Professional Documents
Culture Documents
Introduction To MPLS and MPLS VPN Technology: How Does MPLS Work?
Introduction To MPLS and MPLS VPN Technology: How Does MPLS Work?
Introduction To MPLS and MPLS VPN Technology: How Does MPLS Work?
Note: The routers in an MPLS network are called Label Switch Routers(LSRs).
2. Routers then exchange the labels they have chosen for every
route in the network with their neighbouring routers. Label
Distribution Protocol(LDP) is used to exchange labels. R2 tells
R1 and R3 that its MPLS label for 10.10.10.1/32 is 200.
3. Using the label advertisements from neighbouring routers, each
router builds an MPLS forwarding table. Notice that R2 receives
MPLS label advertisements from both R1 and R3.
o R1 tells R2 that the MPLS label for 10.10.10.1/32 is 100.
MPLS VPN
MPLS Virtual Private Network, or MPLS VPN, is the most sought-after
and widespread implementation of MPLS technology. Wikipedia says that
a virtual private network extends a private network across a public
network and enables users to send and receive data across shared or
public networks as if their computing devices were directly connected to
the private network. It does so by constructing a virtual tunnel between
the endpoints. Transportation of data between these ends is achieved by
encapsulating an entire data packet into a datagram, thereby allowing a
safe exchange of data across public or shared networks.
VPN technology has been around longer than MPLS. ATM or Frame Relay
technologies providing VPN facilities at Layer 2 were very popular. In
such a network, the service provider runs ATM or Frame Relay to
provide connectivity, which typically forms the backbone network. In
case of MPLS VPN, MPLS forms the backbone network over which
VPN services are provided. A virtual network built on top of existing
network infrastructure(Underlay) is called an Overlay. This technique of
overlaying a virtual network on an underlay increases the scalability of
the network and supports multi-tenancy, modularity and virtualization.