Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services

Size: px
Start display at page:

Download "Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services"

Transcription

1 Multipoint Bridged Ethernet Using MPLS Virtual Private LAN Services By Scott Kotrla How VPLS Compares to Existing VPN Technologies Multipoint Bridged Ethernet is a service offering that attempts to recreate the functionality of an Ethernet Local Area Network (LAN) in a distributed fashion over the Metropolitan Area Network (MAN) and Wide Area Network (WAN). Virtual Private LAN Services (VPLS) is an implementation of Multipoint Bridged Ethernet (MBE) that uses MultiProtocol Label Switching (MPLS) to implement multiple MBE service instances in a scalable manner with Quality of Service (QoS) and customer isolation. MBE service uses the commodity pricing of Ethernet interfaces and customers familiarity with Ethernet in the LAN to remove the barriers between LAN, MAN, and WAN communication. Current customer premises equipment (CPE) is maintained and supported by the same staff supporting the LAN, and CPE cost efficiencies can be used to purchase additional bandwidth. While the technology has the potential to offer many customer benefits, it comes at the cost of adding additional complexity to the service provider network. Many MBE benefits can be obtained using Ethernet as an access method to existing Virtual Private Network (VPN) services, either through native access or through the InterWorking Functions (IWF) facilitated by MPLS. Multipoint Bridged Ethernet VPN Like network-based IP VPNs, MBE is an any-to-any service offering, which makes MBE both functionally and architecturally more similar to a Layer 3 VPN (L3VPN) than an Ethernet point-to-point Layer 2 VPN (L2VPN). The primary difference between the two any-to-any VPN technologies is the way packets are forwarded to their destination location at the service edge either by IP address or by Ethernet Media Access Control (MAC) address. This relatively small change in the forwarding plane has some significant ramifications on the IP service transparency experienced by an enterprise, as well as the network scalability experienced by the service provider. Also, similar to L3VPN technology, scalable MBE service is typically built using MPLS as described by ongoing work in the Internet Engineering Taskforce (IETF) under the name of VPLS. Because of the similarities, many network devices that support L3VPN also support MBE in the same platform. Page of 10

2 Advantages One logical sub-interface on each router Flexible bandwidth with support for bursting No changes required at existing sites for adding a site Complete flexibility in choice of L3 protocols and architecture Easy migration from existing VPN service No easy provisioning once logically connected to service Disdvantages Packet replication and associated bandwidth consumption Requires Ethernet connectivity to the customer Figure 1: Multipoint Bridged Ethernet VPN Ethernet Bridging Functionality Ethernet bridging allows devices in an Ethernet broadcast domain to communicate with each other automatically without any configuration. Unlike IP addresses, which are manually configured on a device or subnet basis, Ethernet MAC addresses are assigned to devices by the manufacturer and are globally unique. This is managed by breaking the address range into a dedicated address block per device manufacturer and allowing each device manufacturer to assign addresses to devices from their dedicated address range as needed. MAC Learning In an Ethernet bridge, the table that tracks MAC address port origination is called the MAC forwarding table. The process of associating source MAC addresses with their originating ports is called MAC learning. All that is needed for communication between two devices in an Ethernet network is the MAC address of the distant device. Since most devices use IP to communicate, Address Resolution Protocol (ARP) is employed to bind an IP address to an Ethernet MAC address. ARP leverages the broadcast capabilities of Ethernet to send an ARP request to every device on the Ethernet network by targeting the broadcast MAC address of all Fs in hex. If a device with the target IP address is on the Ethernet network, it will respond with its MAC address which is then used for future communication to the device. Because every Ethernet packet has a source and destination MAC address, the ARP response can be sent to the specific destination MAC address of the device that made the ARP request. As these ARP packets are traveling across the LAN, the Ethernet bridges (i.e., switches) on the LAN examine the source MAC address in every packet in an attempt to learn the location of each device on the network. Like a broadcast packet, a packet with an unknown destination MAC address is sent to all devices on the Ethernet network until the location of the device is learned. Page 2 of 10

