Interdomain traffic engineering with MPLS

Fri, 05/11/2007 - 00:29 by Olivier Bonaventure

Abstract

During the last years, MultiProtocol Label Switching (MPLS) has been
deployed by most large Service Providers (SP). The main driver
for MPLS deployment is the ability to provide new services
with stringent Service Level Agreements (SLAs) such as layer-2 and layer-3
Virtual Private Networks (VPNs) as well as Voice and Video over IP.
Most of these services are already deployed inside single SP networks.
However, customers now require world-wide VPN and VoIP services.
Therefore, SPs need to collaborate to offer these services across
multiple SP networks.
Inside a single SP network, each node usually knows the complete topology
of the network with the load and delay of all the links. Based on this
information, each router is able to compute constrained paths toward any
other router inside the SP network. Then, it can establish a connection and
reserve resources along the computed path with the Resource reSerVation
Protocol (RSVP-TE). However, when services with stringent requirements must
cross multiple SP networks the computation of the path
becomes a problem. Routers in different SP networks exchange routing
information by using the Border Gateway Protocol (BGP). BGP provides
reachability information. It does not distribute complete topology, delay
and bandwidth information. One way to provide guaranteed services crossing
different SPs is to delegate the computation of the paths to a Path
Computation Element (PCE) that learns the topology of the different SPs.
However, this requires that SPs reveal information that they usually consider
confidential, their topology.
In this thesis, we perform active measurements to show the difficulty to
engineer the interdomain traffic with BGP. MPLS together with
RSVP-TE provide much more control on the traffic. We define extensions
to RSVP-TE for the protection of inter-AS MPLS paths. The aim is to be able
to provide the same service guarantees as inside a domain while keeping
the internal topology of SPs confidential, as required by SPs. We propose
and evaluate distributed techniques relying on PCEs for the computation of
interdomain constrained paths respecting the latter confidentiality
requirement.

Authors
Cristel Pelsser
Type
PhD thesis
Source
Université catholique de Louvain, November 2006.
Full text
pdf   (4.47 MB)
Cite it
BibTex
Copyright
See here

IEEE Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

ACM Copyright Notice: Copyright 1999 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page or intial screen of the document. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org.

Springer-Verlag LNCS Copyright Notice: The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.