You are on page 1of 5

Voice Transport Techniques over MPLS

Junaid Ahmed Zubairi, Ph.D., Member, IEEE

with DiffServ for prioritized handling of the QoS traffic. ITU-


Abstract- In this paper, we discuss currently evolving T has defined T-MPLS as a simplified version of MPLS for
technologies for packet based real-time voice communication. carrier transport networks. T-MPLS and its unique placement
Packet based voice has gained popularity in the toll-quality in the telecommunications industry are discussed briefly.
market due to its flexibility and cost effectiveness. IMS (IP
Multimedia Subsystem) is being developed for converged voice
and data services. While initially it was intended for mobile
Next, therotl a
as evolved through
ardsfr V oM agreedic ss
carrier implementation agreements
networks, it has been expanded to include support for fixed facilitated by IP/MPLS Forum [2].
networks. In the wired network, the quality of service needed for
media traffic can be provided by MPLS and related protocols. II. IP MULTIMEDIA SUBSYSTEM
The traffic engineering and quality of service mechanisms of
MPLS and Diffserv allow the differential treatment of premium IP Multimedia Subsystem is SIP (Session Initiation
traffic on predefined LSPs (Label Switched Path). Recently T- Protocol) and IP based next generation architecture for
MPLS has been introduced as the transport network for unifying the data and media services for mobile and fixed
connection oriented packet switched traffic, dropping some of the network users. IMS is being developed by 3GPP, a liaison
MPLS features that were irrelevant for connection oriented body that works with other organizations including TISPAN
applications. We introduce IMS and then look at implementation (Telecom and Intemet converged Services and protocols for
agreements, methods and protocols for transport of voice over Advanced Networks).
MPLS (Multi Protocol Label Switching) networks.
Index Terms- IP multimedia subsystem, VoMPLS, T-MPLS,
Quad Play, QoS, jitter,, A2oMPLS

