MPLS
MPLS
MPLS
net/publication/45601721
CITATIONS READS
12 8,540
2 authors, including:
Dinesh Kumar
Dav Institute of Engineering and Technology
42 PUBLICATIONS 385 CITATIONS
SEE PROFILE
All content following this page was uploaded by Dinesh Kumar on 16 May 2014.
1. INTRODUCTION
MPLS stands for Multiprotocol Label Switching, is a technology
proposed by Internet engineering Task Force (IETF) it was
designed to facilitate several problems areas in the internet
including routing performance and is increasingly being adopted
by service providers in their core networks. MPLS solutions are
to be used with Layer2 and Layer 3 Protocols. A label is a short
fixed length identifier that is used to forward the packets. With
MPLS, labels are attached to the packets at the ingress point to
an MPLS network. Within the network the labels are used to
route the packets without regard to the original packets header
information, These labels can be stacked as a LIFO labels
enabling MPLS to be combined for transport and distribution.
MPLS header is 32 bits long [5]. The label field gives
information needed to forward the packet and is the basis upon
which MPLS switching operations occur. The COS bits affect
the scheduling and or discard algorithms applied to the packet as
it is transmitted through the network. These bits are not
modified by the embedded implementation of MPLS. The Stack
bit is set to 1 for the last entry in the label stack and 0 for all
other label stack entries. The TTL field is decremented by 1
each time the packet passes through a router. The packet is
discarded when the TTL reaches zero.
13
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.1, August 2010
4. IMPORTANCE OF MPLS OVER IP- 5.1 MPLS traffic engineering forwarding and
BASED ROUTING VFEC Forwarding
a) Congestion Awareness: COS support on the basis of Traffic MPLS-TE forwarding strategy is totally different. With the same
or user is not possible in IP which eventually results in destination address but different source address, MPLS-TE will
congested routes but MPLS overcomes this problem with FEC divide these two flows into different paths. Traditional single
support also the possible solution provided by IP to overcome FEC forwarding and MPLS-TE all aims at a specific label which
this problem is termed as load balancing but due to its simple chooses a unique LSP path which is shown as follows:
criteria of dividing the traffic it suffers from scalability problem.
14
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.1, August 2010
15
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.1, August 2010
and prevention of new services. Varieties of Security Encryption So, in the future work, we are targeting to
Techniques are used for securing MPLS technology. There are implement some of the IPSec Encryption standards like AES,
various attacks which can break the MPLS technology. For DES and Triple DES on the MPLS network in order to
example a brute force attack is a strategy used to break the Overcome Security Gap Analysis of this Technology.
encryption of data in MPLS Technology. It involves traversing
the search space of possible keys until the correct key is found.
The selection of an appropriate key length depends on the 8. REFERENCES
practical feasibility of performing a brute force attack. So [1] Khan. F., “Traffic Engineering with Multipoint Label
Encryption Algorithms like AES , DES, TDES which is a part of Switching”. E.Tech, 04 pp. 61-67, July 2004.
IPSec are used to secure MPLS technology against various [2] Fang L.; Bita N.; Le R.; Miles J., ”Interprovider IP- MPLS
attacks. The AES standard comprises three block ciphers : AES- services: requirements, implementations, and Challenges”.
128, AES-192 and AES-256, adopted from a larger collection Communications Magazine, IEEE , vol.43, no.6, pp.119-
originally published as Rijndael. Each of these ciphers has a 128,June 2005.
128-bit block size, with key sizes of 128, 192 and 256 bits,
respectively. The DES is a block cipher which is a form of [3] Daugherty B.; Metz C.,” Multiprotocol label Switching and
shared secret encryption made up of 56 bit key size. Triple DES IP, Part1: MPLS VPNs over IP Tunnels”. IEEE Internet
is simply another mode of DES operation. It takes three 64-bit Computing, pp. 68-72, May-June 2005.
keys for an overall key length of 192 bits. [4] Azher I.; Aurengzeb M.; Masood K.,” Virtual Private
Network Implementation over Multiprotocol Label Switching”.
7. CONCLUSION AND FUTURE WORK Engineering Sciences and Technology, pp. 1-5, Aug 2005.
The rapidly increasing volume of Internet traffic has forced ISPs
to find the ways to increase the capacity of their networks. [5] Peterkin R.; Ionescu D.,”A Hardware/Software Co-Design
Those ISPs that have kept pace with time by transitioning to for RSVP-TE MPLS”. Electrical and Computer Engineering,
new backbone technologies have been successful in increasing Canadian Conference on, pp.1409-1412, May 2006.
their market share. So, for this MPLS is an emerging technology [6] Liwen He; Botham, P.,” Pure MPLS Technology”.
and by no means a perfect solution to current IP network Availability, Reliability and Security, ARES 08, Third
problems. It provides much better Traffic Engineering capability International Conference on , pp.253-259, 4-7 March 2008.
than the other networks. MPLS operates in coordination with IP
Routing and its main objective is to provide the speed of [7] Han L.; Wang J.; Wang C.; Cai L.,”A Variable Forwarding
switching to Layer 3. Introduction of labels provides an effective Equivalence Class for MPLS Networks”. Multimedia
alternative and evades the need of large routing table lookups Information Networking and Security, MINES '09. International
and results in fast routing. However, the telling factor of MPLS Conference on , pp.273-276, 18-20 Nov. 2009.
is its ability to manage and classify the traffic in order to provide [8] Ramakrishnan, V.; Wargo, C.; John, S.,”GMPLS Network
better utilization of resources. Hence, this technology is used to Security: Gap Analysis”. ICNS Conference, 2008 IEEE
effectively resolve integration and traffic engineering issues in Systems, pp. 1-7, 5-7 May 2008.
carrier networks. MPLS VPN provides benefits that service
providers need urgently in their networks, such as scalability, [9] Shah. S. A. A.; Ahmed. L.,”MPLS Feasibility for General &
manageability and reliability. But Security is the major issue in Core IP Networks using Open Source System”. Second
this Technology. International on Electrical Engineering, pp. 1-6, March 2008.
16