Carrier Ethernet Services

Size: px
Start display at page:

Download "Carrier Ethernet Services"

Transcription

1

2 Introduction For some years now, the principal 'Next Generation Network' offerings of Telecoms s, for mid to large sized Enterprises, have been based on IP Virtual Private Network (IP VPN) technologies. The term 'Next Generation Network' is one of those wonderfully flexible marketing phrases which has been used (and possibly abused!) for many years. In reality, the term has never referred to a single, well defined architecture. Essentially the phrase originated in relation to Wide Area Network architectures, as packet-based networks emerged after the long-time dominance of TDM based PDH/SDH network infrastructures. Generally, of late, it has become synonymous with the deployment of IP Routed networks, underpinned by Multi-protocol Label Switching (MPLS). Out of this core technology has emerged an array of commercial IP VPN services, which are attractive primarily through support of both 'Quality of Service' features and flexibility of Access technology. More recently Ethernet, the ubiquitous technology of the Corporate Local Area Network (LAN), has evolved to the extent of becoming a viable choice for Wide Area Network (WAN) deployment. For some time, Ethernet has been one of the Access options for IP VPN networks, but increasingly Ethernet 'Layer- 2' WAN Services are now being adopted, as a either a competitive or complementary approach to IP VPNs. This paper provides a brief overview of both IP VPN and Ethernet WAN services, looking at the pros and cons of both, from the perspective of both and customer, and then considers some of the challenges facing the community, both in meeting increasing customer demands for 'Wires Only' Ethernet Access to IP VPNs and in making the transition to the provision of Layer-2 Ethernet WAN services. Not least of these challenges is the ability of the to offer strong customer service value to their clients in relation to provisioning and troubleshooting, when local connectivity is almost invariably provided via wholesale 'tail' circuits offering little or no management visibility to the at the point of hand off from WAN to LAN at the customer's premises. Backgrounder - Next Generation Networks and MPLS Thinking back in history a little, (to around the mid '80s), Wide Area Networks used to link Ethernet LAN domains, were initially Bridged, i.e. decisions as to whether to forward particular Ethernet packets across the WAN link were based upon algorithms requiring the 'learning' of Ethernet 'Media Access Control' (MAC) addresses of end-station devices. The rapid uptake thereafter of protocol-specific Routers, and the increasing ubiquity of IP as the protocol of choice, gave greater scalability, resilience and security to WAN architectures. IP Routers offer the potential for building resilient mesh networks, but in a traditional routed IP network, each Router makes an independent forwarding decision for every packet based on the packet s IP address header. A simple Routed mesh network is shown in Fig. 1. B A C Fig. 1: Each Router in a traditional IP Router network must make 'next hop' forwarding decisions for each packet in turn D E Page 1 of 12

3 When a packet arrives at a Router port, that Router has to determine where best to forward the packet for the 'next hop', in order to reach the required destination. Ultimately, in a large and high throughput network, this becomes performance limiting. In the mid '90s, the mechanism of 'Label Switching' was developed, largely to ease the congestion caused by Route calculations in IP Core networks, leading to the development of the standard for 'Multi-protocol Label Switching', MPLS. In fact, MPLS was architected to support various Network transports, including ATM and Frame Relay, but we will consider here the way in which MPLS brings a 'connection oriented' approach to the essentially 'connectionless' protocols of IP and Ethernet. In an MPLS environment, packets entering the network are handled in a particular way based on a definition known as 'Forward Equivalence Class' (FEC). FEC typically relates not only to the IP Subnet associated with a packet, but also to service Class, and packets exhibiting similar FEC characteristics are treated essentially as members of a 'group' and are assigned a similar 'label', i.e. a short packet header, which will determine the path to be taken for such packets across the MPLS network. Packets with different FEC characteristics will be assigned a different label and may take a different path through the network. Each Router in the network maintains a table indicating how to handle packets determined by the label, so once the packet has entered the network, Routers no longer need to perform IP address analysis and can make rapid and consistent forwarding decisions depending upon the label. One of the key benefits of MPLS is that it separates forwarding mechanisms from the underlying data-link service. MPLS can be used to create forwarding tables for data streams independently of the network access mechanism and traffic type, so s can use MPLS to deliver a wide variety of services and to support a wide array of access technologies. The two most popular traffic types supported over MPLS are Layer-3 (IP) BGP/MPLS VPNs (based on RFC 2547) and Layer-2 (or pseudowire) VPNs. RFC 2547 VPNs have been very widely implemented. The implementation defines a peering architecture in which customer edge (CE) Routers exchange routes with edge Routers, denoted 'Provider Edge' (PE). These then deliver VPN tunnelling across the 's MPLS 'Label Switching Router' (LSR) network, using paths defined by the label switching mechanism. For IP VPN services, the MPLS VPN backbone uses Border Gateway Protocol (BGP) for routing, and once the CE- PE peering is implemented using BGP, thereafter the 's MPLS network takes full responsibility for secure, reliable end-to-end packet delivery. For many s, the above scenario encapsulates the essence of the term 'Next Generation Network', and services based on the IP VPN approach are offered for a variety of different access media, as illustrated in Fig. 2 below. Remote Sites Home Workers Internet ADSL SDSL IP VPN over MPLS Core Network ADSL Secure Access For Home & Mobile Workers Storage and Application Servers Ethernet 1Gbps 2Mbps 'E1' Leased Line Regional Office Corporate HQ Fig. 2: Multi-access IP VPN Network Page 2 of 12

