Network Virtualization and Data Center Networks DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013

Size: px
Start display at page:

Download "Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013"

Transcription

1 Network Virtualization and Data Center Networks DC Virtualization Basics Part 3 Qin Yin Fall Semester

2 Outline A Brief History of Distributed Data Centers The Case for Layer 2 Extension Layer 2 Extension Over optical Connections Virtual PortChannels Fabric Path Over MPLS Ethernet over MPLS (EoMPLS) Virtual Private LAN Service (VPLS) Over IP MPLS over GRE Overlay Transport Virtualization (OTV) 2

3 Virtual PortChannel Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Virtual PortChannel Single Ethernet Switch Pooling Homogeneous Two physical switches Networking Data and control plane virtualization High throughput, faster fault recovery, less complexity 3

4 Distributed Data Centers Data center interconnect (DCI) Many physical sites, one logical data center Business goals Seamless workload mobility Business continuity Pool and maximize global resources Distributed applications Defining two metrics for each application environment Recovery Point Objective: The maximum tolerable amount of time in which data can be lost from an IT service Recovery Time Objective: The maximum tolerable amount of time after which an IT service must be operational 4

5 From a networking perspective Connected through Layer 3 routing Decreases fate sharing in distributed data center Isolates each site from remote network instabilities Extending Layer 2 domains More details later 5

6 The Cold Age (Mid-1970s to 1980s) Computer rooms housing mainframe systems Applications based on batch processing RPO and RTO could span days or even weeks Recovery technologies: data backup and retrieval Data: stored on tapes Connectivity: physical transport of tapes to the backup site Cold-standby and warm-standby Data retrieved and delivered to the application Manual intervention to achieve recovery objectives 6

7 The Hot Age (1990s to Mid-2000s) Internet booms and the advent of electronic business The need of real-time response Recovery technologies focused on service availability RPO and RTO confined to hours, or even minutes Geographic clusters (geocluster) Application servers installed on at least two geo-separated sites Active node failure triggers automatic switchover to standby node Generally require data replication to the hot-standby site Synchronous replication (tens of kilometers apart to avoid latency issues) Asynchronous replication (data periodically copied from primary to secondary site) 7

8 Geocluster Different types of geocluster communication Heartbeat communication Application state information (such as cached data for database servers) Client traffic (especially nodes share the same virtual IP address) 8

9 The Active-Active Age (Mid-2000s -) In hot-standby site, hardware and software resources Used in case of major failure at the main site Activated for a small amount of time per year Some critical applications (RPO of 0, RTO of seconds) Active-active design to avoid resource waste No luxury of unused sites Deploy several active nodes dispersed over multiple data centers Server and storage virtualization to provide automatic and quick workload mobility between sites Challenges of scalability and flexibility One most discussed topic: Layer 2 extensions between remote sites 9

10 Requirements of Layer 2 Extension Heartbeat and connection state communications are usually directed to multiple destinations Broadcast, multicast, or unknown unicast Ethernet frames (flooding) Active and standby nodes usually share the same virtual IP and MAC address To facilitate traffic handling in the case of failure Server migration Application do not support IP readdressing Generates painstakingly complex operations Data center expansion A data center has reached a physical limitation A company hires a colocation service from an outsourcing data center As a result, standard Layer 2 connection are deployed to provide extended VLANs over multiple data centers. 10

11 Challenges of Layer 2 Extension Flooding and broadcast Loops over the Layer 2 extensions can be easily formed A spanning tree instance spanning multiple sites presents formidable challenges Scalability: recommended STP diameter is 7 Isolation: reconvergence will affect VLANs within one STP instance Multihoming: multiple DCI links will not be used for data comm 11

12 Challenges of Layer 2 Extension (cont.) Tromboning can be formed between data centers Non-optimal internal routing within extended VLANs Cause for DCI resource waste: uncontrolled state of an active-standby pair of devices Data confidentiality Mandates strict forms of encryption in data center interconnect to minimize the risk of data leakage Tromboning in action 12