IMS-S
I. INTRODUCTION
oice over IP has been around for several years. Users
[have experimented with various audio-conferencing tools
offered by messaging services. Discounted phone cards that
route calls through the Internet have been sold for quite some
time. However, the end to end VoIP telephony did not achieve
notable success until recently. The number of worldwide VoIP
customers has now reached 40 million and it is projected to
grow to approximately 250 million by the end of 2011 [1].
The quad play (voice, video, wireless and data) services are
being defined for next generation integrated networks in IMS
(IP Multimedia Subsystem). This tutorial paper discusses the
IMS specifications and focuses on the techniques and methods
developed for transport of voice over MPLS. The protocols
are developed by 3GPP (3rd Generation Partnership Project),
IETF (Internet Engineering Task Force), IP/MPLS Forum
(formerly MFA Forum / MPLS Forum) and the ITU-T
(Telecommunication Standardization Sector of the Figure 1: IMS Architecture
International Telecommunication Union).
IMS goals include provisioning QoS, enabling network
In the next section, the key proposals of IMS are defined. usage billing for media applications and integrating various
MPLS serves as an enabling technology for QoS, and it works media services. IMS adds a control layer below the services
and defines interfaces to the mobile and landline phone
network as well as the IP network. As shown in Figure 1, IMS
Manuscript received November 2008.
Junaid Ahmed Zubairi is with the Department of Computer Science, State defines CSCF (Call Session Control Function) server as the
University of New York, Fredonia, NY 14063 USA ( phone: 716-673- primary SIP server that has three functions. The Proxy CSCF
4694; fax: 716-673-4821; e-mail: Zubairi@fredonia.edu). 2008 IEEE. Personal use of this material is permitted. However,
permission to reprint/republish this material for advertising or
promotional purposes or for creating new collective works for
25 resale or redistribution to servers or lists, or to reuse any
copyrighted component of this work in other works must be
obtained from the IEEE .
lets client user agents connect to the IMS , the Serving CSCF The MPLS header fields include an unstructured 20-bit
provides the basic signaling for IMS session and Interrogating label that identifies the LSP to which this packet belongs. The
CSCF bridges the different carriers thus enabling roaming. label is assigned based on the FEC (forwarding equivalency
HSS (Home Subscriber Server), in association with SLF class) of the traffic trunk. It is followed by 3 bits TC (Traffic
(Subscription Locator Function) , runs a database listing users Class) field and 1 bit indicating whether this is the bottom of
and their subscribed services. HSS would be used to the label stack. The TTL (Time to Live) field has the same
authenticate the users that request IMS session. IMS links to usage as the TTL field in an IP header.
all types of networks including wired IP network, wireless Class based queuing (CBQ) is invoked on routers that
CDMA/GPRS network and fixed phone network. PSTN is implement the differentiated services (DiffServ) protocol to
supported by MGCF (Media Gateway Control Function)[3]. create separate queues for each class of traffic. DiffServ
divides the traffic into expedited forwarding (EF) and assured
IMS uses IETF standardized protocols in order to make it forwarding (AF) per-hop behaviors (PHBs). EF is the
widely acceptable. However, the details of implementation are premium service offered under DiffServ. It is suitable for low
not specified, thus leaving it flexible. Vendors may come up latency and low jitter flows that maintain almost constant rate.
with products that are IMS-compatible but the same may be In an MPLS-DiffServ network, the routers jointly implement
implemented with different strategies. Only the interfaces with various MPLS and DiffServ functions. The ingress router is
network may follow IMS standards. responsible for determining an LSP for a new flow request.
The QoS requirements of the new flow can be translated into
III. MPLS AND DIFFSERV PROTOCOLS DiffServ class assignment at the ingress. For this purpose, the
Real-time voice traffic has tight timing budget with the TC (Traffic Class) field in the MPLS shim header is used. As
required end to end delay values below 150ms and the jitter or the TC field is 3 bits in length, it can represent only eight
delay variation around 50ms. The best effort protocols cannot different scheduling and drop precedences. Under MPLS-
guarantee such limits because the datagrams do not follow a DiffServ [5], two types of LSPs are defined. E-LSP interprets
fixed path and may arrive at the destination out of order. With the label field of MPLS shim header as the egress identifier
increased congestion, the queues get longer resulting in and the TC field as the DiffServ PSC (PHB scheduling class)
increased jitter. These problems make conventional IP combined with the drop precedence. On the other hand, L-
networks largely unsuitable for connection-oriented LSP interprets the label field as the DiffServ scheduling
applications such as interactive real-time voice. The real-time priority and the destination. The TC field in L-LSP is used to
audio-conferencing applications written for the conventional indicate only the drop precedence of the packet. The main
IP networks use forward error correction and inter-mixing of difference between E-LSP and L-LSP is the aggregation
small packets to recover from packet loss, often leaving the feature in E-LSP resulting in scalability; however, some PSCs
perceived call quality as less than desirable. in an E-LSP may suffer because the bandwidth is reserved for
MPLS [4] has emerged as the key integration technology the whole LSP [6]. Figure 3 shows the placement of the
for carrying voice, video, and data traffic over the same DiffServ class identifier and MPLS label for an E-LSP.
network. In an MPLS-enabled network, LSPs (Label Switched
Path) are installed from an ingress node to an egress node MPLS LAbel (20 TC S TTL
prior to start of transmission. Each LSP can be specified with bits) (FEC (DiffSCrv (1 bit) (8 bits)
features that include time constraints and reliability. Dti))
Therefore, the connection-oriented applications can take
advantage of the "virtual connections" set by MPLS that
satisfy some constraints. Since the LSPs are stackable, traffic
from different flows sharing some common characteristics can IV. TMPLS PROTOCOL
be aggregated on an LSP. These characteristics may include ITU-T believes that the transport networks do not have
common egress and identical QoS and protection highly varying traffic patterns thus there is no need for some
requirements. of the features of MPLS that largely suit the dynamically
MPLS operates by defining a label inside MPLS "shim changing traffic of Internet. They introduced T-MPLS in 2006
header" that is placed on the packet between the layer-2 and for support of connection oriented packet switching flows.
layer-3 headers. The 32-bit shim header is organized as shown The T-MPLS (Transport MPLS) (ITU-T G.8110.1) protocol
in Figure 2. It is referred to as "shim" header as MPLS allows implements a simplified MPLS architecture for carrier class
la yer-2 and layer-3 to fit together firmly. networks. T-MPLS adds the TE capabilities of SONET/SDH
MPLS Ladbel (20 TC (3 | (1* TTL (8 | to Layer 2 network designs [7]. It provides backup tunnels
I bits) bits) bit) bits) with 50ms protection switching, thus enabling the migration
from SONET/SDH transport to a fully packet switched
netw ork ith com parable reliability[8].

