Application of MPLS Tunnel Service L2TP-VPN Optimization Concept with Traffic Engineering Method for Looping-Protection Service Analysis
Abstract
This research began when observations were made on any-to-any-connection services that require QoS (Quality of Service) and tunnel measurements. Tunnel is a technique to interconnect between local networks that are separated through a public network. Research questions found looping caused by traffic issues when sending data in the MPLS service layer-2 tunneling service. Furthermore, this research hypothesis proposes optimizing QoS performance in the application of the SR-TE (Segment Routing-Traffic Engineering) method in the MPLS (Multi-Protocol Label Switching) network and analyzing traffic based on MAC addresses using the looping-protection method. This research contributes to optimizing the MPLS network and is a recommended solution for simplifying control-plane operation, especially the SR-TE method and looping-protection in the L2-VPN MPLS service. The purpose of this study is to analyze the performance of MPLS networks, as well as analyze the application of L2-VPN (Layer 2 Virtual Private Network) MPLS networks. The targeted TKT (Technology Readiness Level) is 3rd-Level, which is an analytical and experimental proof of the MPLS tunnel network model on Layer-2 VPN services. The results of the research concluded that testing the SR-TE method is a solution to simplify the process of labeling data traffic that is global labelling, then the looping-protection method is a solution to eliminate looping indications. The QoS obtained has also shown an "excellent" category based on TIPHON standards.References
S. Budiyanto, C. S. Aprihansah, L. M. Silalahi, I. U. Vistalina Simanjuntak, F. A. Silaban, and A. D. Rochendi, “Auto Discover Virtual Private Network Using Border Gateway Protocol Route Reflector,” in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), Nov. 2022, pp. 123–129. doi: 10.1109/COMNETSAT56033.2022.9994439.
E. Darmawan, S. Budiyanto, and L. M. Silalahi, “QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method,” in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), Nov. 2022, pp. 130–136. doi: 10.1109/COMNETSAT56033.2022.9994572.
Ubedilah, S. Budiyanto, and L. M. Silalahi, “Analysis QoS VoIP using GRE + IPSec Tunnel and IPIP Based on Session Initiation Protocol,” in 2022 5th International Conference of Computer and Informatics Engineering (IC2IE), 2022, pp. 47–54. doi: 10.1109/IC2IE56416.2022.9970120.
S. Budiyanto and M. Gathmir, “Improvement of Policy Charging Control Flow Based on Internet Subscribers Behavior,” in 2020 2nd International Conference on Broadband Communications, Wireless Sensors and Powering (BCWSP), 2020, pp. 113–118. doi: 10.1109/BCWSP50066.2020.9249394.
L. M. Silalahi, S. Budiyanto, F. A. Silaban, H. B. H. Sitorus, A. D. Rochendi, and M. F. Ismail, “Analysis of the effectiveness of online electronic learning system using data traffic network performance management to succeed merdeka learning--Merdeka campus during the Covid-19 pandemic,” Int. J. Electron. Telecommun., vol. 67, no. 4, pp. 595–601, 2021.
S. Budiyanto, L. M. Silalahi, F. A. Silaban, R. Muwardi, and H. Gao, “Delivery Of Data Digital High Frequency Radio Wave Using Advanced Encryption Standard Security Mechanism,” in 2021 International Seminar on Intelligent Technology and Its Applications (ISITIA), Jul. 2021, pp. 386–390. doi: 10.1109/ISITIA52817.2021.9502262.
Asosiasi Penyelenggara Jasa Internet Indonesia, “Profil Internet Indonesia 2022,” Apji.or.Od, no. June, p. 10, 2022, [Online]. Available: apji.or.id
S. Nurhayati, A. H. Noor, S. Musa, R. Jabar, and W. J. Abdu, “A Digital Literacy Workshop Training Model for Child Parenting in a Fourth Industrial Era,” HighTech Innov. J., vol. 3, no. 3, pp. 297–305, 2022.
L. Wang, Q. Li, L. Liu, Y. Jiang, M. Xu, and J. Wu, “S5: An Application Sensitive QoS Assurance System via SDN,” 2018 IEEE 37th Int. Perform. Comput. Commun. Conf. IPCCC 2018, pp. 1–8, 2018, doi: 10.1109/PCCC.2018.8710838.
P. L. Ventre et al., “Segment Routing: A Comprehensive Survey of Research Activities, Standardization Efforts, and Implementation Results,” IEEE Commun. Surv. Tutorials, no. Revision R2, 2020, doi: 10.1109/COMST.2020.3036826.
E. C. Filsfils, E. S. Previdi, L. Ginsberg, B. Decraene, S. Litkowski, and R. Shakir, “Segment Routing Architecture,” Internet Eng. Task Force, no. ISSN: 2070-1721, pp. 1–32, 2018.
E. S. Previdi et al., “OSPF Extensions for Segment Routing,” Internet Eng. Task Force, pp. 1–28, 2019.
S. T. Aung and T. Thein, “Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks,” in 2020 IEEE Conference on Computer Applications(ICCA), Feb. 2020, pp. 1–5. doi: 10.1109/ICCA49400.2020.9022848.
V. D. Dimitrov, “Implementation of Loop Prevention Protocols at the Data Link Layer in LAN,” pp. 105–108, 2020, doi: 10.1109/TELECOM50385.2020.9299530.
D. Fialho and P. Mateus, “Stabilizing BGP Through Distributed Elimination of Recurrent Routing Loops,” 2017.
E. Takimoto, S. Aketa, Y. Otsuki, S. Saito, and K. Mouri, “A HYBRID LOOP-FREE ROUTING PROTOCOL FOR WIRELESS MESH NETWORKS,” pp. 286–291, 2017, doi: doi:10.1109/cit.2017.45.
E. M. Gales and V. Croitoru, “Traffic Engineering and QoS in a Proposed MPLS-VPN,” 2020 14th Int. Symp. Electron. Telecommun. ISETC 2020 - Conf. Proc., pp. 3–6, 2020, doi: 10.1109/ISETC50328.2020.9301135.
M. A. Panhwar, K. A. Memon, A. Abro, D. Zhongliang, S. A. Khuhro, and Z. Ali, “Efficient Approach for optimization in Traffic Engineering for Multiprotocol Label Switching,” in 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Jul. 2019, pp. 1–7. doi: 10.1109/ICEIEC.2019.8784486.
P. Zhang, Y. R. Gang, X. Huang, S. Zeng, and K. Xie, “Bandwidth Allocation With Utility Maximization in the Hybrid Segment Routing Network,” IEEE Access, vol. 7, pp. 85253–85261, 2019, doi: 10.1109/ACCESS.2019.2924672.
N. Geng, Y. Yang, and M. Xu, “Flow-Level Traffic Engineering in Conventional Networks with Hop-by-Hop Routing,” 2018 IEEE/ACM 26th Int. Symp. Qual. Serv. IWQoS 2018, pp. 1–10, 2019, doi: 10.1109/IWQoS.2018.8624179.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 International Journal of Electronics and Telecommunications
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.