3 Virtual LANs Virtual LANs (VLANs) are used to create multiple broadcast domains in an Ethernet network that allow groups of users to communicate privately. Within a broadcast domain, traffic will be sent to ports that are members of the same VLAN only. Along with port and source MAC addresses, VLANs are stored in the MAC forwarding table. Devices that support multiple VLANs apply a VLAN tag to every packet that leaves the device. Devices that do not support VLANs are typically assigned a port-based VLAN in the Ethernet bridge to which they are directly connected. Trunks between Ethernet bridges typically contain all of the VLANs that are in use on the network. Spanning Tree Protocol Because Ethernet bridges are able to broadcast packets, bridging loops can be created if there are multiple paths through the network between two bridges. Spanning Tree Protocol (STP) is the bridging protocol designed to prevent bridging loops in the Ethernet network by shutting off ports to eliminate multiple paths between devices. In the simplest case, redundant links between two bridges with STP disabled create a bridging loop that can create a broadcast storm on the network as seen in Figure 2. In Figure 2, a single broadcast packet sent into port 1 is broadcast to ports 2 and 3 (shown in red). At port 2, the first packet is broadcast to ports 4 and 3 (shown in blue). At port 3, the second packet is broadcast to ports 4 and 2 (indicated in green). This continues indefinitely and, as additional packets are sent from ports 1 and 4 into the network, eventually all of the bandwidth on every link of the network is consumed. STP prevents this from occurring by blocking the connection between ports 3 and 3, so that there are no bridging loops. Figure 2: Bridging Loop Ethernet in the LAN Understanding the benefits that MPLS provides in implementing MBE service requires an understanding of the limitations of Ethernet in the LAN. Unlike a WAN where there are different varieties of Ethernet service for different applications, Ethernet and MBE are synonymous in the LAN and have the following attributes. VLANs identify broadcast domains. VLANs are globally significant, creating a limitation of 4,094 broadcast domains per network. Any VLAN can consume all available space in the MAC forwarding table. Any VLAN can consume all available bandwidth on a port. Broadcast traffic is treated with the same priority as non-broadcast traffic. Broadcast storms are prevented through the use of STP, which ensures that there are no loops in the network. Virtual Private LAN Service VPLS is a standards effort that is currently underway in the L2VPN working group of the Internet Engineering Task Force (IETF). The working group aims to create an interoperable standard for MBE over MPLS. There are two different approaches to signaling pseudowires (PW) between MBE service instances on different MPLS Provider Edge (PE) routers. One approach uses extensions to Label Discovery Protocol (LDP) to build connections across an MPLS network the same way that point-to-point virtual private lines are signaled across an MPLS network. The other approach uses extension to Border Gateway Protocol (BGP) to build connections across an MPLS network, which is the same way that network-based Private IP VPNs are signaled. Both protocols achieve the same result creating a more scalable architecture for metro, national, and global MBE services. Benefits of VPLS Over Traditional Ethernet Many of the benefits of VPLS over traditional bridged Ethernet are the result of the different markets at which the two technologies are targeted. Ethernet bridges are employed by individual customers for use in the LAN, while MPLS PEs are used by service providers for serving multiple customers in the WAN. Page 3 of 10

4 Some of the benefits of VPLS include: VLANs identify Ethernet flows and can be mapped to broadcast domains. VLANs are locally significant, allowing for more than 4,094 broadcast domains per network. Space in the MAC forwarding table can be limited on a per-vpls service instance basis. VLAN bandwidth can be policed/shaped to the amount the customer purchased. Broadcast traffic can be limited to a fraction of the provisioned bandwidth. Broadcast storms are prevented through the use of split horizon, which prevents broadcast loops. Split Horizon The main architectural difference between traditional bridged-ethernet and VPLS is the use of split horizon instead of STP. STP suffers from the following problems: Slow reconvergence after network failures on the order of minutes for very large networks Possibility of high latency through the network, since the shortest path through the network can be blocked Possibility of service disruption if the spanning tree blocks the only path to an end destination Stranded bandwidth caused by blocked ports Split horizon solves many of the scalability problems that STP experiences in very large deployments. It uses the tunnel capabilities of MPLS to build a logical full mesh of connections called Label Switched Paths (LSP) between VPLS service nodes. Because all of the VPLS service nodes are fully meshed, VPLS service nodes only forward traffic to and from customer devices served from the VPLS service node. Traffic received from a VPLS service node is never sent back to other VPLS service nodes, because the device expects that a full mesh of connectivity exists between all VPLS service nodes. In Figure 3, VPLS PE4 will never forward traffic from VPLS PE1 to VPLS PE2, even in the event of a network failure. Instead, the VPLS service node relies on the underlying MPLS tunnels to reroute traffic and restore connectivity. VLAN 1 VLAN 2 VLAN 3 GE VPLS PE1 VPLS PE3 Private MPLS Network VPLS PE2 VPLS PE4 VLAN 7 GE VLAN 6 VLAN 5 Legend High Speed Connection (relative to ) Low Speed Connection (relative to ) Layer 2 Switch Layer 2 Aggregator Building Aggregator CPA Network Element VPLS Network Element VLAN 4 Figure 3: VPLS Service Example Figure 3 depicts implementing VPLS using Converged Packet Access (CPA). For simplicity s sake redundancy is not depicted in this figure. The figure breaks CPA aggregation and VPLS service into separate functions, but, in some instances, these functions could reside in the same platform. In this example, the enterprise has seven locations served by three VPLS service nodes. Each service node is a different metro area. Page 4 of 10