Figure 2: MPLS header fields The standard documents approved were G.81 10.1

26
Architecture of T-MPLS layer network, G.8112 Interfaces for the MPLS bypassing the RTP/UDP/IP protocol stack. As seen
the T-MPLS hierarchy (TMH) and G.8121 Characteristics of in Figure 4, the VoMPLS protocol stack is more compact as
T-MPLS equipment. T-MPLS is described as a connection compared to VoIP. The MPLS UNI (User Network Interface)
oriented packet transport technology that uses the MPLS label definition [14] allows users at CE (Customer edge) to
swapping and forwarding, carrier networks performance establish LSPs to the PE (Provider Edge) network. The LSP
monitoring, simplified protection switching and may be a single link or a layer-2 network but it is considered a
ASON/GMPLS control and management functions [9]. It single hop LSP. Since there may be thousands of CE-to-CE
involves setting up unidirectional and bidirectional P2P (Point connections, a potential scalability issue arises. The MPLS
to Point) connections that take identical network path in both proxy admission control [15] solves the scalability problem by
directions and receive TE support and management. T-MPLS letting the PE ingress router search for existing tunnels that
simplifies end to end OAM (Operation, Administration and can satisfy the traffic parameters TLV in the label request
Management) by removing the IP specific functionality. For message sent by the CE. Once a suitable LSP is found, its RIL
example, T-MPLS removes the PHP (Penultimate Hop (Resource Index Label) is returned to the CE which then uses
Popping) feature that would require IP processing of the it to encapsulate the traffic for that tunnel. QoS is guaranteed
packet at the end router and similarly the ECMP feature is only within the PE-to-PE network. For CE-to-PE links,
removed in order to avoid possible source identification customers have to deploy layer-2 QoS techniques for
confusion. The T-MPLS tunnel can carry multiple L2 and L3 provisioning of resources.
services including IP/MPLS LSPs and PWE3 pseudowires.
Companies that deploy T-MPLS are expected to find it easier o MA JA M ALIA AL3
and economical in terms of man-hours of staff training, as RT1PLS MPL5 A
compared with IP/MPLS networks. It is because of the fact IJDP
that the T-MPLS network's architecture is similar to
SONET/SDH network.
Recently, in early 2008, ITU-T and IETF have deliberated Figure 4: VolPoMPLS and VoMPLS protocol stacks
to resolve inconsistencies between MPLS and T-MPLS and
the consensus is emerging to define separate code points for
MPLS and T-MPLS in order to avoid confusion. IETF and B. MPLS UNI With Proxy Admission Control
ITU-T agree that MPLS and T-MPLS are disjoint networks. In voice deployment over MPLS, the VGW (Voice
An LSP initiated from either network would encapsulate into Gateway) acts as the CE requesting guaranteed LSPs to the
Ethernet before transiting the other network. Client support in remote VGW. The MPLS proxy admission control allows the
T-MPLS is based on IETF Pseudo wire model for Layer-2 voice gateways to dynamically request LSPs to remote VGWs
VPN. The two-layer architecture includes top layer as client and to share the multiplexed LSP-TE tunnels among
Virtual Circuit LSPs and bottom layer for aggregating the VC themselves through the local PE acting as a proxy for
LSPs into Trunk LSPs. The key differences between MPLS admission control [16]. Using voice gateway as an example as
and T-MPLS include the use of bidirectional LSPs in T-MPLS in Figure 5, the following exchange of control messages may
and no PHP, no merging of LSPs and no ECMP routing in T- occur between the VGW and PE before a call can be
MPLS [10]. established:
V. VOICE TRANSPORT OVER MPLS 1) Phone 1 requests a voice call to Phone2.
2) VGW sends a label request message to PE containing
Voice is carried on MPLS network either directly or with FEC (Forwarding Equivalence Class) and Traffic Parameters
VoIP stack i.e. RTP/UDP/IP/MPLS. On the other hand, TLV for the intended call.
VoMPLS [11,12] carries voice directly over MPLS, reducing 3) PE acts as a proxy for the local VGW and searches
the headers significantly. Figure 4 shows the comparison of existing TE tunnels to remote VGW that satisfy the traffic
protocol stacks in different schemes. VoIP has the clear parameters and FEC in the label request message
advantage of providing end-to-end connectivity with mature 4) If an existing tunnel is found that can satisfy the request,
protocols. The MPLS user-to-network interface (UNI) PE sends its RIL to the requesting VGW
definition for bringing users in direct contact with MPLS 5) The requesting VGW can now initiate the call and then
networks has been defined recently [13,14,15]. Using MFA release the resources once the call is terminated.
IA 1.0 and IA 5.0, voice can be directly encapsulated in
MPLS packets. The other option is to use the ATM over From the above, it is obvious that the MPLS UNI together
MPLS definition to enable VoATM voice service. Among with MPLS Proxy admission control provides a powerful
these choices, VoMPLS is the most promising solution as it mechanism to deploy thousands of voice calls through the PE
involves the least amount of protocol tax. network without control messaging overflow.
A. VoMPLS
In VoMPLS,-ktd the
lt voice
r packets are directly transpo ed over

