Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

Size: px
Start display at page:

Download "Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services"

Transcription

1 Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology, Provider Backbone Bridging Traffic Engineering (PBB-TE), addresses several existing challenges of natively extending Ethernet services across a provider s network. Until now, other technologies such as SONET/SDH or Multi-Protocol Label Switching (MPLS) have been required to build large-scale networks. However, many carriers are actively seeking native Ethernet networks that reduce operational and capital costs while enabling them to deliver a wide range of existing and emerging applications and services efficiently. Due to its ubiquity and ease-of-use, Ethernet, in the form of PBB-TE, is positioned to capitalize on the sizeable opportunity of delivering and transporting Carrier Ethernet services. Carrier Ethernet Services The telecommunications industry has experienced the continued erosion of legacy technologies such as Frame Relay (FR) and Time Division Multiplexing (TDM), which are being supplanted by an exciting new type of Ethernet called Carrier Ethernet. Defined by the Metro Ethernet Forum (MEF) Carrier Ethernet includes five specific service provider-influenced attributes that distinguishes it from traditional enterprise-class Ethernet. They are: > Standardized services > Quality of Service (QoS) > Service management > Reliability > Scalability Quality of Service Service Management Transitioning from complex routed architectures and protocols, to an easier-to-use switch-based approach has advantages in delivering Carrier Ethernet services; however, there are some drawbacks, particularly in the area of scalability and reliability. PBB-TE has been developed to address these shortcomings. Standardized Services Carrier Ethernet Legacy Ethernet s Scalability Limitations Traditional Ethernet switch-based networks have two defining characteristics that limit their topological size: learning and loop avoidance. When a switch receives a packet of which it is unaware that is destined for an end station, the switch replicates the packet down every link on which the packet is connected (known as flooding). As the switch inspects each packet it receives, the switch remembers or learns the association of sending stations and ingress links. Each switch in the Layer 2 domain learns the address and associated link for every device in the network. While many metro and core devices may be able to support hundreds of thousands of addresses, requiring each device in a provider s network to handle this number of addresses is cost prohibitive and impacts protection switching schemes. When a link or device experiences a failure, the network must react to the changing topology. Often, as the number of addresses increases, the time to failover and to restore network connectivity increases. Reliability One alternative is to introduce routers, which segment the Layer 2 network into multiple sub-networks (subnets). While providing a level of hierarchy, routing also introduces several complex and difficult-to-operate protocols, such as border gateway protocol. Routing also requires more sophisticated Scalability configuration and operation, expensive hardware and ever-faster processors. In addition, routing does not provide the same level of service transparency as switch-based Ethernet service transport. For these reasons, the industry has devoted resources to enhancing several aspects of switch-based Ethernet networks. As mentioned earlier, Layer 2 networks routinely flood traffic to unknown destinations. Many mesh, hub-and-spoke, and ring topologies contain physical loops in the form of redundant and sometimes inadvertent connections between devices. These loops must be logically prevented to allow flooded traffic to propagate through the network properly. If loops were allowed to remain, the flooded traffic would replicate and multiply, wreaking havoc on the network. For these reasons, Spanning Tree Protocol (STP) and later W A S D P Whitepaper

2 ridge Figure 1. network enhancements such as Multiple STP (MSTP) and Rapid STP (RSTP), were invented to detect and eliminate these loops. Figure 1 shows a provider network with a mesh interconnecting several Ethernet switch-based devices known as Provider Bridges (PBs), which are under the control of the provider. These devices support one or more Ethernet service transport technologies, such as the standard IEEE 802.1ad PB. As shown in Figure 1, the physical topology, while providing some redundancy, contains several loops. Figure 2 shows the same provider network with IEEE 802.1w RSTP detecting the loops and logically blocking a few of the links. Now, no loops exist in the network. Switch-based flooding and learning occur normally. The blocked links remain on standby in the event an active link or device experiences a fault. Figure 3 depicts the path a Carrier Ethernet service may take across the provider network. RSTP blocked links are avoided and all of the customer locations are interconnected. While moderately scaled provider networks are possible using RSTP and MSTP, some carriers remain skeptical about the performance during failover situations. Larger networks have significantly more links and Media Access Control (MAC) addresses to manage, straining the capability of RSTP and MSTP. Carriers want to minimize, and avoid if possible, sources of service disruption. PBB-TE represents one approach for addressing these concerns. ridge Figure 2. Loop prevention using RSTP/MSTP 2