13 Traditional Layer 2 VPNs Dark Fiber VPLS EoMPLS 13

14 Ethernet Extensions over Optical Connections Optical connections Distance: less than a few hundred kilometers Dark fiber Fiber-optic pair to connect networking devices Wavelength-division multiplexing (WDM) to increase transport capacity Coarse WDM: multiplex eight optical carrier signals Dense WDM: aggregate a higher number (128, for example) Dark fiber and WDM Communication solutions belonging to Layer 1 (physical) Can transport any data-link protocol including Ethernet 14

15 Spanning Tree Protocol STP does not allow Ethernet traffic on all the links between DCI switches STP instance Is spread over both sites Sharing any internal topology change or reconvergence 15

16 STP and Link Utilization STP wastes inter-switch connection resources 16

17 Link Aggregation STP only detects one logical interface Traffic destined to this interface is load balanced among the active physical links that are part of the channel This virtual interface is denominated a PortChannel 17

18 Virtual PortChannel Eliminate STP blocked ports Uses all available uplink bandwidth Allow a single device to use a port channel across two upstream switches Dual-homed server operate in active-active mode Provide fast convergence upon link/device failure 18

19 Virtual PortChannels on a Layer 2 Extension Virtual ProtChannels Transforms multiple Ethernet links into a single-switch STP connection Benefits Multihoming is enabled all links are being used (and load balanced) Spanning tree topology is simplified only one connection between sites If vpc peer switch feature is deployed, a device failure will not result in reconvergence 19

20 Virtual PortChannels in Multipoint Data Center Connections Problem vpcs can form a logical looped topology Solution: hub-and-spoke Deploy disjoint STP instances per site STP isolation is enabled on all DCI switches Avoid loops in the Layer 2 extension 20

21 Traditional Layer 2 VPNs Dark Fiber VPLS EoMPLS 21

22 MPLS Labels and Packets Provides packet forwarding based on labels Layer 2.5 technology Head fields Label value Experimental (Exp) To define QoS classes in MPLS networks Bottom of Stack (B) Time to live (TTL) 22

23 MPLS Basics Protocol flexibility Comes from the capability of stacking labels MPLS services Traffic engineering Configures and defines unidirectional tunnels using tunnel label Override routing protocol decision Layer 3 virtual private networks Connect different VPNS Inner label: VPN Any transport over MPLS (AToM) Transport of Layer 2 frames Inner label: virtual circuit Example: EoMPLS 23

24 MPLS Network Forwarding Equivalence Class (FEC) MPLS packets sharing the same label Two types of routers Label Edge Routers (LER) Label Switch Router (LSR) MPLS router elements A loopback interface To improve reachability A routing protocol To advertise connected subnets LDP - Label distribution Protocol To enable device discovery and label distribution MPLS interfaces between routers 24

25 EoMPLS Configuration In essence Within MPLS network Encapsulates Ethernet frames within MPLS packets At the egress of MPLS network Transported, de-capsulated and delivered as they were MPLS label stack Tunnel Label routing from ingress to egress LER VC Label identifying virtual circuit within tunnel Pseudowire Emulation of Ethernet cable 25

26 Pseudo Wire Reference Model A Pseudo Wire (PW) is a connection between two provider edge (PE) devices connecting two attachment circuits (ACs) Label Switched Path (LSP) MPLS tunnel Emulated Service Pseudo Wire Customer Site PSN Tunnel (LSP in MPLS) Customer Site Attachment Circuit MPLS (or IP) PW1 PW2 Customer Site PE1 PE2 Pseudo Wire PDUs Customer Site Packet Switched Network (PSN) IP or MPLS 26

27 VC Distribution Mechanism using LDP Unidirectional Tunnel LSP To transport PW PDU from PE to PE based on tunnel label(s) Both LSPs combined to form a single bi-directional Pseudo Wire Directed LDP session To exchange VC information, such as VC label and control information Directed LDP Session between PE1 and PE2 Tunnel Label(s) gets to PE router Customer Site Label Switch Path IP/MPLS Customer Site Customer Site PE1 LSP created using IGP+LDP or RSVP-TE PE2 VC Label identifies interface Customer Site 27

28 Ethernet PW Tunnel Encapsulation Tunnel Encaps Tunnel Label (LDP,RSVP,BGP) EXP 0 TTL PW Demux Control Word VC Label (VC) EXP 1 TTL (set to 2) Reserved Sequence Number Layer-2 PDU Tunnel Encapsulation One or more MPLS labels associated with the tunnel Defines the LSP from ingress to egress PE router 28