27
C. VoMPLS Header Formats 1) Using MPLS signaling mechanism, a bidirectional LSP is
In VoMPLS, Various header formats are defined for created
different payload types. Payloads may include encoded audio 2) As voice call request arrives at the edge of the MPLS
information, dialed digits, silence descriptors and control network, an existing CID is allocated to the new call within
signaling. Two types of frames are defined in VoMPLS IA the LSP just created or CID signaling is done to establish the
1.0: primary and control frames. The VoMPLS primary frame new channel.
header is shown [10] in Figure 6. Many primary VoMPLS 3) Optionally, inner LSPs may be created within the outer LSP
in which case the outer LSP label, inner LSP label and CID
frames may be multiplexed within a single MPLS packet. unqul idntf th voc. al
uniquely identify the voice call.
The VoMPLS control frame header is also 4 bytes in
length. Control fames cannot be multiplexed and must be
carried separately however the mandatory outer label and the
optional inner label precede the control frame header fields in
order to uniquely identify the voice call for which this control
frame is sent.
In the control frame, the Payload Type field distinguishes
Pb-
Pbetween dialed digits and the channel related signaling. Time
Stamp is relative to the first randomized time stamp. The
Redundancy field is very important to ensure the receipt of the
control frames. If the Redundancy field is set to 0, 1, or 2, the
Figure 5: MPLS UNI and Proxy Admission Control control packet is repeated that many times.
Another solution for VoMPLS reuses ATM Adaptation
Layer 2 (AAL2) components but replaces ATM by MPLS
Channeil Pay Counte Payload Pad [6,1 1], thus eliminating the ATM cell overhead. The MFA 5.0
Wfidtifie
(8 bits)
load
Type
(8 bits) Length
(6 bits)
Length
(2 bits) implementation agreement proposes voice trunking over
MPLS by directly encapsulating AAL2 common part sublayer
bits) (CPS) packets into MPLS (A2oMPLS). The gateway to the
MPLS network should be able to function as an AAL2 switch.
Multiple A2oMPLS connections may be multiplexed into a
Figure 6: VoMPLS MFA 1 primary frame header fields single LSP. One MPLS frame may carry multiple CPS
packets. The A2oMPLS sub-frames may be of different length
VoMPLS primary frame header is 4 bytes long and includes but the maximum CPS packet payload length is restricted to
5 fields: between 45 octets to 64 octets. Like the MFA IAlO, the CID
> Channel Identifier uniquely identifies the voice field in the CPS packet header allows up to 248 A2oMPLS
channel that is the source of the payload. Thus, a connections to be multiplexed. Each A2oMPLS connection
total of 248 different voice calls can be multiplexed can be uniquely identified with outer label of the LSP,
into a single LSP. optional inner label and the CID value. When inner labels are
Payload Type identifies the encoding scheme used as used the number of calls that are carried by a single LSP
well as silence removal/insertion descriptors. A value .
increases rapldly.
r

