design and analysis of mpls based vpn
TRANSCRIPT
![Page 1: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/1.jpg)
Advisor : Prof. Nader Mir
Co-Advisor : Prof. Chang Choo
By,
Devang Doshi (005746754)
Maulik Gandhi (006204692)
![Page 2: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/2.jpg)
Abstract
Introduction
Architecture
Results and Analysis
Conclusion
![Page 3: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/3.jpg)
Need for higher scalable networks with
better switching ability.
Advantages of MPLS networks
Simulation of MPLS and IP networks
Comparison and analysis of the results
![Page 4: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/4.jpg)
Communication between different sites of a company
Need for security of the data
Disadvantages of the leased lines
Costly
Wastage of Bandwidth
Advantages of Virtual Private Networks
Cost Effective as the data is transferred over internet
Data Security with use of Authorization, Authentication and Encryption
Bandwidth Utilization
![Page 5: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/5.jpg)
Replication of Private WAN over internet.
VPN extends the private intranet over
internet with the help of tunneling.
Tunneling[1][2]
![Page 6: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/6.jpg)
Disadvantages
Not scalable
Designing and operating virtual backbone for every
customer is labor-extensive
Amount of configurations changes required when a
new site is added.[3][4]
![Page 7: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/7.jpg)
Type of tunneling protocol MPLS
![Page 8: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/8.jpg)
Scalable
Designing and operating the edge routers is much
more simpler
Amount of configurations changes required when
a new site is added is less.
![Page 9: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/9.jpg)
Use of labels
![Page 10: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/10.jpg)
Experimental field is used for QoS
If S=0 current label is not the last label
TTL is the maximum time allowed for a label in the network
Stack of labels used for hierarchical tunneling[5]
![Page 11: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/11.jpg)
Identify the neighbors
Assignment of FEC by upstream LSR
Request for labels by upstream LSR
Receive the label and construct the
forwarding table
![Page 12: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/12.jpg)
![Page 13: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/13.jpg)
Advantages
Scalability
Security
Speed
![Page 14: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/14.jpg)
Selecting the scalable VPN
Design a network model with
parameters
Network simulation tool
Generate the results and analysis of
results
Represent in graphical plots
![Page 15: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/15.jpg)
Link delay = 10 ms;
Link BW = 3 Mb;
Burst time = 3 Sec;
Idle rate = 2 Sec;
Traffic rate = 2/1Mb/s;
Data packet size = 100B, 300B, 500B, 800B,
1000B, 3000B, 6000B.
No. of Sending node = 2;
Simulation time = 40 Sec;
![Page 16: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/16.jpg)
![Page 17: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/17.jpg)
![Page 18: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/18.jpg)
![Page 19: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/19.jpg)
![Page 20: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/20.jpg)
OMNet++
Opnet
NS2
![Page 21: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/21.jpg)
NS2
Written in C++/Otcl/Tcl
Can be mounted on Windows, Unix,
Free BSD, Linux
Mostly used for the simulation of routing
protocols, multicasting and ad-hoc
networkinng
Supports wired as well as wireless
communication
![Page 22: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/22.jpg)
![Page 23: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/23.jpg)
Xgraph generated with the help of delay
trace files of MPLS and IP networks.
![Page 24: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/24.jpg)
MPLS IPv4
![Page 25: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/25.jpg)
![Page 26: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/26.jpg)
![Page 27: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/27.jpg)
![Page 28: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/28.jpg)
![Page 29: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/29.jpg)
![Page 30: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/30.jpg)
![Page 31: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/31.jpg)
Selection of network simulator
Installation of NS2
Simulation using NS2
Writing AWK scripts
![Page 32: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/32.jpg)
MPLS VPN better then IPv4 network in terms of Min, Max Avg delay, throughput and packet loss.
MPLS VPN is scalable, efficient in terms of CPU usage and BW usage.
Successfully concludes project with NS2 results and analysis.
Learning various VPNs, MPLS VPN, NS2, Tcl scripts, AWK Scripts and IEEE papers.
![Page 33: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/33.jpg)
1. J. Snader, “VPNs Illustrated: Tunnels, VPNs, and IPsec”. Addison-Wesley, 2006 page 250-360
2. M. Gupta, “Building a Virtual Private Network”. Ohio: Premeir Press, 2003
3. N. F. Mir, “Computer and Communication Networks.” Prentice Hall, 2006
4. B. Davie and Y. Rekhter, “MPLS Technology and Applications”. Morgan Kaufmann Publisher, 2000 , Pages 211 – 244
5. E. Rosen and Y. Rekhter. (2010, October 28) “BGP/MPLS VPNs”. Online. Available: http://www.rfc-editor.org/rfc/rfc2547.txt Pages 2-5 (2010, January 30) “Advantages of VPN”. Online Available:http://www.vpn-info.com/advantages_of_vpn.htm
![Page 34: Design And Analysis Of MPLS based VPN](https://reader033.vdocuments.site/reader033/viewer/2022060200/559869401a28ab1f0b8b4599/html5/thumbnails/34.jpg)