5 These VLANs are being applied in one of the following three manners. Each customer location is transmitting untagged traffic, and the VLANs are being pushed by the CPA network. Each customer location is transmitting the same VLAN tag, and the VLANs are being swapped by the CPA network to the listed values. Each customer location is transmitting multiple VLAN tags, and the VLANs are being pushed by the CPA network as stacked carrier tags. Interaction Between CPA and VPLS Bridging only occurs in the VPLS PE function. Traffic between customer locations in the same metro area has to go all the way to the VPLS PE for bridging to occur. The CPA network is designed to provision large numbers of point-to-point VLAN flows from the customer s premises to the various service edges; one of which is the VPLS service edge. The handoff to the VPLS service edge is via a single gigabit Ethernet (GE) interface that carries all of the aggregated VPLS traffic within the metro area. VLANs are locally significant in the CPA network and their value is swapped as needed to the next available value. The same VLAN value is not shown at every site, because all of the traffic in the metro area eventually will traverse a single connection to the service edge. Figure 3 only shows devices that are engaged in packet processing. Lower layer devices like TDM ADMs and optical ADMs (OADM) can be placed between devices as needed for transport between physical locations. VPLS Packet Walkthrough In Figure 3, a broadcast packet sent from the customer location designated as VLAN 1 will traverse the CPA network to the GE connected to VPLS PE1. At VPLS PE1, it will be replicated and sent back to the same GE as VLAN 2 and VLAN 3, which will be groomed through the CPA network to the other two customer locations in the metro served by VPLS PE1. The broadcast packet also will be replicated and sent across the MPLS network to VPLS PE2 and VPLS PE4. Because VPLS PE3 has not been provisioned as part of the VPLS service instance, the broadcast packet is not sent to VPLS PE3. At VPLS PE4, the packet will be forwarded to the GE shown as VLAN 7. Finally, at VPLS PE2, the broadcast packet will be replicated and sent down the GE as VLAN 4, VLAN 5, and VLAN 6, which will be groomed through the CPA network to the final three customer locations served by VPLS PE2. Private IP vs. VPLS Figure 4 shows a network diagram of a Private IP service with access via CPA. The diagrams look almost identical to the VPLS service shown in Figure 3, and, in many cases, the same MPLE PEs can provide both services. VLAN 1 VLAN 2 VLAN 3 GE Private IP PE1 Private IP PE3 Private MPLS Network Legend Private IP PE2 Private IP PE4 VLAN 7 GE VLAN 6 High Speed Connection (relative to ) Low Speed Connection (relative to ) Layer 2 Switch Layer 2 Aggregator Building Aggregator CPA Network Element Private IP Network Element VLAN 5 VLAN 4 Figure 4: Private IP Service Example Page of 10

6 Network Costs Many cost benefits of VPLS over legacy VPN services actually are the benefits of Ethernet interfaces and not Ethernet bridging. If VPLS and Private IP services use the same access network, the same MPLS core, and, in some cases, the same PEs to provide the service, why would there be any cost difference in the two technologies? Encapsulating an IP datagram in Ethernet does not magically reduce network cost. Because of MAC address randomness, changes in the IP world that reduce the number of IP routes and increase scalability are actually useless in the world of Ethernet bridging. This means that VPLS is less scalable than Private IP with the same hardware, which actually makes the service more expensive to deploy than Private IP service. VPLS Scaling Challenges Key scaling limitations of VPLS compared to Private IP include: Limits on the number of MAC addresses Reduced bandwidth from broadcasts Total network size These scaling limitations are the result of the MAC learning that reduces configuration (compared to Private IP) and are at the very heart of bridged networks. That means these limitations will be difficult to overcome. As VPLS networks scale nationally and globally, MAC learning takes longer and bandwidth efficiency is decreased from additional broadcasts. How to Know If VPLS Is Right for You Private IP is an established service that can meet the needs of the majority of Verizon Business s customers. However, there are some customers that would be better suited for a future Verizon Business VPLS offering for a variety of reasons: Non-IP protocols required Special routing protocol requirements, including MPLS More comfortable with a Layer 2 service Less reconfiguration to move from existing Layer 2 service Router configuration more consistent at every location For customers with these and similar requirements, VPLS may be the right solution. Page 6 of 10

7 Appendix A This Appendix includes information on existing VPN service offerings, which includes: Physical Private Line Network Virtual Private Line VPN CPE-Based IP VPN Network-Based Private IP VPN Physical Private Line Network A network composed of physical layer circuits is actually more of a Private Network than a VPN. This type of network can be composed of traditional Time Division Multiplexing (TDM) circuits, TDM circuits with Ethernet handoffs, wavelengths, or dark fibers. The distinguishing characteristic of this network is that every connection between locations requires additional physical ports. For a full mesh of connectivity between n locations, the number of ports increases on the order of n2. Adding new locations requires adding as well as configuring new physical ports at existing locations. Since all connections are point-to-point, the CPE decides through which circuit any given packet is sent. Because physical connections between locations exist, bandwidth must be purchased in large increments. Utilization often is low within the physical pipes between locations, because they each have to be sized for peak capacity. Increasing bandwidth usually requires swapping out low-speed uplinks for higher-speed uplinks, which is cost and time prohibitive. However, this network provides complete flexibility in link layer (Ethernet, Frame Relay, ATM, PPP) choice and network layer (IP and IPX) protocols, including routing protocols and architectures. Furthermore, security and QoS are very strong because of the physical layer isolation between customers. Advantages Complete flexibility in choice of L2/L3 protocols and architecture High perceived security Perfect QoS Bandwidth scales from low to high Disdvantages Multiple TDM interfaces on each router Confined to TDM bandwidth increments with no bursting Adding a site requires new circuits all across the network High cost Figure A1: Physical Private Line Network Page 7 of 10