3 ridge Figure 3. Carrier Ethernet service delivery using IEEE 802.1ad PBs Customer Service Delivery And Transparency One motivation for deploying Layer 2 Virtual Private Networks (L2 VPNs) has been customer demand for interconnecting multiple sites. Customers want inexpensive, high-performance, transparent Local Area Network (LAN) services. In addition, most do not want the additional complexity of switch or router configurations. Customers also resist exchanging route tables with carriers due to security concerns and operational complexity. Increasingly, customers want to use Ethernet to interconnect locations natively. Point-to-Point EVC Figure 4. MEF E-Line service Source: MEF Connecting two sites creates an Ethernet-Line (E-Line) service utilizing a point-to-point Ethernet Virtual Connection (EVC) as shown in Figure 4. Customers with more than two locations want multi-site interconnectivity and would choose an E-LAN service, which supports multipoint-to-multipoint Ethernet Virtual Cicuits (EVCs) as depicted in Figure 5. Multipoint-to-Multipoint EVC Figure 5. MEF E-LAN service Completed in December 2005, IEEE 802.1ad PB is the first Ethernet bridging project expressly created for service provider networks. PB standardizes the use of multiple Virtual Local Area Network (VLAN) tags in the same frame. The format of the 802.1ad PB frame is shown in Figure 6. Highlighted fields are added per IEEE 802.1ad Provider Bridging to delineate services ad Customer-DA C-DA Customer-SA C-SA S-Tag EType 88-a8 S-VID, PCP, DE S-Tag C-Tag EType C-VID, PCP, CFI C-Tag Data FCS Figure 6. PB frame Source: MEF < Service Identifier The existing fields of the customer frame are preserved. This allows a customer s full 4K VLAN range to be transported seamlessly across a PB network to each of its other locations. As depicted in Figure 7, interconnects three locations using an E-LAN service. connects two sites with an E-Line service. Both techniques provide secure, transparent L2 VPNs across the PB network. 3

4 ridge Figure 7. L2 VPN service delivery using a PB network Each L2 VPN enables complete customer separation. Both customers have freedom to use internal Customer VLANs (C- VLANs) as they choose. The provider configures up to four thousand Service VLANs (S-VLANs) capable of supporting up to four thousand separate customers. Often, the 4K maximum is not the limiting factor for the provider. Rather, the aggregate number of MAC addresses and/or the physical topology demands placed upon the RSTP and MSTP protocols force the provider to segment or use alternative transport facilities, such as PBB-TE. Network Quality of Service While topology and address scaling are critical issues, an important development in IEEE 802.1ad PB is the inclusion of drop eligibility and packet marking capabilities. Rather than a fixed interpretation of the 3-bit priority field used by the legacy IEEE 802.1Q VLAN standard, PB allows a variety of Priority Code Point (PCP) encodings. As shown in Figures 8 and 9, four distinct priority/drop eligible interpretations are possible. For instance, 6P2D provides six classes of service with two of the classes supporting discard eligible (yellow) marking. Figure 8 shows the usage of the PCP and drop eligibility fields. This Layer 2 coloring allows for efficient mechanisms to handle congestion without requiring inspection of Layer 3 header information. Figure 9 provides an analysis of the benefits and limitations of PB, which can be used to compare with PBB-TE. Benefits > Transparency of full 4K C-VID range > Ability to determine layertwo drop eligibility > Service PCP assigned by provider or determined by C-Tag > Native support of E-LAN Services > Separation of customer and provider control domains > All customer layer two control protocols are transported through provider network Limitations > 4K services > Topology constrained by number of aggregate connected devices > PB devices learn all provider and customer MAC addresses > Customer MAC addresses exposed on provider network > Service ID derived from ingress port and C-VID > Sub-optimal provider network capacity due to RSTP/MSTP loop prevention Figure 9. PB benefits and limitations IEEE 802.1ad Priority Code Point, Drop Eligibility Usage 7 7DE 6 6DE 5 5DE 4 4DE 3 3DE 2 2DE 1 1DE 0 0DE PCP, DE 8P8D P0D PCP 7P1D P2D P3D Figure 8. IEEE 802.1ad PCP and drop eligibility usage With the popularity, ease-of-use, and enhanced QoS features ensuring service predictability, more and more operators are moving to Carrier Ethernet. Despite some limitations, adoption is growing at a swift pace. Concerns about the inherent scalability issues are being alleviated by the promising MAC header encapsulation techniques. 4

5 Customer D Customer D Provider Backbone Bridge Figure 10. PBB network ridge Carrier Ethernet Transport Scalability and Resiliency Within the last few years, it has become evident that Ethernet will ultimately succeed in access and metro deployments. Early in the debate over its success, MPLS was considered the most viable option for interconnecting PB networks. Then PBB surfaced. Unlike MPLS, PBB uses MAC header encapsulation to alleviate MAC address and service scalability concerns. Figure 10 shows a typical PBB network. The format of the 802.1ah PB frame is shown in Figure 11. Highlighted fields are added per IEEE 802.1ah Provider Backbone Bridging to delineate PB flood domains and interconnects ah Backbone-DA B-DA Backbone-SA B-SA Backbone-Tag B-Tag Instance-Tag I-Tag Customer-DA C-DA Customer-SA C-SA S-Tag EType 88-a8 S-VID, PCP, DE S-Tag C-Tag EType C-VID, PCP, CFI C-Tag Data FCS Figure 11. PBB frame The original PB frame is preserved intact. Each of the fields, beginning with the Customer Destination Address (C-DA) and Customer Source Address (C-SA), is transported across the PBB network without modification. More importantly, these customer addresses are not learned by core devices, reducing the cost and complexity of PBB equipment. < Flood Domain/ PB Interconnect Identifier Figure 12 provides an analysis of the benefits and limitations of PBB. Benefits > 16M services > Transparency of multiple 4K S-VID ranges > Customer MAC addresses tunneled on the provider network, enhancing security and scalability > Separation of customer, provider, and backbone control domains > Customer and PB layer two control protocols are transported through PBB network Limitations > Provider Backbone Edge Bridge (PBEB) devices learn all PBB devices and transiting Customer MACs > PBB diameter limited by RSTP/MSTP constraint > Lower PBB network capacity due to RSTP/MSTP loop prevention Figure 12. PBB benefits and limitations 5

