk-
Audio
Step 6-Audio
Transport Step 7
using DTMF
RTP/RTCP
Step 8
Bye
Step Action
Step1. The use picks up the handset; this signals an off-hook condition to the
signaling application part of VoIP.
Step2. The session application part of VoIP issues a dial tone and waits of the
user to dial a telephone number.
Step3. The user dials the telephone number; those numbers are accumulated and
stored by the session application.
Step4. After enough digits are accumulated to match a configured destination
pattern, the telephone number is mapped to an IP host via the dial-plan
mapper. The IP host has a direct connection t either the destination
telephone number or a PBX that is responsible for completing the call tot
the configured destination pattern.
Step5. The session application then runs the session protocol (H.323 or
SIP/MGCP) to establish a transmission and a reception channel for each
direction over the IP network. If the call is being handled by a Private
Branch Exchange (PBX), the PBX forwards the call to the destination
telephony. If Resource Reservation Protocol (RSVP) has been
configured, the RSVP reservations are put into effect to achieve the
desired QoS over the IP network.
Step6. The coder-decoder compression schemes (CODECs) are enabled for both
ends of the connection and the conversation proceeds using Real-time
Transport Protocol/User Datagram Protocol/Internet Protocol
(RTP/UDP/IP) as the protocol stack.
Step7. Any call-progress indications (or other signals that can be carried inband)
are cut through the voice path as soon as an end-to-end audio channel is
established. Signaling that can be detected by the voice ports (for
example, inband dual-tone multifrequency (DTMF) digits after the call
setup is complete) is also trapped by the session application at either end
of the connection. It is carried over the IP network, encapsulated in the
Real-time Transport Control Protocol (RTCP) using the RTCP
application-defined (APP) extension mechanism.
Step8. When either end of the call hangs up, the RSVP reservations are torn
down (if RSVP is used) and the session ends. Each end becomes idle,
waiting for the next off-hook condition to trigger another call setup.
Scope:
The Wi-MAX certification mark is given to product that pass conformity and
interoperability test for the IEEE 802-16 standard which caters for the Air interface
standard for point-to-multipoint broad-band Internet access over a wireless
connection.
Wireless rather than wired access, so that it would be a lot less expensive than cable
or Digital Subscriber Line (DSL) and much easier to extend to suburban and rural
areas.
Broad coverage like the cell phone network instead of small Wi-Fi hotspots , 50 Kms.
IEEE 802.16e is for mobile wireless access from laptops and hand held. It is
analogous to a faster version of third-generation (3G) telecommunications technology.
(Wi-Max proponent Intel Corp. has promised 802.16e-enabled laptops by early 2007)
Working of Wi-MAX:
Wi-MAX operates similar to Wi-Fi but at higher speeds, over greater distances and
for a greater number of users. It consists of following two parts:
A Wi-MAX tower, similar in concept to a cell-phone tower, and which can provide
coverage to a very large area as big as 3,000 square miles (~8,000 square km).
The non-line-of-sight, Wi-Fi sort of service, where a small antenna on your computer
connects to the tower. In this mode, Wi-MAX uses a lower frequency range - 2 GHz
to 11 GHz (similar to Wi-Fi). As lower-wavelength transmissions are not as easily
disrupted by physical obstructions they provided non line of sight coverage.
The line-of-sight service, where a fixed dish antenna points straight at the Wi-MAX
tower from a rooftop or pole. The line-of-sight connection is stronger and more stable,
so it is able to send a lot of data with fewer errors. Line-of-sight transmissions use
higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies,
there is less interference and lots more bandwidth as shown in Figure.
The Wi-MAX protocol is a way of networking computers together Wi-MAX does not
conflict with Wi-Fi. It is designed to interoperate with Wi-Fi and may indeed
complement it. This complementarity to Wi-Fi also extends to all flavors of wired
Ethernet (IEEE 802.3), token ring (IEEE 802.5) and non-IEEE standards that use the
same Logical Link Control (LLC) including Fiber Distribution Data Interface (FDDI)
and cable modem Data Over Cable Service Interface Specification (DOCSIS).
Technical Advantage of Wi-MAX:
IEEE 802.16 networks use the same Logical Link Controller (standardized by IEEE
802.2) as other LANs and WANs. It can be both bridged and routed to them. Wi-
MAX is a wireless Metropolitan Area Network (MAN) technology that can connect
IEEE 802.2 (Wi-Fi) hotspots to the Internet and provide a wireless extension to cable
and DSL for last mile (last km) broadband access. IEEE 802.16 provides up to 50 kms
(31 miles) of linear service area range and allows users connectivity without a direct
line of sight to a base station. Note that this should not be taken to mean that users 50
kms (31 miles) away without line of sight will have connectivity. The technology also
provides shared data rates up to 70 Mbps, which, according to Wi-MAX proponents,
is enough bandwidth to simultaneously support more than 60 businesses with T1-type
connectivity and well over a thousand homes at 1Mbps DSL-level connectivity.