8 Virtual Private Line VPN The most popular virtual private line VPN is Frame Relay, but the same architecture can be used to build VPNs using ATM and Ethernet technologies. Prior to the emergence of Ethernet in the MAN and WAN environments, this type of VPN was synonymous with Layer 2 VPN (L2VPN). Presently this type of VPN is more accurately called a point-to-point L2VPN, because each connection only is between two locations. The major difference between a Frame Relay VPN and a network composed of physical private lines is the notion of logical ports within the physical port. Instead of all the traffic leaving a physical port and going to the same destination, traffic can be forwarded to different locations based on the tag carried within the frame (e.g., DLCI for Frame Relay, VLAN for Ethernet, VPI/VCI for ATM). This eliminates the need for previously mentioned n2 physical ports. Instead, a single physical port can be subdivided into multiple logical ports for connection to multiple locations across a switched network potentially a huge cost advantage. Since all connections are point-to-point, the CPE decides through which virtual circuit (VC) any given packet will be sent. Adding new locations requires adding new logical interfaces at existing locations. This can be done remotely, since no new interfaces or cabling is required. Because there are logical connections between locations, bandwidth can be purchased in much smaller increments than TDM channels or wavelengths can provide. Furthermore, the interface can be sized for the peak demand of individual connections instead of the peak demand of all connections in aggregate. Upgrading the bandwidth between sites also can be done much more quickly via remote provisioning assuming bandwidth is available on the physical port. Customers with this type of VPN service must use the link-layer protocol of the service (e.g., Ethernet, Frame Relay, or ATM), but any network protocols and routing protocols can be used similar to a network built with private lines. Because the service network has no knowledge of the IP layer, this type of VPN is IP-service transparent. Due to the amount of logical provisioning required for a full mesh, these types of VPNs often are built as hub-and-spoke networks with many small, remote locations having single connections to the main office and the main office hub having spoke connections to all of the remote locations. The perception of security is less for virtual private lines than for physical private lines, but the main security risk is misprovisioning, which can happen almost as easily in networks composed of physical private lines. QoS in virtual private line VPNs varies by service provider and service network, but it can become very poor if the network is largely oversubscribed. By leveraging the deployment of MPLS technology, different customer locations can use different protocols via MPLS IWF to convert between protocols as needed (e.g., Ethernet access to Frame Relay VPN). Advantages One physical interface on each router Complete flexibility in choice of L3 protocols and architecture Flexible bandwidth with support for bursting Disdvantages Multiple logical subinterfaces on each router Adding a site requires new connections all across the network Figure A2: Virtual Private Line VPN Page of 10

9 CPE-Based IP VPN CPE-based IP VPNs are actually a subclass of virtual private line VPNs and use the public Internet for lowcost connectivity, especially at low speeds. This type of VPN is very common for remote access applications where small remote offices need connectivity into a hub location. For this reason, these types of networks are commonly hub-and-spoke designed. Since the public Internet is insecure, encryption is employed to build secure tunnels between locations. These tunnels are the virtual private lines that make up this type of VPN. Adding new locations requires adding new encrypted tunnels at existing locations. This can be done remotely, since no new interfaces or cabling is required. Low cost access is partially offset by the cost of encryption hardware and software at each location. At higher bandwidths, this is often cost prohibitive. This type of VPN has the advantage of leveraging the ubiquity of the public IP network, spanning multiple providers across the globe. The primary disadvantage is the lack of QoS. The public Internet is a best-effort network and neither bandwidth nor priority can be guaranteed end-to-end. Advantages One physical interface on each router Complete flexibility in choice of L3 protocols and architecture Flexible bandwidth with support for bursting Low cost works across existing Internet service No provisioning Disdvantages Multiple logical sub-interfaces on each router Low QOS Low speed Figure A3: CPE-Based IP VPN Page 9 of 10

10 Network-Based Private IP VPN Network-Based Private IP VPNs are much simpler to operate and maintain than point-to-point L2VPNs. This type of VPN leverages MPLS to provide secure IP connectivity between customer locations and is often called Layer 3 VPN (L3VPN). Because IP is a network protocol instead of a link-layer protocol, customer connectivity is any-toany instead of point-to-point. This means that each customer router only has one logical connection (or two for diversity) into the service network. Instead of forwarding packets based on logical tags applied by the customer, the network routes the traffic to the proper destination based on the IP address. When new customer locations are added to the VPN, no new configuration is required at existing customer sites. While this is simpler, it does increase the complexity of the service network. Because the link-layer protocols only exist from the customer s premises to the service edge, different access methods can be used at each customer location without any additional configuration, complexity, or IWF such as mixing Ethernet and Frame Relay access. With network-based Private IP, bandwidth is much more flexible than it is with point-to-point L2VPNs. Instead of purchasing and provisioning bandwidth per logical connection, bandwidth is purchased and provisioned in aggregate as access links into the VPN. This decreases the required bandwidth because all of the bandwidth at a single location can be used for communication to another location at any given time. The main disadvantage of this VPN type is that customers are more restricted in their choice of network protocols, routing protocols, and routing architectures. Since the customer has to peer with the service provider at the IP layer, non-ip protocols are not supported and coordination on IP addressing, routing protocols, and tunneling technologies, such as customer MPLS, has to be arranged with the service provider. That means the VPN is not IP service transparent. This requires relinquishing some service flexibility in order to simplify the network. Advantages One logical subinterface on each router Flexible bandwidth with support for bursting Adding a site requires no changes at existing sites Disdvantages Limited choice of routing protocols and IP architectures Likely requires changes in IP network architecture IP only Coordination with service provider required on IP changes Figure A4: Network-Based Private IP VPN We never stop working for you Verizon. All Rights Reserved. WP /06 The Verizon and Verizon Business names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. Page 10 of 10