29 Ethernet PW Demultiplexer Tunnel Encaps Tunnel Label (LDP,RSVP,BGP) EXP 0 TTL PW Demux Control Word VC Label (VC) EXP 1 TTL (set to 2) Reserved Sequence Number Layer-2 PDU Obtained from Directed LDP session To identify individual circuits within a tunnel Used by receiving PE to determine Egress interface for L2PDU forwarding (Port based) Egress VLAN used on the facing interface (VLAN Based) EXP can be set to the values received in the L2 frame 29

30 PW Operation and Encapsulation Label 72 for PW1 Directed LDP Session between PE1 and PE2 PW1 Lo0: IP/MPLS P LSP 72 P2 L2 PDU Customer Site PE1 Label Pop for Lo0: Label 38 for Lo0: Label 24 for Lo0: PE2 Customer Site LDP Session LDP Session LDP Session This process happens in both directions (Example shows process for PE2 -> PE1 traffic) 30

31 Virtual Private LAN Service End-to-end architecture allowing MPLS networks offer Layer 2 multipoint Ethernet Services Provides emulation of a single virtual Ethernet bridge network Virtual Bridges linked with MPLS Pseudo Wires VPLS is an Architecture PE PE Data Plane used is same as EoMPLS (point-to-point) 31

32 Virtual Private LAN Service It is Virtual Multiple instances share the same physical infrastructure It is Private Each instance is independent and isolated from one another It is LAN Service It emulates Layer 2 multipoint connectivity between subscribers 32

33 VPLS Components Attachment circuits: Port or VLAN mode router N-PE Mesh of LSP between N-PEs: Pseudo Wires within LSP N-PE Virtual Switch Interface (VSI) terminates PW and provides Ethernet bridge function router router router switch MPLS Core switch LDP between PEs used to exchange VC and tunnel labels for Pseudo Wires switch router Attachment : switch or router N-PE 33

34 Virtual Switch Interface Flooding / Forwarding MAC table instances per customer (port/vlan) for each PE Associate ports to MAC, flood unknowns to all other ports Address Learning / Aging LDP enhanced with additional MAC list TLV (label withdrawal) MAC timers refreshed with incoming frames Loop Prevention Create a full-mesh of Pseudo Wires (VCs in EoMPLS) Unidirectional LSP carries VCs between pair of N-PEs split horizon concepts to prevent loops 34

35 VPLS Flooding and Forwarding Unknown DA? Pseudo Wire in LSP Data SA DA? Flooding (Broadcast, Multicast, Unknown Unicast) Dynamic learning of MAC addresses on PHY and VCs Forwarding Physical Port Virtual Circuit 35

36 MAC Learning and Forwarding Send me frames using Label 102 MAC1 PE1 MAC Address MAC MAC 1 E0/0 Send me frames using Label 170 MAC2 PE2 Use VC Label 102 E0/0 Use VC E0/1 Label 170 Adj MAC Address Data MAC1 Directed LDP PE2 102 MAC1 MAC2 Data MAC2 MAC 2 E0/1 Broadcast, Multicast, and Unknown Unicast are learned via the received label associations Two LSPs associated with a VC (Tx & Rx) If inbound or outbound LSP is down Then the entire Pseudo Wire is considered down 170 PE2 Adj MAC

37 MAC Address Withdraw Directed LDP X MPLS Message speeds up convergence process Otherwise PE relies on MAC Address Aging Timer Upon failure, PE removes locally learned MAC addresses Send LDP Address Withdraw to remote PEs in VPLS (using the Directed LDP session) New MAC List TLV is used to withdraw addresses 37

38 VPLS Functional Components Customer MxUs SP PoPs Customer MxUs U-PE N-PE MPLS Core N-PE U-PE N-PE provides VPLS termination/l3 services U-PE provides customer UNI is the custome device 38

39 Directed Attachment (Flat) Characteristics Suitable for simple/small implementations Full mesh of directed LDP sessions required N*(N-1)/2 Pseudo Wires required Scalability issue a number of PE routers grows No hierarchical scalability VLAN and Port level support Potential signaling and packet replication overhead Large amount of multicast replication over same physical CPU overhead for replication 39

