Software Implementation of Kompella-Based L2VPN

Article Preview

Abstract:

MPLS L2VPN is used to transparently pass users’ L2 data through MPLS network, with the common implementation model of Martini L2VPN by using LDP as the signaling. In spite of its wide application, the configuration of its capacity expansion is cumbersome and the cross-domain problem is insolvable. Therefore, based on the label swapping technology of MPLS, this paper adopts kompella-based approach for L2VPN implementation and mainly focuses on packet forwarding and controlling. Firstly, it does not make direct CE connections, but partitions different VPN in the whole SP (Service Provider) and gives serial numbers of CE within the VPN. Moreover, it also establishes the VC (virtual circuit) channel between the two PE and uses label distribution and calculation for mutual information. In this respect, it can not only provide effective supports for capacity expansion, but also solves the cross-domain problem.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1230-1234

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. Kompella, B. Kothari and R. cherukuri: Layer 2 Virtual Rrivate Network Using BGP for Auto-Discovery and Signaling. RFC 6624(2012): 13-16.

DOI: 10.17487/rfc6624

Google Scholar

[2] A. Sajassi, F. Brockners and D. Mohan: Serbest Virtual Private LAN Service(VPLS) Interoperability with Customer Edge(CE) Bridges. RFC 6246(2011): 8-12.

DOI: 10.17487/rfc6246

Google Scholar

[3] J. Drake, S. Amante, W. Henderickx, L. Yong: The Use of Entropy Labels in MPLS Forwarding. RFC 6790(2012): 13, 21.

DOI: 10.17487/rfc6790

Google Scholar

[4] E. Rosen, B. Davie, V. Radoaca, W. Luo: Provisioning , Auto-Discovery, and Signaling in Layer 2 Virtual Private Networking. RFC 6074(2011): 12, 24-27.

DOI: 10.17487/rfc6074

Google Scholar

[5] Gary R. Wright, W. Richard Stevens: TCP/IP Illustrated Volune 2: The Implementation. 2011: 448, 465-468.

Google Scholar

[6] John Evans: BGP/MPLS IP VPN Virtual CE. I-D Exists, 2013(10): 6.

Google Scholar

[7] David Ward. BGP/MPLS IP VPN Virtual PE. I-D Exists, 2013(10): 7.

Google Scholar

[8] MPLS Technology Introduction, H3C, on 2011: http: /www. h3c. com. cn.

Google Scholar