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

Introduction to Multi-Protocol Label

Introduction to Multi-Protocol Label Introduction to Multi-Protocol Label Switching (MPLS) Matthew Bocci, Alcatel-Lucent IP Division Agenda History of MPLS Standardisation MPLS Architecture Control Plane QoS and Traffic Engineering Protection

More information

Hands-On VPLS: Virtual Private LAN Service

Hands-On VPLS: Virtual Private LAN Service Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note

Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)

More information

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture

Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture 1 Optimizing Ethernet Access Network for Internet Protocol Multi-Service Architecture Author: Mikael Forsten TeliaSonera Sonera Carrier Networks Supervisor: Docent Timo O. Korhonen Instructor: M.Sc Jari

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

Configuring Routed Pseudowire and VPLS

Configuring Routed Pseudowire and VPLS Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites

More information

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems.

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems. THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS Sangeeta Anand Vice President Product Management Cisco Systems October 20, 2003 1 Agenda Introducing the Full Service Network The MPLS Journey

More information

OPTera Metro 8000 Services Switch

OPTera Metro 8000 Services Switch Product/Service Bulletin Nortel Networks Services Switch Service providers looking for ways to scale Ethernet-based services and maximize their profitability need look no further than the Nortel Networks

More information

Request for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs)

Request for Comments: Cisco Systems, Inc. September Framework for Layer 2 Virtual Private Networks (L2VPNs) Network Working Group Request for Comments: 4664 Category: Informational L. Andersson, Ed. Acreo AB E. Rosen, Ed. Cisco Systems, Inc. September 2006 Framework for Layer 2 Virtual Private Networks (L2VPNs)

More information

Optical + Ethernet: Converging the Transport Network. An Overview

Optical + Ethernet: Converging the Transport Network. An Overview Optical + Ethernet: Converging the Transport Network An Overview Trends Regional Optical Networks for Research Locally-managed fiber termination points Locally-organized peering relationships Locally-controlled

More information

MPLS design. Massimiliano Sbaraglia

MPLS design. Massimiliano Sbaraglia MPLS design Massimiliano Sbaraglia - MPLS layer 2 VPN diagram flowchart - MPLS layer 2 VPN pseudowire VPWS diagram - MPLS layer 2 VPN VPLS diagram - MPLS layer 2 EVPN diagram - MPLS layer 3 VPN diagram

More information

ETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY

ETHERNET SERVICES FOR MULTI-SITE CONNECTIVITY SECURITY, PERFORMANCE, IP TRANSPARENCY INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using

More information

سوي يچينگ و مسيريابي در شبكه

سوي يچينگ و مسيريابي در شبكه سوي يچينگ و مسيريابي در شبكه دكتر فرهاد فغاني استاديار دانشكده مهندسي برق قسمت ششم : Multi-Protocol Label Switching (MPLS) 1 One of the many ways of getting from A to B: BROADCAST: Go everywhere, stop

More information

L2 MPLS VPN (VPLS) Technology White Paper

L2 MPLS VPN (VPLS) Technology White Paper S9500 L2 MPLS VPN (VPLS) Technology White Paper L2 MPLS VPN (VPLS) Technology White Paper Keywords: MPLS, VPLS Abstract: MPLS technologies make it very easy to provide VPN services based on IP technologies

More information

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery

Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

SUCCESSFUL STRATEGIES FOR NETWORK MODERNIZATION AND TRANSFORMATION

SUCCESSFUL STRATEGIES FOR NETWORK MODERNIZATION AND TRANSFORMATION SUCCESSFUL STRATEGIES FOR NETWORK MODERNIZATION AND TRANSFORMATION A Technology Evolution Perspective Both fixed line and mobile service providers are facing a growing variety of challenges related to

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

ENTERPRISE MPLS. Kireeti Kompella

ENTERPRISE MPLS. Kireeti Kompella ENTERPRISE MPLS Kireeti Kompella AGENDA The New VLAN Protocol Suite Signaling Labels Hierarchy Signaling Advanced Topics Layer 2 or Layer 3? Resilience and End-to-end Service Restoration Multicast ECMP

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring BGP Autodiscovery for LDP VPLS Release NCE0035 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract No. 106 Technology White Paper Page: 1 of 7 MPLS for Metropolitan Area Networks Abstract The demand for bandwidth in Metropolitan Area Networks (MANs) and the increased availability of fiber has created