4 Note that in the case of IP VPNs, the is very much involved in the overall IP Routing topology of the customer, which inevitably means a high level of complexity (and, by association, cost) for the at the time of network commissioning and a subsequent degree of 'shared responsibility' between customer and for any adds, moves and changes which are required thereafter. Ethernet into the WAN We have already seen, in Fig. 2, that Ethernet is commonly used as one of the access vehicles for Corporate IP VPN networks. The scalability of bandwidth and familiarity of Ethernet lends itself to this role. In reality, Ethernet might be delivered across into the WAN cloud via a number of different Access media, including multiple bonded copper pairs for lower-speed connections (the so-called 'Ethernet in the First Mile' or 'EFM' offerings based on SHDSL technology) and fibre for higher speeds. In some instances, particularly those in which the customer requires high connection speeds, protocol transparency and may wish not to have a involved in their overall Routing topology, then as an alternative to the 'Virtual Routing' nature of an IP VPN, the customer may prefer the greater transparency, flexibility and connection speed scalability of a Switched Ethernet service for their WAN backbone. Depending on the complexity of the WAN architecture (i.e., single site, multi-site...), this might mean that either one or more point-to-point Switched Ethernet links are appropriate, or alternatively that a Multi-point 'Virtual Ethernet' network architecture is preferred. Since we have already established that s' New Generation (let's call them that, rather than 'next generation'!) Core Networks have become almost exclusively built around MPLS, what options exist for supporting 'raw' Layer-2 Ethernet connectivity in an MPLS environment (i.e. rather than Ethernet simply being the Access vehicle for a Layer-3 IP network)? Essentially, two main models have emerged, corresponding to the two scenarios outlined above. They are generally termed (i) 'Virtual Private Wire Service', for Point-to-Point links, and (ii) 'Virtual Private LAN Service' (VPLS), for Point to Multipoint networks. Virtual Private Wire Service implementations use effectively Label Switched 'pseudowire' tunnels, which are created between the 's PE Routers across the MPLS network, delivering Ethernet packets between two points across the MPLS 'cloud'. Virtual Private LAN Service (VPLS) implementations use potentially a number of slightly different mechanisms, by which the MPLS Core network can emulate one or more 'flat' Ethernet network domains. Layer-2 Ethernet VC Connections Site CE PE PE CE Site Meshed Pseudowire Links MPLS CORE NETWORK PE CE (typically a switch) Site Fig. 3: A full mesh of pseudowires is used to connect all provider edge (PE) devices supporting a given VPLS VPN Page 3 of 12

