
Multiprotocol Label Switching, or MPLS, is a packet-forwarding architecture that sends traffic through a network using short labels rather than making every router perform a full destination lookup on every packet. The MPLS label sits between the Layer 2 header and the payload. Routers inside the MPLS network swap, push, or pop labels as packets move along a label switched path.
MPLS was originally attractive because label switching could simplify forwarding and enable traffic engineering. Its longer-lasting importance is as a service foundation. Service providers use MPLS to deliver Layer 3 VPNs, Layer 2 VPNs, pseudowires, Ethernet VPNs, traffic-engineered paths, fast reroute, and transport services across large IP networks.
How MPLS Forwarding Works
An MPLS edge router classifies traffic into a forwarding equivalence class and pushes one or more labels onto the packet. Core label switching routers forward based on the top label. Near the egress, the label may be popped so the final router forwards the original packet or service frame.
- Label switched path: the path a labeled packet follows through the MPLS network.
- Ingress LER: the label edge router that imposes labels on incoming traffic.
- LSR: a label switching router that swaps labels in the core.
- Egress LER: the edge router that removes labels and delivers the packet to the customer, service, or next network.
- Label stack: MPLS can carry multiple labels. One label may identify the transport path while another identifies a VPN, pseudowire, or service.
What MPLS Is Used For
- Layer 3 VPNs: BGP/MPLS IP VPNs, standardized in RFC 4364, let providers carry multiple customer routing tables across one provider backbone while keeping them logically separate.
- Layer 2 VPNs and pseudowires: MPLS can emulate Ethernet, Frame Relay, ATM, TDM, and other services across a packet network.
- VPLS: Virtual Private LAN Service presents a multipoint Ethernet service over a provider MPLS network.
- EVPN: BGP MPLS-based Ethernet VPN, specified in RFC 7432, improves Ethernet service signaling, multihoming, MAC mobility, and integrated Layer 2/Layer 3 service design.
- Traffic engineering: MPLS-TE can steer traffic through explicit paths based on bandwidth, constraints, protection, and operational policy.
- Fast reroute: MPLS protection mechanisms can move traffic around a failed link or node quickly enough for many carrier services.
LDP, RSVP-TE, BGP, and Segment Routing
MPLS labels can be distributed by several control-plane mechanisms. LDP was widely used to create basic label switched paths following IGP routes. RSVP-TE added explicit traffic-engineered paths with resource reservations and constraints. BGP distributes VPN labels and labeled routes for services such as L3VPN, EVPN, and BGP labeled unicast.
Segment routing modernizes the model by encoding a path as an ordered list of segments. RFC 8402 defines the segment routing architecture, and RFC 8660 defines segment routing with the MPLS data plane. SR-MPLS reduces reliance on per-flow state in the core and fits better with centralized controllers, traffic engineering, and software-defined operations. MPLS therefore did not simply stand still; one of its modern forms is the MPLS data plane under segment routing.
MPLS and SD-WAN
SD-WAN did not make MPLS vanish. It changed how enterprises buy and combine WAN services. Many organizations use SD-WAN overlays across broadband, DIA, LTE/5G, and MPLS circuits. MPLS remains useful where predictable provider-managed performance, private reachability, QoS, and service-level agreements matter. SD-WAN adds application-aware path selection, encryption overlays, centralized policy, and easier use of internet transport, continuing the staged WAN modernization pattern seen in multi-transport networking services.
The practical question is not MPLS versus SD-WAN as if only one can exist. The question is which sites and applications need provider-grade private transport, which can use encrypted internet paths, and how the overlay should react when loss, latency, jitter, or reachability changes.
Security Assumptions
MPLS VPNs provide traffic separation inside a provider network, but they are not the same thing as end-to-end encryption. A private MPLS service can be part of a secure architecture, yet sensitive applications may still need IPsec, MACsec, TLS, application-layer encryption, strict routing policy, and monitoring. Security also depends on provider operations: route targets, VRF configuration, PE-CE routing, management-plane controls, and change discipline.
For enterprises, the most important design principle is to avoid treating an MPLS circuit as automatically trusted. Segment users, sites, applications, and administrative access according to risk. Encrypt where the data requires it. Monitor route changes and unusual traffic patterns. Treat provider handoffs as important trust boundaries.