More information

Developing Standards for Metro Ethernet Networks

Developing Standards for Metro Ethernet Networks Developing Standards for Metro Ethernet s Stephen Haddock shaddock@extremenetworks.com Chief Technology Officer Agenda Metro Ethernet s Metro Ethernet Forum Services Model and Definitions Traffic Management

More information

Carrier Ethernet Evolution

Carrier Ethernet Evolution Carrier Ethernet Evolution Next phase of carrier-class Ethernet services wave Levente Laposi, IP Division Regional Support Centre October 2008 Agenda 1. Introduction 2. Understanding P 3. P-VPLS The next

More information

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400 Cisco PPPoE Baseline Architecture for the Cisco UAC 6400 Document ID: 12915 Contents Introduction Assumption Technology Brief Advantages and Disadvantages of PPPoE Architecture Advantages Disadvantages

More information

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal We all know Ethernet based on its long history as the LAN connectivity technology of choice. Recently,

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

L2VPN Interworking. Finding Feature Information

L2VPN Interworking. Finding Feature Information Interworking is a transforming function that is required to interconnect two heterogeneous attachment circuits (ACs). Several types of interworking functions exist. The function that is used would depend

More information

Taking MPLS to the Edge. Irit Gillath

Taking MPLS to the Edge. Irit Gillath Taking MPLS to the Edge Irit Gillath Agenda Market status MPLS, VPLS, HVPLS and other nasty words Case study: Silver server Recap Moving Ethernet from the enterprise to the carrier Ethernet was used originally

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

Cisco Group Encrypted Transport VPN

Cisco Group Encrypted Transport VPN Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

isco Cisco PPPoE Baseline Architecture for the Cisco UAC

isco Cisco PPPoE Baseline Architecture for the Cisco UAC isco Cisco PPPoE Baseline Architecture for the Cisco UAC Table of Contents Cisco PPPoE Baseline Architecture for the Cisco UAC 6400...1...1 Introduction...1 Assumption...1 Technology Brief...2 Advantages

More information

Cisco ONS Port 10/100 Ethernet Module

Cisco ONS Port 10/100 Ethernet Module Cisco ONS 15305 8-Port 10/100 Ethernet Module The Cisco ONS 15305 8-Port 10/100 Ethernet module provides eight ports for Layer 1 or Layer 2 switched transport of Ethernet and Fast Ethernet traffic over

More information

Small Enterprise Design Profile(SEDP) WAN Design

Small Enterprise Design Profile(SEDP) WAN Design CHAPTER 3 Small Enterprise Design Profile(SEDP) WAN Design This chapter discusses how to design and deploy WAN architecture for Small Enterprise Design Profile. The primary components of the WAN architecture

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

Cisco EXAM Cisco ADVDESIGN. Buy Full Product.

Cisco EXAM Cisco ADVDESIGN. Buy Full Product. Cisco EXAM - 352-001 Cisco ADVDESIGN Buy Full Product http://www.examskey.com/352-001.html Examskey Cisco 352-001 exam demo product is here for you to test the quality of the product. This Cisco 352-001

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Ethernet based Broadband Access Networks

Ethernet based Broadband Access Networks Ethernet based Broadband Access Networks Abhay Karandikar Department of Electrical Engineering IIT Bombay Mumbai 400076 karandi@ee.iitb.ac.in ICBN 2003, Bangalore, Invited Talk Agenda of Talk Current Broadband

More information

Mission Critical MPLS in Utilities

Mission Critical MPLS in Utilities Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This

More information

Operation Manual MPLS VLL. Table of Contents

Operation Manual MPLS VLL. Table of Contents Table of Contents Table of Contents... 1-1 1.1 MPLS VLL Overview... 1-2 1.1.1 Concepts in MPLS VLL... 1-2 1.1.2 Introduction to MPLS VLL... 1-2 1.1.3 Packet Forwarding... 1-3 1.1.4 Implementation... 1-4

More information

Cisco Webex Cloud Connected Audio

Cisco Webex Cloud Connected Audio White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected

More information

Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.)

Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.) Volume: 217 Questions Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.) A. the process ID B. the hello interval C. the subnet mask D. authentication E.

More information

Configuration and Management of Networks. Pedro Amaral

Configuration and Management of Networks. Pedro Amaral Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast

More information

Pseudo Wire Emulation Edge to Edge (PWE3) and Multi-Protocol Label Switching (MPLS)

Pseudo Wire Emulation Edge to Edge (PWE3) and Multi-Protocol Label Switching (MPLS) Pseudo Wire Emulation Edge to Edge (PWE3) and Multi-Protocol Label Switching (MPLS) Course Description Network transport service providers and their users are seeking to rationalize their networks by migrating

More information

Configure Multipoint Layer 2 Services

Configure Multipoint Layer 2 Services This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and

More information

Introduction to Cisco ASR 9000 Series Network Virtualization Technology

Introduction to Cisco ASR 9000 Series Network Virtualization Technology White Paper Introduction to Cisco ASR 9000 Series Network Virtualization Technology What You Will Learn Service providers worldwide face high customer expectations along with growing demand for network