5 Different equipment vendors have proposed a number of variations in the areas of discovery of members to include within a given Layer-2 Virtual Network, and of signalling used to establish and tear-down individual Layer-2 pseudowire connections, but the net result is the same. Using MPLS like this for Ethernet has some 'knock-on' benefits in terms of overcoming the distance limitations within traditional switched Ethernet Networks and extending Ethernet broadcast domains potentially across a whole WAN infrastructure. Effectively, a single PE can transmit Ethernet packets to multiple remote PEs, connecting a customer site to any or all other customer sites as required. A schematic VPLS network is shown in Fig. 3 After all this talk of the 'inner workings' of networks, it may just be worth mentioning that various evolutions to MPLS, notably MPLS-TP (Transport Profile), have emerged, as a vehicle for optimisation of MPLS when carrying purely packet-based traffic, i.e. IP &/or Ethernet. An alternative transport mechanism, optimised for Ethernet delivery across Core Carrier networks, known as 'Provider Backbone Bridging, with Traffic Engineering' (PBB-TE) has also been mooted, although at the time of writing this White Paper, it would seem that the ubiquity of MPLS is speaking volumes in relation to the likely outcome of this particular battle! Of more significance in relation to the focus for this Paper, is a consideration of the positioning, for both s and customers, of IP VPN vs. Ethernet WAN services. IP VPN Characteristics IP VPN WAN services have been available for several years and are offered by both 1 st tier National/International Carriers and 2 nd tier s worldwide. A large number of enterprises have adopted IP VPN services, allowing them to interconnect hundreds or thousands of disparate regional, national, and global locations very effectively. As always, there are both benefits and disadvantages associated with any service. However, the most important characteristics of IP VPN services are: Flexibility of Access IP VPN architectures support a wide range of Access technologies and media. These can include traditional SDH/PDH Leased Lines, DSL services, Frame relay, ATM and Ethernet. This is a great strength of IP VPN services in that connections from individual users or small office locations, right up to regional or HQ locations, may be made to the corporate VPN service, through a variety of available Access networks, at an appropriate bandwidth. Scalability IP VPNs are essentially IP routed networks. As such, they offer a highly scalable platform for supporting very large enterprise networks with hundreds or even thousands of enterprise locations. Routed connections between s, and the large number of s offering IP VPN services, can enable connections for an enterprise customer to extend geographically on a regional, national or global basis, with the possibility for rapid expansion. Routing control Outsourced By deploying IP VPNs, enterprise IT managers effectively adopt a single architecture for WAN connectivity, eliminating the challenges of operational and resource planning and of maintaining the traditional plethora of separate networks. The status of the becomes that of a 'trusted partner', responsible for managing all aspects of WAN connectivity. Critically, the enterprise effectively outsources control over network Routing, which some IT managers may feel compromises their ability to manage security throughout the enterprise, i.e. within both LAN and WAN environments. The also typically takes responsibility for traffic policies within the WAN, such as the prioritisation of critical applications and the effective handling of Page 4 of 12

6 latency-sensitive real-time applications including VoIP and Video, using the 'Class of Service' (CoS) tools inherent within IP VPN architectures. The enterprise undoubtedly becomes reliant upon the expertise and processes of the Service Provider. This is true not only at commissioning time and during day-to-day operations, but also whenever the enterprise makes any changes to their applications or environment. The Service Provider remains integrally linked with the enterprise and routing re-configurations associated with adds, moves and changes are managed by the. Ethernet WAN Characteristics Ethernet WAN services have evolved rapidly over the past few years. Initially, they were restricted largely to Metro area networks, but are now available Nationally and Internationally from leading Service Providers. The key drivers for Enterprise adoption of Ethernet WAN services have been low cost, ease of implementation and a familiarity with Ethernet. Since its launch in the early '80s, with the final demise of IBM's Token Ring by the end of the '90s and despite brief incursions by the likes of FDDI and then ATM as LAN transports during that decade, Ethernet has achieved the status of becoming the singular universal technology of fixed infrastructure LANs over the past twelve or so years. Ethernet WANs use the same familiar industry-standard technologies which have evolved from early Ethernet LAN Bridging and Switching, including: Ethernet MAC addresses are used for forwarding traffic, with conventional MAC address 'learning' used by WAN Access points. Edge switches learn which addresses exist on particular paths through the WAN and maintain a table of addresses such that only packets destined for a given address are forwarded across the appropriate WAN link, improving overall network performance. 'Virtual LAN' (VLAN) constructs are accommodated. VLANs definitions may be applied, using a number of different criteria, to groups of devices on one or more LAN segments which can then be treated as members of the same physical network whilst remaining logically separate for security or performance purposes. Single or multiple 'VLAN Tags' (i.e. packets embedded within in the Ethernet frame header) are applied to denote such logical groupings and may be either embedded within the data stream in a customer network prior to presentation to the WAN service, or added by the Service Provider at the point of access to the WAN, as a mechanism for determining destination paths across the WAN. Since multiple VLAN tags may exist within the Ethernet frame header structure, then they become an important aspect of packet handling in both LAN and WAN. Support for CoS, alternatively known as 'Quality of Service' (QoS). LAN users are familiar with the application of prioritisation (typically defined by the application of the 802.1p prioritisation field to the VLAN header of an Ethernet frame) to signify the relative importance of handling particular frames, corresponding to certain traffic types, in a timely manner. At the WAN edge, Packets of different prioritisation are generally applied to different queues which may be then serviced at different rates for preferential transmission into the WAN. This is particularly significant for real-time applications such as VoIP, which is generally prioritised over less critical Internet data. As noted previously, Ethernet WAN services can be either point-to-point or multipoint in nature. Ethernet WAN services offer a number of potential benefits to both customer and, including scalability, reliability, reduced complexity, management and flexibility. Ethernet WAN services have the following key characteristics: Routing control is retained by the customer Unlike the case of IP VPNs, Routing control in the WAN is maintained by the enterprise customer. Certain enterprises prefer not to share their routing topology and schema and do not wish to outsource this potentially sensitive aspect of their operational control. With an Ethernet WAN service, Page 5 of 12