40 Direct Attachment VPLS (Flat Architecture) N-PE MPLS Core N-PE Ethernet (VLAN/Port Full Mesh PWs + LDP Ethernet (VLAN Port) Data MAC1 MAC q Customer Data MAC1 MAC2 Data MAC1 MAC2 VC PE Pseudo Wire SP Core 40

41 Hierarchical VPLS (H-VPLS) Best for larger scale deployment Reduction in packet replication and signaling overhead Consists of two levels in a Hub and Spoke topology Hub consists of full mesh VPLS Pseudo Wires in MPLS core Spokes consist of L2/L3 tunnels connecting to VPLS (Hub) PEs Q-in-Q (L2), MPLS (L3), L2TPv3 (L3) 41

42 Why H-VPLS? PE VPLS PE PE H-VPLS PE-rs MTU-s PE PE PE-rs PE-rs PE PE PE-rs PE-r PE Potential signaling overhead Full PW mesh from the Edge Packet replication done at the Edge Node Discovery and Provisioning extends end to end PE-rs PE-rs Minimizes signaling overhead Full PW mesh among Core devices Packet replication done the Core Partitions Node Discovery process 42

43 MPLS Edge H-VPLS U-PE PE-rs N-PE PE-rs MPLS Core N-PE PE-rs U-PE PE-rs MPLS Acces s MPLS Core MPLS Acces s q Access MPLS Pseudo Wire 3 Full Mesh PWs + LDP MPLS Pseudo Wire 802.1q Access 1 Data 2 Vlan Data MAC1 Vlan MAC2 MAC q Customer 3 MAC2 Data VC PE Vlan MPLS PW SP Edge MAC1 MAC2 Same VCID used in Edge and core (Labels may differ) VC P E Pseudo Wire SP Core 43

44 Layer 2 VPNs Dark Fiber VPLS EoMPLS 44

45 Flooding Behavior Traditional Layer 2 VPN technologies rely on flooding to propagate MAC reachability The flooding behavior causes failures to propagate to every site in the Layer 2 VPN Goal Providing layer 2 connectivity, yet restrict the reach of the unknown unicast flooding domain in order to contain failures and preserve the resiliency 45

46 Pseudo Wires Maintenance Before any learning can happen a full mesh of pseudo-wires/ tunnels must be in place For N sites, there will be N*(N-1)/2 pseudo-wires. Complex to add and remove sites Head-end replication for multicast and broadcast. Sub-optimal BW utilization Goal providing point-to-cloud provisioning and optimal bandwidth utilization in order to reduce cost 46

47 Multi-homing Requires additional protocols (BGP, ICC, EEM) STP often extended Malfunctions impact all sites Goal Natively providing automatic detection of multihoming without the need of extending the STP domains, together with a more efficient loadbalancing 47

48 OTV Changes the Game Circuits + Data Plane Flooding Full mesh of circuits MAC learning based on flooding Tunnels and Pseudo Wires Operationally challenging Loop prevention Multi-homing Packet + Control Protocol Learning Packet switched connectivity MAC learning by control protocol Dynamic encapsulation Operational simplification Automatic loop prevention and multi-homing 48

49 Overlay Transport Virtualization OTV delivers a virtual L2 transport over any L3 Infrastructure Overlay Independent of the Infrastructure technology and services, flexible over various inter-connect facilities Transport Transport services for Layer 2 and Layer 3 Ethernet and IP traffic Virtualization Provides virtual stateless multi-access connections. Can be further partitioned into VPNs, VRFs, VLANs 49

50 OTV Control Plane MAC Learning a. Server with MAC address X sends frames that are flooded or broadcasted within site b. OTV1 learns MAC X and populates its MAC address table. c. OTV1 advertises MAC X with an IS-IS update. d. OTV2 and OTV3 become aware that MAC X can be reached through OTV1 and populate their MAC address tables using the virtual Layer 2 interface called Overlay 50

51 OTV Frame Forwarding a. Server2 sends a unicast frame destined to MAC X that is flooded to OTV2. b. OTV2 checks its MAC address table and realizes that the MAC X entry points to an Overlay interface. c. Internally in OTV2, this Overlay interface provides a mapping to OTV1 s IP address. As a result, the unicast frame is encapsulated into an IP packet directed to OTV1. d. OTV1 receives the IP packet and decapsulates it, recovering the original Ethernet frame. e. OTV1 uses its local MAC address table to forward the frame to Server1. 51