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring VPLS Multihoming Using Autodiscovery (FEC 129) Release NCE0072 Modified: 2016-10-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA

More information

MC-LAG to VPLS Technology and Solution Overview

MC-LAG to VPLS Technology and Solution Overview CHAPTER 3 MC-LAG to VPLS Technology and Solution Overview Virtual Private LAN Service (VPLS) is an architecture that provides multipoint Ethernet LAN services, often referred to as Transparent LAN Services

More information

Free4Torrent. Free and valid exam torrent helps you to pass the exam with high score

Free4Torrent.   Free and valid exam torrent helps you to pass the exam with high score Free4Torrent http://www.free4torrent.com Free and valid exam torrent helps you to pass the exam with high score Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services

More information

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3

Lab 1: Static MPLS LSP-RTX4-RTX1 LSP-RTX1-RTX4 LSP-RTX3-RTX2 LSP-RTX2-RTX3 Lab 1: Static MPLS First lab gives a basic understanding of MPLS label swapping No signaling manually assign labels like static routing Understand configuration, forwarding tables, and debugging of MPLS

More information

MPLS network built on ROADM based DWDM system using GMPLS signaling

MPLS network built on ROADM based DWDM system using GMPLS signaling MPLS network built on ROADM based DWDM system using GMPLS signaling PIONIER experiences in GMPLS based next generation optical network and strategy for integration of MPLS based metropolitan academic networks

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Ethernet CFM Over VPLS Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des

QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to a Layer 3 VPN service. In your des Vendor: Cisco Exam Code: 352-001 Exam Name: ADVDESIGN Version: Demo www.dumpspdf.com QUESTION: 1 You have been asked to establish a design that will allow your company to migrate from a WAN service to

More information

Numerics I N D E X. AAL (ATM Adaptation Layer), AAL5 CPCS-SDU mode,

Numerics I N D E X. AAL (ATM Adaptation Layer), AAL5 CPCS-SDU mode, I N D E X Numerics A 802.1p tagging, 63, 65 802.1q tagging, 63, 65 802.1q tunneling, 62 63 asymmetrical links, 65 restrictions, 67 68 tagging process, 66 AAL (ATM Adaptation Layer), 94 95 AAL5 CPCS-SDU

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

Evaluating networking technologies

Evaluating networking technologies Evaluating networking technologies Navigating through the latest range of networking solutions can be challenging for enterprises aiming to improve their productivity and efficiency. They need to select

More information

TRILL Transparent Transport over MPLS

TRILL Transparent Transport over MPLS TRILL Transparent Transport over MPLS draft-muks-trill-transport-over-mpls- 00 Mohammad Umair, Kingston Smiler, Donald Eastlake, Lucy Yong Overview This draft covers two problems as follows. Providing

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

AToM (Any Transport over MPLS)

AToM (Any Transport over MPLS) I N D E X A AAL5 over MPLS operation, 459 460 configuration, 462 463 flowchart configuration, 461 PE router, 461 provider router, 461 verification, 463 465 AAL5 to VLAN Interworking, 515 517 AC (Attachment

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

Mission Critical MPLS in Public Safety Microwave Systems

Mission Critical MPLS in Public Safety Microwave Systems The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Public Safety Microwave Systems The Technology to Support Evolving Networks Abstract This application

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Cisco CPT Packet Transport Module 4x10GE

Cisco CPT Packet Transport Module 4x10GE Data Sheet Cisco CPT Packet Transport Module 4x10GE The Cisco Carrier Packet Transport System (CPT) 200 and 600 sets the industry benchmark as a carrier-class converged access and aggregation platform

More information

Module 11b MPLS VPLS Configuration Lab (LDP Manual)

Module 11b MPLS VPLS Configuration Lab (LDP Manual) APNIC MPLS Workshop Lab Module 11b MPLS VPLS Configuration Lab (LDP Manual) Objective: All the routers are pre-configured with basic interface, OSPF, BGP, MPLS Label Distribution Protocol (LDP) configuration

More information

Cisco Service Advertisement Framework Deployment Guide

Cisco Service Advertisement Framework Deployment Guide Cisco Service Advertisement Framework Deployment Guide What You Will Learn Cisco Service Advertisement Framework (SAF) is a network-based, scalable, bandwidth-efficient approach to service advertisement

More information

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit

More information

How to Configure a Hybrid WAN in Parallel to An Existing Traditional Wan Infrastructure

How to Configure a Hybrid WAN in Parallel to An Existing Traditional Wan Infrastructure Table of Contents Introducing Hybrid WAN The WAN Evolution What is a Traditional Private WAN? Example IP Addressing What is a Hybrid WAN? SD-WAN - Centrally Managed Hybrid WAN Hybrid WAN Example Hybrid

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Optical Ethernet Architecture Evolution The Logical Provider Edge. Mark I Williams August 28 th, 2003

Optical Ethernet Architecture Evolution The Logical Provider Edge. Mark I Williams August 28 th, 2003 Optical Ethernet Architecture Evolution The Logical rovider Edge Mark I Williams August 28 th, 2003 1 Agenda OE Introduction and Drivers VLS The technology behind the Service Decoupled VLS roviding Scalable