equal to or above 224 indicates control payload (part


of the control frame) that would allow DTMF (dual The following fields are included in the A2oMPLS header:
tone multi frequency) dialed digits as well as Reserved (10 bits) currently ignored.
L

signaling for the channel to be carried [4]. > Length (6 bits) used for padding length. It is set to
> The revolving Counter field is set at the first sample 0 if A2oMPLS packet length exceeds 64 bytes.
or frame and keeps incrementing for each additional > Sequence Number (S No) (16 bits) used if
frame. guaranteed ordered packet delivery is required.
> Payload Length is read in conjunction with the pad Sequence number of 0 indicates otherwise.
length to keep the payload a multiple of 4 bytes. The following fields are inside the CPS packet header;
Multiple primary frames may be multiplexed with the use of several CPS packets may be packed in one MPLS frame.
optional inner MPLS labels in addition to one mandatory > CID (8 bits) identifies the A2oMPLS connection
outer MPLS label. Using CID, up to 248 voice calls can be carried. Thus a total of 248 connections (8 to 255)
aggregated. The payload of primary frame may consist of can be multiplexed into a single LSP.
encoded audio data or SID (Silence Insertion Descriptor) > LI (6 bits) identifies the length of the CPS packet.
parameters. > UUI (5 bits) is used for user-to-user indication (0
Keeping the frames and header formats in perspective, the to 27 for users, 30-31 for layer management, and
voice calls can be established as follows [4]. bv 1rsre)

