Change search
ReferencesLink to record
Permanent link

Direct link
Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks
KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT. (CCSlab)
2002 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit.

This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999, when MPLS first started in the laboratories, development has continued. Today it is possible to introduce MPLS or tunneled national virtual local area network into an existing network. This requires high speed, fault tolerant, and stable hardware and software.

Going beyond the separation of traffic at layer 3 using Virtual Private Networks, i.e., IPSec, we can tunnel layer 2 traffic through a network. Although the first layer 3 VPN products are already in use, layer 2 VPNs still need to be evaluated and brought into regular use. There are currently two ways of tunneling VLANs in a core network: tunneled VLANs (or as Extreme Networks calls them, VMANs) and MPLS.

This project showed that it is possible to start with a VLAN-only solution, and then upgrade to MPLS to solve scalability issues. The VMAN solution can not be used at Arrowhead, since there are too many disadvantages in the way Extreme Networks has implemented it. However, a mix of tunneling VMAN in a VLAN core is possible, and enables customer tagging of VLANs in a Layer 2 VPN. Furthermore, the testing of EAPS and per-VLAN Spanning Tree Protocol turned out well, and showed that EAPS should not be used when there is more than one loop.

Place, publisher, year, edition, pages
2002. , 65 p.
Keyword [en]
VPN (Virtual Private Network), VLAN (Virtual Local Area Network), MPLS (Multiprotocol Label Switching)
National Category
Communication Systems
URN: urn:nbn:se:kth:diva-93211OAI: diva2:515385
Subject / course
Educational program
Master of Science in Engineering - Electrical Engineering
2002-06-10, Seminar room "Castor", Forum, Isafjordsgatan 39, Kista, 11:00 (English)
Available from: 2012-04-13 Created: 2012-04-12 Last updated: 2013-09-09Bibliographically approved

Open Access in DiVA

fulltext(1244 kB)1355 downloads
File information
File name FULLTEXT01.pdfFile size 1244 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Ögren, Niklas
By organisation
Microelectronics and Information Technology, IMIT
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 1355 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 165 hits
ReferencesLink to record
Permanent link

Direct link