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Hierarchical VPLS Release NCE0015 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

MPLS 101. Global Packet Transport Rollout. 2 Nov MPLS SharePoint Site: UNITED IN IN SERVICE TO OUR NATION UNCLASSIFIED

MPLS 101. Global Packet Transport Rollout. 2 Nov MPLS SharePoint Site:  UNITED IN IN SERVICE TO OUR NATION UNCLASSIFIED MPLS 101 Global Packet Transport Rollout MPLS SharePoint Site: http://go.usa.gov/x3vr5 2 Nov 2017 UNITED IN IN SERVICE TO OUR NATION 1 MPLS? Services It s a Technology Protocol 2 MPLS Layer-3 VPNs (AKA

More information

H-VPLS N-PE Redundancy for MPLS Access

H-VPLS N-PE Redundancy for MPLS Access The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant

More information

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Deploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by: Deploy VPLS APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems 2 VPLS Overview 3 Virtual Private LAN Service

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

Deploying MPLS L2VPN

Deploying MPLS L2VPN Deploying MPLS L2VPN Nurul Islam Roman (nurul@apnic.net) 1 Abstract This session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material

More information

Spirent TestCenter EVPN and PBB-EVPN AppNote

Spirent TestCenter EVPN and PBB-EVPN AppNote Spirent TestCenter EVPN and PBB-EVPN AppNote Executive summary 2 Overview of EVPN 2 Relevant standards 3 Test case: Single Home Test Scenario for EVPN 4 Overview 4 Objective 4 Topology 4 Step-by-step instructions

More information

VPLS Autodiscovery: BGP Based

VPLS Autodiscovery: BGP Based First Published: February 19, 2007 Last Updated: February 19, 2007 VPLS Autodiscovery enables each Virtual Private LAN Service (VPLS) provider edge (PE) router to discover which other PE routers are part

More information

Implementing Virtual Private LAN Services

Implementing Virtual Private LAN Services Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Switching Types OTN MPLS-TP: VPWS MPLS-TP: VPLS CE: VLAN XC CE: Bridging SONET/SDH N/A

Switching Types OTN MPLS-TP: VPWS MPLS-TP: VPLS CE: VLAN XC CE: Bridging SONET/SDH N/A APPLICATION NOTE Universal ing Reduce Costs and Grow Revenues with Flexible and Future-proof Transport ing Network operators are faced with a wide range of options for the electrical switching layer of

More information

MPLS AToM Overview. Documentation Specifics. Feature Overview

MPLS AToM Overview. Documentation Specifics. Feature Overview MPLS AToM Overview This document provides an introduction to MPLS AToM and includes the following sections: Documentation Specifics, page 14 Feature Overview, page 14 Benefits, page 26 What To Do Next,

More information

Alcatel-Lucent 1675 LambdaUnite MultiService Switch

Alcatel-Lucent 1675 LambdaUnite MultiService Switch Alcatel-Lucent 1675 LambdaUnite MultiService Switch Versatile switching platform designed to meet today s network requirements and to drive future network trends LambdaUnite MultiService Switch (MSS) is

More information

RESILIENT PACKET RING TECHNOLOGY

RESILIENT PACKET RING TECHNOLOGY 1 RESILIENT PACKET RING TECHNOLOGY INTRODUCTION 1. An important trend in networking is the migration of packet-based technologies from Local Area Networks to Metropolitan Area Networks (MANs). The rapidly

More information

Virtualizing The Network For Fun and Profit. Building a Next-Generation Network Infrastructure using EVPN/VXLAN

Virtualizing The Network For Fun and Profit. Building a Next-Generation Network Infrastructure using EVPN/VXLAN Virtualizing The Network For Fun and Profit Building a Next-Generation Network Infrastructure using EVPN/VXLAN By Richard A Steenbergen A BRIEF HISTORY OF LAYER 2 NETWORKING Historically,

More information

L2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved.

L2 VPNs. Javed Asghar Muhammad Waris Sagheer 2005, Cisco Systems, Inc. All rights reserved. L2 VPNs Javed Asghar jasghar@cisco.com Muhammad Waris Sagheer waris@cisco.com 2005, Cisco Systems, Inc. All rights reserved. 1 Agenda! Topics:! L2VPN Introduction! L2VPN Models! Quality of Service! L2VPN

More information

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture

Table of Contents. Cisco RFC1483 Bridging Baseline Architecture Table of Contents RFC1483 Bridging Baseline Architecture...1 Introduction...1 Assumption...1 Technology Brief...1 Advantages and Disadvantages of RFC1483 Bridging...1 Advantages...2 Disadvantages...2 Implementation

More information

Universal Network Demarcation. Enabling Ethernet and wave services with the Nokia 1830 PSD. Application note. 1 Application note

Universal Network Demarcation. Enabling Ethernet and wave services with the Nokia 1830 PSD. Application note. 1 Application note Enabling Ethernet and wave services with the Nokia 1830 PSD Application note 1 Application note Contents Introduction 3 Market drivers 3 The need for network demarcation 5 1830 Photonic Service Demarcation

More information