7 the customer implements and maintains fully its own end-to-end network routing decisions. The customer can change its routing environment according to the evolving requirements of the enterprise, without having to involve the, thus retaining a greater degree of control over security. Protocol transparency Ethernet WANs have the inherent ability to transport all legacy application protocols. Ethernet is a 'Layer-2' protocol and can support any higher-order network protocol, making it an ideal method of supporting legacy applications that are still in use by some enterprises. It is nevertheless true to say that by far the majority of traffic in today's networks comprises IP packets. Ethernet Operations and Maintenance (OAM) Ethernet WANs offer a more comprehensive OAM toolkit than historic Layer-2 WAN architectures. The Metro Ethernet Forum (MEF), the International Telecommunications Union (ITU), and the Institute of Electrical and Electronics Engineers (IEEE) have developed a number of OAM standard protocols which provide mechanisms to manage and monitor the performance of communications on the Ethernet WAN, including, most recently, the ability to monitor the key parameters of Throughput, Frame Loss, Latency (i.e. traffic delay across the network) and Jitter (i.e. variations in traffic delay). Comparison summary of vs. IP VPN A summary of the essential differences which have been outlined (plus some which are a consequence of the relative complexities of the two environments) between IP VPN services and Native Layer-2 Ethernet WAN services, are shown in Table 1 below. Attributes IP VPN Ethernet Virtual Private Wire Ethernet Virtual Private LAN Access technology Any Ethernet Ethernet Enterprise protocol IP only Multi-protocol Multi-protocol Connection topology Multi-point Layer-3 (IP) Routed Point-to-Point Layer-2 Switched Multipoint Layer-2 Switched C0S / Q0S Support Yes Yes Yes SLA Support Yes Yes Yes Routing responsibility Shared between and customer for L-2 Switching, customer for L-3 Routing for L-2 Switching, customer for L-3 Routing Troubleshooting Higher Low Low complexity Typical connection 64kbps - 1Gbps 1Mbps - 10Gbps 1Mbps - 10Gbps speeds Latency Generally higher than Layer-2 Low Low services Provisioning complexity High, close collaboration between Low Low and customer Complexity of adds, moves and changes Relatively high, Routing tables to be updated, close collaboration required Point-to-point service only Lower than IP VPN Bandwidth upgrades Complex, must reprovision through Routed network Rapid Rapid Cost 'per unit bandwidth' to the customer Generally higher than for pure Layer- 2 services, due to higher complexity Generally lower than IP VPN due to lower complexity Generally lower than IP VPN due to lower complexity Table 1. Comparisons between Ethernet and IP VPN WAN Services In real-word deployments, there is rarely a 'one size fits all' solution, and not surprisingly there are a growing number of 'hybrid' networks offered by s, promoting a combination of Ethernet WAN services and IP VPNs. One such example is that Ethernet WANs can be an excellent choice for high bandwidth connections between Corporate HQs and Data centres, with IP VPN 'domains' being Page 6 of 12

8 used to extend corporate backbone connectivity out to smaller branch office locations serviced by a variety of Access technologies. Network Management challenges for the It is not surprising, given the comparison table above, that the key aspects which have been identified by many market analysis companies over the few years, regarding the likely evolution of Ethernet WAN services, are the simplicity, familiarity, throughput scalability, latency and, above all low cost (measured both in terms of initial commissioning and 'through life TCO') of Ethernet services. Current indicators are that whilst both IP VPN and Ethernet WAN service volumes are growing (to a combined total of over $80bn during 2016, according to Infonetics), the key factors above are set to drive the growth of Ethernet WAN services well above that of IP VPN throughout the decade to One challenge facing s in the delivery of both Ethernet Private Wire (or 'E-Line' as termed by the Metro Ethernet Forum) and VPLS (or 'E-LAN') services is already well known by those providers choosing to offer 'Wires-Only' Ethernet connections today for IP VPN services. Consider the model in Fig. 4 below; Value-Added NOC Services INTERNET provisions and manages Routers and IP addressing schema Core Network IP/ MPLS PSTN (via SIP G/W) Site A 's Managed CPE Routers Site B Ethernet connection Ethernet connection Fig. 4: IP VPN with Managed CPE Routers In this classic topology, the provider has full manageability not only of the core MPLS network, but also right up to the point of the 's LAN connections, i.e. via Managed ' Premise Equipment' (CPE) Routers. As we've said earlier, not every customer will wish to pay the premium for an edge Router device to be installed, configured and managed by the within their own premises. Moreover, many s look to third party Integrators and Resale partners to promote their core services, but such partners often wish to bring their own 'added value' to their customers, including providing management of their WAN environment, for which they may wish to install their own managed Routers at customer premises, in place of those of the shown in Fig. 4. Either way, the is faced with offering a so called 'wires only' service, for which they have no physical equipment at the actual point of connection to the ultimate customer's LAN. So, what's the problem with this? Well, the picture of Fig. 4 is somewhat simplified. In reality, most often the is not actually the same company which provides the physical copper or fibre over which the core WAN connects into the customer site. Even those large National Carriers such as BT, Page 7 of 12