52 OTV Encapsulation Outer IP header Outer OTV shim header VLAN Overlay number Layer 2 header 52

53 OTV elements Edge device: network equipment that is actually deploying OTV - Internal interface: connected to a Layer 2 network - To process Ethernet frames - Join interface: connected to the Layer 3 network - To send or receive OTV packets 53

54 OTV elements Overlay interface: - A virtual Layer 2 interface that represents an OTV Layer 2 extension to other edge devices - Used on their MAC address tables as the interface associated to remote MAC addresses - Always associated to a join interface 54

55 OTV elements Site VLAN: - A dedicated VLAN used for discovery and adjacency maintenance between edge devices on the same site - Should not be extended to other sites. 55

56 Spanning Tree and OTV OTV is site transparent: no changes to the STP topology Each site keeps its own STP domain An Edge Device will send and receive BPDUs ONLY on the OTV Internal Interfaces 56

57 OTV Loop Avoidance Blocking unknown unicast traffic between edge devices Authoritative edge device (AED) The only edge device on a site handling multicast and broadcast traffic for the OTV-extended VLAN 57

58 OTV and Multi-homing OTV built-in multi-homing Allows Layer 2 traffic to be load balanced through different IP WAN links OTV multi-homing options Automatic distribution of VLANs among the available AED candidates (a hashing function to deploy this distribution). For unicast egress traffic, OTV can be load balanced among all the equal-cost Layer 3 paths to remote edge devices. Multidestination egress and ingress traffic can only use the join interface. Layer 3 PortChannels (between AED and a single device or one deploying VSS). 58

59 References Jeff Apcar. An introduction to VPLS. Peter Lam, Patrick Warichet. Simplifying Data Center Interconnect with Overlay Transport Virtualization (OTV). 59

60 Ethernet over MPLS Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Ethernet over MPLS Ethernet connection Abstraction Structural Hardware and software dependent Networking Data plane virtualization Layer 2 extension, simplicity, transparency 60

61 Virtual Private LAN Summary Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Virtual Private LAN Ethernet bridge Abstraction Structural Hardware and software dependent Networking Data plane virtualization Layer 2 extension, multipoint connections, loop avoidance within MPLS network 61

62 Overlay Transport Virtualization Virtualization Characteristics Emulation Type Subtype Scalability Technology area Subarea Advantages Overlay Transport Virtualization Overlay Ethernet network Abstraction Structural Hardware and software dependent Networking Data and control planes virtualization Layer 2 extension, multipoint connections, transport independence, loop avoidance 62

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

Testing Edge Services: VPLS over MPLS

Testing Edge Services: VPLS over MPLS Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Interconnecting Data Centers Using VPLS

Interconnecting Data Centers Using VPLS Interconnecting Data Centers Using VPLS Nash Darukhanawalla, CCIE No. 10332 Patrice Bellagamba Cisco Press 800 East 96th Street Indianapolis, IN 46240 viii Interconnecting Data Centers Using VPLS Contents

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

VMDC 3.0 Design Overview

VMDC 3.0 Design Overview CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated

More information

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL SERVI PROVIDER Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL An overview of Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL) and Brocade solutions for deploying

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Innovation in Access and Metropolitan Area Networks -

Innovation in Access and Metropolitan Area Networks - Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and

More information

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans

Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Virtual Private LAN Service (VPLS) Conformance and Performance Testing Sample Test Plans Contents Overview...3 1. VPLS Traffic CoS Test...3 2. VPLS VSI Isolation Test...5 3. VPLS MAC Address Purge Test...7

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Virtual Leased Lines - Martini

Virtual Leased Lines - Martini Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls

More information

Migrating to MPLS Technology and Applications

Migrating to MPLS Technology and Applications Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals

More information

Multi-site Datacenter Network Infrastructures

Multi-site Datacenter Network Infrastructures Multi-site Datacenter Network Infrastructures Petr Grygárek rek 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity) Disaster recovery Easier handling of planned outages

More information

Fundamentals Multiprotocol Label Switching MPLS III

Fundamentals Multiprotocol Label Switching MPLS III Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES

ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 alastair.johnson@alcatel-lucent.com AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

APRICOT 2012 MPLS WORKSHOP L2VPN

APRICOT 2012 MPLS WORKSHOP L2VPN APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 alastair.johnson@alcatel-lucent.com 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B

Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments

More information

Agilent N2X Layer 2 MPLS VPN Emulation Software

Agilent N2X Layer 2 MPLS VPN Emulation Software Agilent N2X Layer 2 MPLS VPN Emulation Software E7884A Technical Data Sheet An easy-to-use solution specifically designed for measuring the scalability and performance of Layer 2 MPLS VPNs and pseudo wire

More information

The Essential Guide to Deploying MPLS for Enterprise Networks

The Essential Guide to Deploying MPLS for Enterprise Networks White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

IxNetwork TM MPLS-TP Emulation

IxNetwork TM MPLS-TP Emulation IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers

More information

Distributed Virtual Data Center for Enterprise and Service Provider Cloud

Distributed Virtual Data Center for Enterprise and Service Provider Cloud Distributed Virtual Data Center for Enterprise and Service Provider Cloud Author: Yves Louis November 2011 I would like to acknowledge Max Ardica, Patrice Bellagamba and Victor Moreno for their significant

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

WHITE PAPER. Network Virtualization: A Data Plane Perspective

WHITE PAPER. Network Virtualization: A Data Plane Perspective WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES

ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES Greg Hankins RIPE 68 RIPE 68 2014/05/12 AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

MPLS Applications. Karel Pouzar CCIE#20198, CCSI#31414 karel.pouzar@alefnula.com

MPLS Applications. Karel Pouzar CCIE#20198, CCSI#31414 karel.pouzar@alefnula.com MPLS Applications Karel Pouzar CCIE#20198, CCSI#31414 karel.pouzar@alefnula.com Agenda MPLS Introduction MPLS VPN Architecture MPLS L2 Services AToM, EoMPLS VPLS, H-VPLS Copyright Alef Nula, a.s. www.alef0.cz

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

Internetworking II: VPNs, MPLS, and Traffic Engineering

Internetworking II: VPNs, MPLS, and Traffic Engineering Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

TRILL Large Layer 2 Network Solution

TRILL Large Layer 2 Network Solution TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network

More information

Cisco FabricPath Technology and Design

Cisco FabricPath Technology and Design Cisco Technology and Design 2 Agenda Introduction to Concepts Technology vs Trill Designs Conclusion 3 Introduction to By Francois Tallet 5 Why Layer 2 in the Data Centre? Some Applications / Protocols

More information

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL Brochure More information from http://www.researchandmarkets.com/reports/2251494/ Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL Description:

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Metro Ethernet Services

Metro Ethernet Services CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet

More information

Technology Comparison: Cisco Overlay Transport Virtualization and Virtual Private LAN Service as Enablers of LAN Extensions

Technology Comparison: Cisco Overlay Transport Virtualization and Virtual Private LAN Service as Enablers of LAN Extensions Technology Comparison: Cisco Overlay Transport Virtualization and Virtual Private LAN Service as Enablers of LAN Extensions What You Will Learn Geographically dispersed data centers provide added application

More information

DREAMER and GN4-JRA2 on GTS

DREAMER and GN4-JRA2 on GTS GTS Tech+Futures Workshop (Copenhagen) GTS Tech+Futures Workshop (Copenhagen) DREAMER and GN4-JRA2 on GTS CNIT Research Unit of Rome University of Rome Tor Vergata Outline DREAMER (Distributed REsilient

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as

More information

Implementing Virtual Leased Lines Using MPLS

Implementing Virtual Leased Lines Using MPLS Lines Using MPLS able of Contents 1. Objective... 3 2. arget Audience... 3 3. Pre-Requisites... 3 4. Introduction: MPLS and IP-Based VPNs... 3 5. he Promise of MPLS Layer-2 VPNs... 5 6. unneling Layer-2

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

White Paper: Carrier Ethernet

White Paper: Carrier Ethernet White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

VXLAN Bridging & Routing

VXLAN Bridging & Routing VXLAN Bridging & Routing Darrin Machay darrin@arista.com CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Preserve IP Addresses During Data Center Migration

Preserve IP Addresses During Data Center Migration White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information