28
HEC (5 bits) (header error control) uses CRC
checksum. However, this field may not be used in ffic-engineering-for-Ethernet:-PBT-vs-T-MPLS/ accessed Nov 4 2008.
cheksu.'Hweer,thi feldmaynobeusei [8] Barry, D. 2007. T-MPLS and PBTIPBB-TE offer connection-oriented
the MPLS environment. packet transport. Lightwave May 2007 http://lw.pennnet.com.
[9] ITU-T 2006 Draft new Amendment 1 to G.81 10.1 Y.13 70.1, Nov 2006.
VI. CONCLUSION [10] Lum, 2006 When Networks Collide: Putting the T into MPLS 2006
FiberSystems.org online article
Industry is moving towards integration of phone system h accessed Nov 42008.
with the packet switching network. IMS is being developed to [11] MFA. 2001. Voice over MPLS: Bearer Transport Implementation
Agreement (MFA IA 1.0). MFA Forum.
provide uniform interface for users from cellular, landline or [12] MFA. 2003. Voice trunkingformat over MPLS. MPLS/FR 5.0.0. 1.366.2.
wired systems. In wired and wireless packet based networks, MFA Forum.
MPLS can work with other protocols to guarantee the [13] ITU-T. 2002. Recommendation Y.1261. Service requirements and
bandwidth needed for a voice call and provide fast protection [14] architecture for voice services over MPLS.
[14] MFA 2003A D. Sinicrope, A. Malis, MPLS PVC User to Network
switching. Voice can be deployed over MPLS using a variety Interface, MPLS/FR Alliance 2.0.1, May 2003.
of techniques that have been developed recently. In this paper, [15] MFA 2004A MPLS Proxy Admission Control Protocol Implementation
these techniques including VoIPoMPLS and VoMPLS are Agreement 7.0.0.
[16] Fineberg V, 2004 (With Sinicrope D, Phelan T, Sherwin R and Garbin
discussed. D) The MPLS UNI And End-to-End QOS. Business Communications
VoIPoMPLS deploys voice over the RTP/UDP/IP protocol Review Dec 2004 Pages 27 - 32.
stack, which uses MPLS tunnels. Since the number of [17] Fjellskal, E., and S. Solberg. 2002. IPEvaluation of Voice over MPLS
(VoMPLS) compared to Voice over (VoIP) (Masters thesis, Agder
protocols involved iS large, the control information equals or Univ College).
exceeds the payload. Most efficient method is to run voice
directly over MPLS. VoMPLS is discussed in detail including Junaid Ahmed Zubairi received his BE (Electrical Engineering) from NED
various proposals for enabling it in the network. VoMPLS is University of Engineering, Pakistan and MS and Ph.D. (Computer
Engineering) from Syracuse University, USA. He worked in Sir Syed
well suited for multiplexing in the core and carrying the bulk University Pakistan and Intl' Islamic University Malaysia before joining
of voice calls through the MPLS domain. The difference SUNY at Fredonia in 1999 where currently he is an Associate Professor in the
between MPLS and T-MPLS, a new ITU-T proposal for Department of Computer Science. Dr. Zubairi is a recipient of many awards
including Malaysian Government IRPA research award, National Science
carrier networks, is highlighted. Foundation MACS award, SUNY Scholarly Incentive award and SUNY
The MPLS UNI proposal presented in 2004 is outlined. Faculty Fellowship award. He has published several book chapters, journal
Since the original proposal was not scalable, proxy admission articles and conference papers in his areas of interest. His research interests
include network applications, traffic engineering and performance evaluation
control was introduced to pack new control existing
LSPs intointrodu d to
of networks. He can be reached at junaid.zubairi fredonia.edu.
tunnels.
With the introduction of IMS, many technologies would be
integrated to allow exciting new features in packet voice. For
example, transparent connectivity through landline and mobile
networks would let the user continue the conversation while
changing the connection from landline network to mobile
network or vice versa. Since IMS is based on IPV6, the IMS
adoption would be slow in parts of the world where IPV4 still
runs the network. The VoP phones would be flexible and
allow all the functionalities of current PSTN phones. Security
of packet based phones and authentication of users poses new
challenges that must be analyzed and resolved for widespread
deployment.
REFERENCES
[1] Teral, 2006 Service provider and enterprise IP telephony markets,
Infonetics Research. 30 Aug 2006.

accessed Nov 4 2008


[2] Zubairi, J. 2008. Emerging Methods for Voice Transport over MPLS.
Chapter in Taylor Francis Handbook of MPLS Technologies Dec 2008
[3] M. Hunter et. al. Security Issues with the IP Multimedia Subsystem
(IMS) , Proc. Middleware Conference 2007, ACM.
[4] Rosen, E. et al. 2001. Multiprotocol Label SwitchingArchitecture. RFC
3031.
[5] Faucheur and Lai IETF RFC 4125, Maximum Allocation Bandwidth
Constraints Modelfor Diffserv-aware MPLS Traffic Engineering 2005.
[6] Fineberg, V. 2003. QoS Support in MPLS networks. MFA Forum white
paper
[7] Lunk, P 2008 Traffic engineering for Ethernet: PBT vs. T-MPLS
LightWave Online article,

29

You might also like