You are on page 1of 30

RTTC Pune presents

_________________________________________________ ______________________________________________ ___________________________________________

Internet Network of Networks


Each and every IP packet in the network is routed independently as it is a connectionless network Multiple packets originated from the same source for the single destination may follow different path in the internet The packets may reach the destination out of sequence also bad for VoIP and Video Some of the packets may also fail to reach the destination Hence Quality of Service can not be assured by the internet network
2

Internet-Security: Weaknesses
Internet is an open network i.e. any person from anywhere can access any part of network Internet is a shared network and is not controlled by any single agency No security mechanism has been provided in the network - Network security is left to the customer Customer can adopt different means for data protection depending upon how important the data is?

Internet Devices
Firewalls To avoid unauthorized intrusions
Switches To connect LANs Routers To route the traffic from Source to Destination

Private Networks
Infosys Pune Wipro Mumbai

Infosys Hyderabad

Infosys Mumbai

Wipro Bangalore Wipro Chennai Infosys Bangalore

Leased Lines

Private Network
Advantages:
Leased lines are secured Privacy and QoS Guaranteed

Disadvantages
Leased lines are very expensive No of links required grows exponentially if full mesh connectivity is required and network expands. Tunnels are used to flow traffic from one end to other Network complexity increases as network grows. All existing sites requires reconfiguration in case of a new site addition.

Internet Based Private Network


Infosys Pune Wipro Pune Infosys Hyderabad

Internet
Shared Infrastructure
Infosys Mumbai

Wipro Bangalore Wipro Chennai Infosys Bangalore 7

Internet Based Private Network


Advantages:
Single physical connectivity at each site. No reconfiguration required at existing sites in case of addition of new site to the network. Huge saving in annual connectivity charges.

Disadvantages:
Highly insecure environment No guarantee of Privacy and QoS Any unauthorized traffic can enter in private network
8

Virtual Private Network


What is VPN?
Applying some policies to the traffic flowing in the shared network (BSNL) so that traffic of one customer (Wipro) will not mix-up with other customer (Infosys). VPN create the feeling in customer about security and safety of their valuable data on the shared network Different solutions are available to make communication over internet safe, secure and it can also ensure desired grade of quality of service. These solutions are known as VPN solutions. Earlier different protocols like L2TP, PPTP, IPSec etc are used to provide VPN solutions to customers. These Protocols take care of data authenticity, data integrity, and if required data confidentiality.
9

VPN Tunnels
Tunneling is the mechanism to encapsulate IP datagrams inside another packet so that original datagram is not visible to network. Every packet is authenticated to ensure that it is coming from right source and optionally packets can be encrypted also for data confidentiality if required

X-Y X-Y X-Y X-Y A-B A-B X-Y X-Y X-Y X-YX-YX-YX-Y X-Y X-Y X-Y

Firewall

Internet

Firewall

10

Virtual Private Network


Infosys Pune Wipro Mumbai Infosys Hyderabad

Firewalls

Internet
Infosys Mumbai

Wipro Bangalore

Wipro Chennai

Infosys Bangalore 11

Advantages of VPN - Data Security


Authenticity
Ensures the identity of all communicating parties Each data packet was originated by the claimed sender

Data Integrity
Ensures that information being transmitted over the link is not altered in any way during transit

Data Confidentiality
Protects the privacy of information being exchanged between communicating parties
12

MPLS Based VPNs


What is the need for new technology like MPLS?
In normal IP based network routing decisions are done on hop-by-hop basis ( i.e. at every node / router) Leased Line based network is highly expensive and do not provide mesh connectivity among the sites by default

Hence a need of a ultra fast forwarding technology


MPLS changes the hop-by-hop paradigm by enabling devices (routers) to specify paths for a specific type of traffic to follow in the network based upon QoS and bandwidth needs of the applications

13

Advantages of MPLS Based IP Infrastructure


Security is the responsibility of MPLS Network Company will be responsible for the Security of the Information and network in a Point to Point leased lines. Simple Network Implementation & Easy Network Expansion at Customer Premises Easy to configure & Manage Better traffic management for BSNL as well as Customer using techniques like QoS, CoS and Traffic Engineering Hence strict SLA can be achieved with customers Lower cost compared to Leased Lines Easy Introduction of New Services like VoIP, Video Multicasting over the same link

14

Complexity of Customers Network with Point to Point Leased Lines


Ahmedabad Mumbai Pune Delhi Lucknow

Leased lines from BSNL


Bangalore Kolkotta

Ernakulam Hyderabad Links

Chennai

15

How it looks in the MPLS environment


Ahmedabad Lucknow Mumbai Pune Delhi

BSNLs MPLS VPN Network


Bangalore Kolkotta

Ernakulam Hyderabad

Chennai

Router Links

16

What is MPLS ?
Multi Protocol Label Switching A technology for speeding up data communication over combined IP (or ATM) networks. MPLS improves the speed of packet processing and enhances performance of the network.