An important aspect of the IEEE 802.16 is that it defines a MAC layer that supports
multiple Physical Layer (PHY) specifications .The MAC is significantly different
from that of Wi-Fi (and Ethernet from which Wi-Fi is derived).
In Wi-Fi, the Ethernet uses contention access: all subscriber stations wishing to pass
data through an access point are competing for the Access Points (AP's), attention on
a random basis. This can cause distant nodes from the Access Point (AP) to be
repeatedly interrupted by less sensitive, closer nodes, greatly reducing their
throughput. By contrast, the 802.16 MAC is a scheduling MAC where the subscriber
station only has to compete once (for initial entry into the network). After that it is
allocated a time slot by the base station. The time slot can enlarge and constrict, but it
remains assigned to the subscriber station meaning that other subscribers are not
supposed to use it but take their turn. This scheduling algorithm is stable under
overload and over subscription (unlike 802.11). It is also much more bandwidth
efficient. The scheduling algorithm also allows the base station to control Quality of
Service (QoS) by balancing the assignments among the needs of the subscriber
stations.
The Wi-MAX outdistances Wi-Fi by miles. Wi-Fi's range is about 100 feet (30
metres). Wi-MAX will blanket a radius of 30 miles (50 kms) with wireless access.
The increased range is due to the frequencies used and the power of the transmitter.
Wi-MAX is both faster and has a longer range than Wi-Fi. However, Wi-MAX does
not necessarily conflict with Wi-Fi but is designed to interoperate with it and may
indeed complement it.
Wi-MAX (IEEE 802.16) Specifications:
Range: 30 miles (50-kms) radius from base station.
Speed: 70 Mbps.
Line-of-sight not needed between user and base station.
Network Scale:
The smallest-scale network is a Personal Area Network (PAN). A PAN allows
devices to communicate with each other over short distances. Bluetooth is the best
example of a PAN.
The next step up is a Local Area Network (LAN). A LAN allows devices to share
information, but is limited to a fairly small central area, such as a company's
headquarters, a coffee shop or your house. E.g. Wi-Fi to connect the network
wirelessly.
Wi-MAX is the wireless solution for the next step up in scale, the Metropolitan Area
Network (MAN). A MAN allows areas the size of cities to be connected. (Figure )
The current 802.16 standard is IEEE Std 802.16-2004. It renders the previous (and
1st) version 802.16-2001 obsolete, along with its amendments 802.16a and
802.16c.IEEE Std 802.16-2004 addresses only fixed systems.
802.16-2004: IEEE Standard for Local and Metropolitan Area Networks Part
16 -- Air Interface for Fixed Broadband Wireless Access Systems
802.16.2-2004: IEEE Recommended Practice for Local and Metropolitan Area
Networks -- Coexistence of Fixed Broadband Wireless Access Systems.
802.16-2001 obsolete by 802.16-2004.
802.16a amendment, obsolete by 802.16-2004.
802.16c amendment, obsolete by 802.16-2004.
802.16e in progress, adds mobility to the standard.
extended to provide portable and mobile device support in the future, Wi-MAX has
additional advantages for developing economies such as that of India, that don‘t have
widespread broadband infrastructure already in place. By leapfrogging to the latest
technology, they gain not only the best broadband connectivity when in a fixed
environment, but also the potential to easily add fully mobile high-speed data
connectivity in the future.
Because Wi-MAX is standards-based, it can enable economies of scale that will bring down the cost
of broadband access and ensure interoperability while increasing ease of implementation. Without
standards, proprietary equipment manufacturers provide the entire stack of hardware and software
building blocks, and restrictive licensing can drive up costs. For the service provider, standards-based
products with fewer variants and larger volume production will drive the cost of equipment down.
Competition among vendors will also lower equipment costs, because service providers will be able
to buy from many sources and shop for the best price. For consumers, wireless products will be
differentiated by the service, not the technology, and thus the consumer will benefit from a variety of
competitive and cost-effective solutions that match their communication needs. Table 1 depicts the
throughput comparison between other cellular technologies and Wi-MAX. Wi-MAX delivers greater
throughput and greater scalability to meet consumer‘s needs.
Cellular Wi-MAX
Metric Edge HSPDA 1xEVDO 802.16-2004 802.16e
Technology TDMA GMSK WCDMA (5 CDMA2K QPSK OFDM/OFDMA Scalable
Family and 8-PSK MHz) QPSK & & 16 QAM QPSK, 16 QAM & OFDMA
and Modulation 16 QAM 64 QAM QPSK, 16AM
& 64 QAM
Peak Data Rate 473 Kbps 10.8 Mbps 2.4 Mbps 75 Mbps (20 MHz 75 Mbps (Max)
channel) 18 Mbps (5
MHz channel)
Average User T-put < 130 < 750 kbps < 140 Kbps 1–3 Mbps 80% pfmc
Throughput Kbps initially of fixed usage
model
Range Outdoor 2–10 kms 2–10 kms 2–10 kms 2–10 kms 2–7 kms
(Avg Cell)
Channel BW 200 KHz 5 MHz 1.25 MHz Scalable 1.5–20 Scalable 1.5–20
MHz MHz