9 which owns the majority of 'last mile' infrastructure in the UK, may be forced by the terms of Telecoms market deregulation, to separate control of that infrastructure via a largely independent company, in BT's case OpenReach. Consider now the more complete case shown in Fig. 5. NOC Value-Added Services must still take an active role in IP addressing schema INTERNET Core Network IP/ MPLS PSTN (via SIP G/W) Site A Infrastructure Carrier Ethernet Circuit (Typ. via wholesale) Problem! Lack of Management Visibility here for the SP (Ethernet connection) Infrastructure Carrier Ethernet Circuit (Typ. via wholesale) Site B 's Routers Fig. 5: 'Wires only' IP VPN showing 3 rd party 'Tail' circuits to customer premises In this case, we see that the customer site Router equipment is now owned by the customer themselves (or alternatively by an Integration partner of the, but either way not by the MPLS WAN network provider). Moreover, the connection from the core MPLS network to the customer site is now shown provided by 3 rd party 'tail circuits', typically supplied via wholesale arrangements. In fact, these tails may not simply comprise a straightforward 'last mile' connection, but may be quite complex, involving potentially more than one infrastructure provider, and extending from wherever the customer requires connection back to the location of the 's nearest point of MPLS network presence. In this increasingly common scenario, we see that the not only has no visibility at the point of connection to the customer's LAN, but that in the worst case there may potentially be a long and complex multi-hop, multi-organisation link from the customer's site back to the nearest point of management access for the. It's quite easy to understand how this can lead to a great deal of planning complexity for the at the time of initial commissioning, and a real challenge for any subsequent troubleshooting. It is very often the case that the has no visibility inside the 3 rd party infrastructure and must either be reliant on a strong SLA for each such link, or be prepared, at considerable cost, potentially to dispatch skilled staff with relatively complex test equipment in order to be able to check different elements of the network well outside of the MPLS core. So, if this can be the case for s using Ethernet as an access vehicle for IP VPN networks over MPLS, what happens in the case of 'pure' Layer-2 Ethernet WAN deployments? Essentially, the picture is little different, except that in this case the will definitely not be installing an Edge Router as a customer CPE, since Layer-3 Routing architecture is always the responsibility of the customer in the case of Ethernet WANs. Just as in Fig. 5, the lacks visibility at the point of customer connection, which may typically be either to a Router or in fact directly to an Ethernet LAN switch. Page 8 of 12

10 In both the case of wires only IP VPN and full Ethernet WAN deployments, one answer to the problems highlighted above is for the to deploy, for all such connections, a manageable 'Ethernet Demarcation Device' (EDD), sometimes alternatively known variously as a 'Network Interface Device' (NID) or 'Network Termination Unit' (NTU). Fig. 6, below, shows the example of an Ethernet WAN service terminated with basic EDDs at the customer premises. NOC Value-Added Services Management Access Ethernet Service Provider Core Network (MPLS with L-2 VPN or VPLS) Management Access Site A Infrastructure Carrier Ethernet Circuit 1 (Typ. via wholesale) Infrastructure Carrier Ethernet Circuit 2 (Typ. via wholesale) Site B Basic Ethernet Demarcation Devices provide End- Point Manageability, typically via dedicated Management 'Carrier VLAN' (Q-in-Q S-Tag), or via protected ' VLAN' (Reserved C-Tag) Fig. 6: Ethernet WAN service including Ethernet Demarcation Devices The role of Ethernet Demarcation Devices is, at minimum, to provide management visibility and information regarding the customer connection point. At the least, they should be able to indicate connection status and traffic levels looking both towards the core network and towards the customer's first connected device. For Ethernet WAN networks, such as that of Fig. 6, it is possible that seamless end-to-end Ethernet connectivity exists between customer end-point sites (shown as 'Site A' and 'Site B' above), which enables the possibility for more advanced diagnostic and monitoring services to be available from the EDD units in relation to the full end-to-end link. In the case of Ethernet used as an Access technology for an IP VPN network, it's likely instead that management visibility from the 's 'Network Operations Centre' (NOC) might be limited to individual 'core to customer-site' links. Nevertheless, in either case, such visibility and diagnostic tools offer considerable benefits in terms of network commissioning and troubleshooting, more than offsetting the comparatively low cost of EDDs. As shown in Fig. 6, in a Switched Ethernet WAN normally specific 'VLAN Tagging' is used to differentiate User traffic from the 's Management traffic, and the EDD should be sufficiently flexible to offer a number of different Tagging modes by which to identify and isolate both Management traffic and indeed potentially different classes of User traffic. Let us finally consider a more comprehensive picture of a typical Point-to-Point example of an Ethernet WAN service, as shown in Fig. 7. In this case, we have highlighted the fact that it may very well be the case (as for BT OpenReach 'EAD' Services in the UK, for example) that the tail circuit provider is able to offer the main information about the status of such individual links, including both connection status and even potentially validation to specific Service Level Agreements (SLAs) relating to Page 9 of 12