17

How does MPLS work ?


MPLS attaches a label to IP packet when the IP packet enters the MPLS domain By looking at the label router takes decision on whether to accept the packet (if it is destination) or make packet forwarding decisions and swaps the label. Above activity happens at every intermediate router till packet reaches the destination. With MPLS, the Layer 3 header analysis (i.e. looking at Source and Destination IP Address) is done just once when the packet enters the MPLS domain. Label inspection drives subsequent packet forwarding.
18

Strength of MPLS
MPLS provide a connection-oriented service for transporting data across computer networks Ability to use any physical transmission media allows higher backbone and interface capacity Ultra Fast Forwarding Technology MPLS provides beneficial applications like:
Virtual Private Networking (VPN) Traffic Engineering (TE) Quality of Service (QoS)

19

Advantages of MPLS
MPLS is an initiative that integrates Layer 2 information about network links (bandwidth, latency, utilization) into Layer 3 (IP) within a particular autonomous system--BSNL--in order to simplify and improve IP Packet exchange. MPLS gives network operators (BSNL) a great deal of flexibility to divert and route traffic around link failures, congestion, and bottlenecks.

20

Terminology used in MPLS


Label Switched Path (LSP) : Each network path created by the MPLS protocol is a LSP LSP is an unidirectional entity

Label Switching Routers (LSR) : - Each IP router that supports the MPLS protocol is called a label switching router (LSR) - Four different types of LSRs: ingress, transit, penultimate, and egress

21

Terminology used in MPLS


Ingress Router : The ingress router is the only entry point for user data traffic into MPLS and is a start point of LSP. Egress Router : The egress router is the end point of the LSP. Transit Router : All routers located in the middle of an LSP are considered transit routers. Main function is to swap the label Penultimate Router : One of the transit routers in an LSP which has a special function called Penultimate Hop Popping to perform.
22

Terminology used in MPLS


Labels : A header created by an edge label switch router (edge LSR) and used by label switch routers (LSR) to forward packets. Identifies the path a packet should traverse.

Forwarding Equivalence Class (FEC) FEC is a group of IP packets which are forwarded in the same manner, over the same path, and with the same forwarding treatment. An FEC might correspond to a destination IP subnet. For example, all traffic with a certain value of IP precedence might constitute a FEC.

23

MPLS Network :

24

How MPLS works?

27

What is Quality of Service


Desktop Conferencing, Distance Learning Mission-Critical Applications

E-Mail

FTP
28

Role of QoS
Protect mission-critical applications
Voice, ERP, data warehouse, sales force automation

Prioritize groups of users


Finance, sales, suppliers

Enable multimedia applications


Distance learning, desktop video conferencing

Quality of Service (QoS)


MPLS has got very powerful tools like traffic prioritization, traffic scheduling, traffic shaping, traffic policing etc to ensure proper grade of quality of service to customer. Broadly three grades of services are available at present in MPLS VPN Service
Gold (Guaranteed bandwidth, delivery, Jitter and latency) Silver (Guaranteed delivery) Bronze (Best effort)
30

BSNLS MPLS Network


A1 Nodes - 5 Ajmer Ludhiana Ferozpur Bhopal Gwalior Amritsar Lucknow Jabalpur Mehsana Jaipur Patna Jullundar
Si

Ambala Faridabad Gurgaon Noida Jodhpur Kanpur Varanasi

A2+A3 Nodes - 9 Ghaziabad Dehradun Meerut Agra Dimapur


Si

A4 Nodes - 10 B1 + B2 Nodes - 47

Shimla

Si

Allahabad
Si

Chandigarh

Shilong

Guwahati Siliguri

Noida
Kalyan Rajkot Ahmedabad

Ranchi Durgapur

Indore

Mumbai
Si

Kolkata

Si

Bhubneshwar Jamshedpur

Surat Vadodara

Nagpur
Si

Pune

Si

Banglore

Chennai
Ernakulam

Coimbtore

Aurangabad Panjim Kolhapur

Manglore

Si

Vijaywada

Si

Madurai Trichy Pondicherry

Hyderabad Raipur

Nashik
Vizag Rajmundary Tirupati Belgaum Hubli Mysore Kalikat Palghat Trivandrum Trichur

31

32

You might also like