34
Advisor : Prof. Nader Mir Co-Advisor : Prof. Chang Choo By, Devang Doshi (005746754) Maulik Gandhi (006204692)

Design And Analysis Of MPLS based VPN

Embed Size (px)

Citation preview

Page 1: Design And Analysis Of MPLS based VPN

Advisor : Prof. Nader Mir

Co-Advisor : Prof. Chang Choo

By,

Devang Doshi (005746754)

Maulik Gandhi (006204692)

Page 2: Design And Analysis Of MPLS based VPN

Abstract

Introduction

Architecture

Results and Analysis

Conclusion

Page 3: Design And Analysis Of MPLS based VPN

Need for higher scalable networks with

better switching ability.

Advantages of MPLS networks

Simulation of MPLS and IP networks

Comparison and analysis of the results

Page 4: Design And Analysis Of MPLS based VPN

Communication between different sites of a company

Need for security of the data

Disadvantages of the leased lines

Costly

Wastage of Bandwidth

Advantages of Virtual Private Networks

Cost Effective as the data is transferred over internet

Data Security with use of Authorization, Authentication and Encryption

Bandwidth Utilization

Page 5: Design And Analysis Of MPLS based VPN

Replication of Private WAN over internet.

VPN extends the private intranet over

internet with the help of tunneling.

Tunneling[1][2]

Page 6: Design And Analysis Of MPLS based VPN

Disadvantages

Not scalable

Designing and operating virtual backbone for every

customer is labor-extensive

Amount of configurations changes required when a

new site is added.[3][4]

Page 7: Design And Analysis Of MPLS based VPN

Type of tunneling protocol MPLS

Page 8: Design And Analysis Of MPLS based VPN

Scalable

Designing and operating the edge routers is much

more simpler

Amount of configurations changes required when

a new site is added is less.

Page 9: Design And Analysis Of MPLS based VPN

Use of labels

Page 10: Design And Analysis Of MPLS based VPN

Experimental field is used for QoS

If S=0 current label is not the last label

TTL is the maximum time allowed for a label in the network

Stack of labels used for hierarchical tunneling[5]

Page 11: Design And Analysis Of MPLS based VPN

Identify the neighbors

Assignment of FEC by upstream LSR

Request for labels by upstream LSR

Receive the label and construct the

forwarding table

Page 12: Design And Analysis Of MPLS based VPN
Page 13: Design And Analysis Of MPLS based VPN

Advantages

Scalability

Security

Speed

Page 14: Design And Analysis Of MPLS based VPN

Selecting the scalable VPN

Design a network model with

parameters

Network simulation tool

Generate the results and analysis of

results

Represent in graphical plots

Page 15: Design And Analysis Of MPLS based VPN

Link delay = 10 ms;

Link BW = 3 Mb;

Burst time = 3 Sec;

Idle rate = 2 Sec;

Traffic rate = 2/1Mb/s;

Data packet size = 100B, 300B, 500B, 800B,

1000B, 3000B, 6000B.

No. of Sending node = 2;

Simulation time = 40 Sec;

Page 16: Design And Analysis Of MPLS based VPN
Page 17: Design And Analysis Of MPLS based VPN
Page 18: Design And Analysis Of MPLS based VPN
Page 19: Design And Analysis Of MPLS based VPN
Page 20: Design And Analysis Of MPLS based VPN

OMNet++

Opnet

NS2

Page 21: Design And Analysis Of MPLS based VPN

NS2

Written in C++/Otcl/Tcl

Can be mounted on Windows, Unix,

Free BSD, Linux

Mostly used for the simulation of routing

protocols, multicasting and ad-hoc

networkinng

Supports wired as well as wireless

communication

Page 22: Design And Analysis Of MPLS based VPN
Page 23: Design And Analysis Of MPLS based VPN

Xgraph generated with the help of delay

trace files of MPLS and IP networks.

Page 24: Design And Analysis Of MPLS based VPN

MPLS IPv4

Page 25: Design And Analysis Of MPLS based VPN
Page 26: Design And Analysis Of MPLS based VPN
Page 27: Design And Analysis Of MPLS based VPN
Page 28: Design And Analysis Of MPLS based VPN
Page 29: Design And Analysis Of MPLS based VPN
Page 30: Design And Analysis Of MPLS based VPN
Page 31: Design And Analysis Of MPLS based VPN

Selection of network simulator

Installation of NS2

Simulation using NS2

Writing AWK scripts

Page 32: Design And Analysis Of MPLS based VPN

MPLS VPN better then IPv4 network in terms of Min, Max Avg delay, throughput and packet loss.

MPLS VPN is scalable, efficient in terms of CPU usage and BW usage.

Successfully concludes project with NS2 results and analysis.

Learning various VPNs, MPLS VPN, NS2, Tcl scripts, AWK Scripts and IEEE papers.

Page 33: Design And Analysis Of MPLS based VPN

1. J. Snader, “VPNs Illustrated: Tunnels, VPNs, and IPsec”. Addison-Wesley, 2006 page 250-360

2. M. Gupta, “Building a Virtual Private Network”. Ohio: Premeir Press, 2003

3. N. F. Mir, “Computer and Communication Networks.” Prentice Hall, 2006

4. B. Davie and Y. Rekhter, “MPLS Technology and Applications”. Morgan Kaufmann Publisher, 2000 , Pages 211 – 244

5. E. Rosen and Y. Rekhter. (2010, October 28) “BGP/MPLS VPNs”. Online. Available: http://www.rfc-editor.org/rfc/rfc2547.txt Pages 2-5 (2010, January 30) “Advantages of VPN”. Online Available:http://www.vpn-info.com/advantages_of_vpn.htm

Page 34: Design And Analysis Of MPLS based VPN