11 characteristics of the tail circuit. Nevertheless, since any given tail may comprise one or more links and the tail servicing ' Site A' may not be sourced from the same Infrastructure provider as that servicing ' Site B', this may be of little overall benefit to the end-to-end, particularly because it is unlikely that the tail circuit provider will make available direct Management access to their own devices, if indeed such devices are deployed. NOC Value-Added Services Management Access Ethernet Core Network Management Access Site A Infrastructure Carrier Ethernet Circuit 1 (Typ. via wholesale) Infrastructure Carrier Ethernet Circuit 2 (Typ. via wholesale) Site B Circuit 1 Carrier 1 SLA Carrier 2 SLA Circuit 2 's End-to-End SLA Infrastructure Carriers may offer a clear SLA for their short or long-haul circuits, but this does not provide full end-to-end SLA assurance. Advanced EDD equipment offers this functionality Fig. 7: End-to-end SLA verification and monitoring facilitated by Advanced EDDs By deploying their own advanced EDDs at each end of the link above, the can, irrespective of the number and variety of 3 rd party tail circuits, potentially verify both the connection status and Service characteristics of the complete end-to-end link. Management visibility vs Performance assurance Over the past few years, each of three Industry standards bodies, namely the Institute of Electrical and Electronic Engineers (IEEE), the International Telecommunications Union (ITU) and the Metro Ethernet Forum (MEF) have been active in developing and promoting both capabilities and standards in relation to Carrier (i.e. WAN) Ethernet Services. Most significantly, with respect to the challenges which we have discussed here, a number of 'Operations, Administration and Management' (OAM) protocols have been developed relating to Ethernet WAN deployments. Relatively simple visibility and connectivity checking of single segment Ethernet connections is supported by the 'Link OAM', or 'Ethernet First Mile' (EFM) protocol, formalised initially as IEEE 802.3ah, by which it is still generally best known, albeit that this functionality has now been fully incorporated into the core of the standard itself. An additional level of connectivity assurance is offered by those Demarcation Devices including the 'Connectivity Fault Management' (CFM) protocol, formalised under the standard IEEE 802.1ag. CFM offers the ability for a number of end-point devices to establish and monitor a 'community' of reachable Page 10 of 12

12 end-points and mid-points corresponding to a customer's network, which can offer some degree of proactivity to the with regard to connectivity fault detection. Above and beyond connectivity management though, customers are increasingly asking of their Service Providers that they provision multiple traffic streams across their Ethernet 'pipe' connections, to which potentially different criteria may apply for key network performance parameters, including acceptable frame loss ratio, 'latency' (i.e. traffic delay)and 'jitter' (delay variation), together with comprehensive traffic throughput 'policing'. In more advanced deployments, a may need to provision multiple services per physical Ethernet connection. They may then be faced with the challenge to demonstrate to their customer, at the time of provisioning, that specific performance parameters are complied with for each individual Service data stream within a given end-to-end Ethernet connection. Such parameters may be detailed within a tightly defined 'Service Level Agreement' (SLA), to which compliance should be verified. Furthermore, s may not only need to demonstrate SLA compliance at the time of commissioning, but they may be required to subsequently monitor 'in service' traffic and take pro-active steps with regard to any potential breach of SLA. Ethernet Demarcation Devices equipped with more advanced packet processing capabilities can offer a very effective tool to s in this regard. For example if a, from a Network Operations Centre, can interact with an EDD in such a manner as to configure this device to issue one or more test traffic streams across the network to a corresponding remote end-point, at which traffic may be 'looped' and returned, this can be highly beneficial. Such test stream(s) can enable accurate reporting of throughput, packet loss, latency and jitter, for the end-to-end network link. Demarcation Devices with such capabilities are now available. Necessarily, such devices contain more than simple switch and management processing functionality. Dedicated packet processing hardware is required in order to ensure accurate time-stamping, test collation and reporting in real-time for line rates up to 1Gbps and beyond. Another of the OAM protocols, this time the ITU-T's Y.1731 suite, relates to the ability to provide inservice testing and reporting of SLA compliance, which is very much to the fore in the MEF's definitions for Carrier Ethernet service and to which is often referred as 'Performance Assured Ethernet' (PAE). All of these capabilities, incorporated within the most recent generation of Advanced Ethernet Demarcation Devices, combine to make these an extremely useful addition to the 's portfolio of devices to ensure that their customers experience strength and depth in support. Metrodata Ltd Ethernet Demarcation Devices Metrodata Ltd. is a long-standing UK developer and manufacturer of Interface Conversion and Network Access solutions. The company has been a supplier to Governments, Corporations and Telecoms s worldwide since Within the company's MetroCONNECT range of Ethernet Service Delivery solutions, Metrodata offers both Basic and Advanced Demarcation Devices for use with both wires-only IP VPN and Layer-2 Ethernet WAN solutions. The FCM9002 product supports Copper (RJ45) or Fibre (SFP) Network Connection up to 1Gbps with RJ45 connectivity to equipment. Management visibility is offered to site connections and the product supports the OAM protocols of IEEE 802.3ah (EFM) and IEEE 802.1ag (CFM). One of the most common frustrations experienced by s is that of network faults being reported from customers which eventually are found to be due to simple power-downs of interface equipment. The FCM9002 provides indication of local power-down to the via both SNMP Trap and OAM protocol alerting when power is withdrawn from the device (or alternatively should the PSU of the EDD itself fail). Page 11 of 12