Operations and OAM
Large MPLS networks require strong operations, administration, and maintenance tooling. Operators use LSP ping and traceroute, BFD, MPLS OAM, performance measurement, telemetry, route-policy validation, and service assurance systems to prove that labels, paths, and VPN services behave correctly. A misbound label or route target can create customer-impacting failures that ordinary IP ping may not explain.
Modern operations also include YANG models, streaming telemetry, automated provisioning, path computation, and controller-based traffic engineering. The IETF MPLS working group remains active and continues to standardize label distribution, services over MPLS, OAM, and management models.
MPLS 2004 Conference
MPLS 2004, the 7th annual International Conference on Multi Protocol Label Switching, opened in Washington, DC. MPLS 2004 focused on MPLS, Generalized MPLS, and emerging internet technologies at a time when service providers were building converged IP/MPLS backbones.
The program included tutorials, technical sessions, industry panels, exhibits, and a live network deployment of Inter-AS PseudoWire. It covered Layer 2 and Layer 3 VPN services, VoIP, Virtual Private LAN Service, network convergence, operations and management, reliability and security, Quality of Service, inter-carrier MPLS issues, GMPLS, and IP-optical integration.
FCC Commissioner Kathleen Abernathy was scheduled to discuss the regulatory framework for IP-enabled services in the opening speech, while Tadanobu Okada, Vice President and Executive Director of NTT Network Service Systems Laboratories, was scheduled to present NTT's vision for the future network as the keynote.
MPLS 2004 was sponsored and supported by service-provider and vendor leaders showcasing IP/MPLS and optical products and services. The conference was followed by the 5th Public Interoperability Demonstration at the Isocore Internetworking Lab.
Exhibitors included ADC, Alcatel, Avici Systems, Chiaro Networks, CIENA, Cisco Systems, Data Connection, Extreme Networks, Ixia, Juniper Networks, Laurel Networks, Lucent Technologies, Mangrove Systems, Marconi, Movaz Networks, MRV Communications, Navtel Communications, NetworkPhysics, NextHop Technologies, NexTone Communications, PIL, Nortel Networks, Quarry Technologies, Redback Networks, Spirent Communications, Sycamore Networks, and Tellabs.
What Changed Since 2004
The conference agenda from 2004 reads like a snapshot of MPLS entering the mainstream: VPNs, pseudowires, VPLS, GMPLS, QoS, traffic engineering, and IP-optical integration. Many of those themes became ordinary service-provider practice. Some technologies faded or narrowed, while others expanded. EVPN became a major control-plane technology for Ethernet services and data-center interconnect. Segment routing created a cleaner way to steer traffic over MPLS or IPv6 data planes. SD-WAN changed enterprise WAN buying patterns, but MPLS remains deeply embedded in carrier backbones.
MPLS also became less visible to end users. A customer may buy an Ethernet circuit, cloud interconnect, private WAN, mobile backhaul, or wholesale service without seeing that MPLS labels, EVPN routes, or segment-routing policies carry the service underneath.
Planning Checklist
- Identify the service: L3VPN, EVPN, VPWS, VPLS, pseudowire, traffic-engineered transport, or SR-MPLS backbone.
- Choose the control plane deliberately: LDP, RSVP-TE, BGP labeled unicast, EVPN, or segment routing each carries operational implications.
- Design route targets, route distinguishers, VRFs, and PE-CE routing with clear ownership and change control.
- Test fast reroute, convergence, and failure domains before selling or depending on tight SLAs.
- Use OAM tools that understand MPLS labels and services, not only ordinary IP reachability.
- Encrypt sensitive traffic where policy requires it. MPLS separation is not end-to-end cryptography.
- Plan interworking with internet, SD-WAN, cloud, and data-center overlays rather than treating MPLS as a separate world.
MPLS is best understood as a service and transport toolkit. It gives operators a way to build labeled paths, private routing tables, Ethernet services, engineered routes, and fast restoration on top of IP infrastructure. Even as overlays, cloud networking, and SRv6 grow, MPLS remains one of the foundations of provider networking.
References
- RFC 3031: Multiprotocol Label Switching Architecture
- RFC 4364: BGP/MPLS IP Virtual Private Networks
- RFC 7432: BGP MPLS-Based Ethernet VPN
- RFC 8277: Using BGP to Bind MPLS Labels to Address Prefixes
- RFC 8402: Segment Routing Architecture
- RFC 8660: Segment Routing with the MPLS Data Plane
- IETF MPLS Working Group
- Isocore: MPLS 2004 International Conference