13 The advanced FCM9004 Demarcation Device additionally supports a range of functions above and beyond simple end-point visibility, at a very cost-effective price point, making this a natural choice for s for CPE installation for services in the range of 100Mbps to 1Gbps. Fig. 8: MetroCONNECT FCM9004 Ethernet Demarcation Device (AC and -48V DC PSU variants) In addition to the features of the FCM9002, the FCM9004 offers: Service Multiplexing with advanced C-Tag, Q-in-Q S-Tag and Multi-Tag VLAN handling Per-flow Traffic Policing and Colour Marking for multiple services up to 1Gbps ITU-T Y.1731 for in-service performance monitoring and alerting Dedicated hardware Service Assurance Module, 'MetroSAM', providing 'Performance Assurance' capabilities for Core-Edge and End-End network applications, including: Embedded wirespeed test traffic generator with packet time-stamping Layer 2/3 SA/DA Loopback for assurance measurement over extended networks Throughput, Frame Loss Ratio, Frame Latency and Jitter analysis Off-line configuration toolset to enable remote profiling of customer connection requirements prior to installation Zero Touch Commissioning (ZTC) toolset, enabling simple installation with automatic detection and download of pre-prepared configuration Full information regarding the MetroCONNECT family of Ethernet Demarcation Devices, may be found here: Metrodata Ltd. Fortune House, Eversley Way EGHAM, Surrey TW20 8RY U.K. +44 (0) Page 12 of 12

Carrier Ethernet Services

Carrier Ethernet Services White Paper Ethernet Demarcation Devices for managing End-to-End Ethernet Service Delivery July, 2012 Metrodata Ltd Fortune House, TW20 8RY U.K. Tel: +44 (0)1784 744700 www.metrodata.co.uk E-mail: sales@metrodata.co.uk

More information

Simwood Carrier Ethernet

Simwood Carrier Ethernet Simwood Carrier Ethernet Simwood Carrier Ethernet is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use a number of technologies on top of our own

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980

More information

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider

More information

NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance

NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance NetTESTER Embedded 'Always-On' Testing & In-Service Performance Assurance Ethernet WAN Service: Typical Scenario HQ & Operations Centre (NOC) Management Access Management Access Site A Ethernet (Layer-2)

More information

REMOTE MONITORING MATRIX

REMOTE MONITORING MATRIX 802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

MPLS in the Enterprise

MPLS in the Enterprise NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Carrier Ethernet: New Game Plan for Media Converters

Carrier Ethernet: New Game Plan for Media Converters Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet

More information

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more

More information

CARRIER MPLS VPN September 2014

CARRIER MPLS VPN September 2014 CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their

More information

Extraordinary UK Ethernet

Extraordinary UK Ethernet Extraordinary UK Ethernet Ethernet Guide. The world of 21CN Ethernet connectivity can be a daunting place. As one of the leading forces in Ethernet Aggregation in the UK, we've seen our fair share of poor

More information

EVALUATING NETWORKING TECHNOLOGIES

EVALUATING NETWORKING TECHNOLOGIES WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION

More information

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000 Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage

More information

Innovation in Access and Metropolitan Area Networks -

Innovation in Access and Metropolitan Area Networks - Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Choosing Ethernet Services

Choosing Ethernet Services Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,

More information

The Evolution of Ethernet

The Evolution of Ethernet June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction

More information

The Role of Carrier Ethernet in Business Applications

The Role of Carrier Ethernet in Business Applications The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,

More information

Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+.

Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+. Carrier Ethernet vs. (Standard) Ethernet The Ethernet Evolution. The Basics What is Ethernet? Ethernet (technical term is IEEE 802.3) has set the standard in how service providers connect customers to

More information

Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN

Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN Carrier Grade Ethernet Ethernet in service provider networks, MAN/WAN Carrier grade The term Carrier Ethernet implies that Ethernet services are carrier grade. Carrier grade is a system that is extremely

More information

MPLS provides multi-site solution

MPLS provides multi-site solution MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Evolving Your Network with Metro Ethernet and MPLS VPNs

Evolving Your Network with Metro Ethernet and MPLS VPNs Evolving Your Network with Metro Ethernet and MPLS VPNs Change is a constant in enterprise networking and the axiom definitely holds true when considering wide-area connectivity options. Experienced IT

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN

More information

Application Notes Multi-service EDD-Ethernet Demarcation Device

Application Notes Multi-service EDD-Ethernet Demarcation Device Application Notes EDD-Ethernet Demarcation Device IERU Communications Ltd EDD Page 1 of 8 2000 EDD Introduction: As the benefits of Ethernet networking in the metro and wide-area have become clear, service

More information

White Paper: Carrier Ethernet

White Paper: Carrier Ethernet White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

EPIPE Connectivity Services

EPIPE Connectivity Services EPIPE Connectivity Services VTCW018 - I 08/13 EPIPE Connectivity Services 2 In an always on hyperconnected world choosing the right networking technology is now more important than ever. Around the world

More information

Central Office Testing of Network Services

Central Office Testing of Network Services Central Office Testing of Network Services Rev 4 Application Note Ethernet is rapidly becoming the predominant method for deploying new commercial services and for expanding backhaul capacity. Carriers

More information

Evaluating Carrier-Class Ethernet Services

Evaluating Carrier-Class Ethernet Services Technical Paper Evaluating Carrier-Class Ethernet Services Demand for Ethernet-based services is on the rise, and the key driving force behind this is continuous growth of data traffic in the metro/access

More information

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G

More information

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Fundamentals of MPLS for Broadcast Applications

Fundamentals of MPLS for Broadcast Applications Fundamentals of MPLS for Broadcast Applications Ron Clifton, P. Eng., BAS c, MAS c CliftonGroup International Limited Page: 1 The Paradigm Shift The connectivity and technology exist today to implement

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device

Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device THE NEED Communications Service providers (CSPs) have been transitioning from legacy SONET/SDH to IP and

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

Ethernet Business Services

Ethernet Business Services Ethernet Business Services Introduction Why market Ethernet Business solutions? This represents large revenue streams for Service Providers Commercial services market experiencing huge growth Most Service

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

AT&T Switched Ethernet Service SM

AT&T Switched Ethernet Service SM AT&T Switched Ethernet Service SM Next Generation of Switched Ethernet Overview Version Contents Introduction: AT&T Carrier Ethernet and Industry Recognition What s New vs. Legacy OPT-E-MAN Service or

More information

Understanding PBB-TE for Carrier Ethernet

Understanding PBB-TE for Carrier Ethernet Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.

More information

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai. Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

MPLS VPN basics. E-Guide

MPLS VPN basics. E-Guide E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

Standardized Carrier Ethernet Services for Optical Transport Networks

Standardized Carrier Ethernet Services for Optical Transport Networks Standardized Carrier Services for Optical Transport Networks Carsten Rossenhövel MEF EMEA Marketing Co-Chair Managing Director, European Advanced Networking Test Center (EANTC) 1 Developing, Marketing

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

APRICOT 2012 MPLS WORKSHOP L2VPN

APRICOT 2012 MPLS WORKSHOP L2VPN APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 alastair.johnson@alcatel-lucent.com 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Business Services Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Is Ethernet the Right Choice for Your Network? Business Ethernet including Ethernet

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Service Definition. Internet Service. Introduction. Product Overview. Service Specification Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s The fast path to increased bandwidth for carriers, service providers, and enterprises Printed in the USA.

More information

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation

More information

An Introduction to SIP

An Introduction to SIP SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to

More information

Metro Ethernet Services

Metro Ethernet Services CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Evolution of Symmetric DSL Technologies for Business Service Access Solutions.

Evolution of Symmetric DSL Technologies for Business Service Access Solutions. NexComm Systems White Paper Evolution of Symmetric DSL Technologies for Business Service Access Solutions. February 2006, NexComm Systems, Inc. Introductions The recent economics around the globe is known

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

Meeting the challenge of voice services

Meeting the challenge of voice services Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies

More information

Your Wide Area Network Just Got a Whole Lot Wider.

Your Wide Area Network Just Got a Whole Lot Wider. Your Wide Area Network Just Got a Whole Lot Wider. Rely on XO for networking solutions that will enhance your business today and tomorrow. Contact your local XO sales representative or visit us at www.xo.com

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information