6 Customer D Customer D Provider Backbone Bridge ridge Figure 13. PB transport network Provider Backbone Bridging Traffic Engineering PBB-TE has emerged to address limitations related to scalability and reliability. PBB-TE may be deployed in place of PBB or may run in parallel with PBB. In both cases, PBB-TE eliminates the need for backbone core devices to perform learning and flooding. Instead, point-to-point tunnels to transport L2 VPNs are provisioned using a sophisticated management platform. Rather than using RSTP/MSTP to prevent loops, the management platform traffic engineers the PB network to utilize significantly more capacity. Figure 13 shows the greater utilization of the backbone network with PBB-TE enabled. Primary and backup paths or tunnels are provisioned. Highlighted fields are added per Provider Backbone Bridging Traffic Engineering to identify tunnels and delineate PB flood domains and interconnects. PBB-TE Backbone-DA B-DA Backbone-SA B-SA Backbone-Tag B-Tag Instance-Tag I-Tag Customer-DA C-DA Customer-SA C-SA S-Tag EType 88-a8 S-VID, PCP, DE S-Tag C-Tag EType C-VID, PCP, CFI C-Tag Data FCS Figure 14. PB transport frame < Tunnel Identifier < Tunnel Identifier IEEE has initiated a project to standardize this innovative and increasingly popular transport technology. An international standard will promote multi-vendor support and interoperability. IEEE 802.1Qay will leverage the existing IEEE 802.1ah PBB frame format, without modification, as shown in Figure 14. Figure 15 shows two PB networks interconnected with a PBB- TE network. Two customer L2 VPNs are shown traversing primary and backup PBB-TE tunnels through the core network. (red) traffic originates at. The PB encapsulates the customer traffic by adding an S-Tag containing the configured S-VID value of 100 reserved for within its domain. The traffic is sent to PB Edge Bridge A (PBEB-A). PBEB-A has been configured to assign traffic (S- VID=100) to a 24-bit Instance Service Identifier (I-SID) value of The same I-SID value is associated with primary and backup PBB-TE tunnels. Each primary tunnel and backup tunnel is identified using the combination of a PBEB Destination MAC address and a Backbone-VID (B-VID). This represents a significant difference between PBB-TE and PBB. Recall that with PBB, B-VIDs represent flood domains that interconnect multiple PB networks. With PBB-TE, B-VIDs along with B-DAs define the tunnel. 6

7 Primary Tunnel (PBEB-D, B-VID 4001) (PBEB-A, B-VID 4001) PBCB-C = I-SID 10,000 = I-SID 20,000 PBEB-A PBEB-D = S-VID 100 = S-VID 200 = S-VID 110 = S-VID 220 PBCB-B Backup Tunnel (PBEB-D, B-VID 4002) (PBEB-A, B-VID 4002) Provider Backbone Edge Bridge (PBEB) Provider Backbone Core Bridge (PBCB) (PB) ridge (CB) Figure 15. Primary and backup PBB-TE tunnels In this case, the PBEB-A encapsulates S-VID 100 traffic by adding a B-DA value of PBEB-D, a B-SA value of PBEB-A, a B-VID value of 4001 (primary or purple tunnel), and the I-SID value of This MAC header encapsulated traffic is forwarded to PB Core Bridge- C (PBCB-C). PBCB-C has been configured to not learn or flood traffic on B-VID 4001, which has been reserved for PBB-TE use. The fact that PBB-TE does not learn or flood is an important point. Each PBCB device must be provisioned with forwarding database entries in order to properly forward traffic within tunnels. The PBCB-C forwarding table contains an entry for {PBEB-D, B- VID 4001} and the traffic is forwarded on the particular port in the direction of PBEB-D. Primary and backup PBB-TE tunnels are pre-configured by a management system. This enables the operator to engineer traffic according to path, bandwidth, and service requirements. Customers and services are associated with tunnels taking into account the aggregate Committed Information Rate (CIR) and Excess Information Rate (EIR) bandwidth requirements. Tunnels are monitored through the use of IEEE 802.1ag Connectivity Fault Management (CFM) Continuity Check Messages (CCM). CCM control frames are sent and received every few milliseconds across PBB-TE tunnels. If the primary tunnel should experience a fault, the tunnel endpoints automatically begin using the backup tunnel. The forwarding database entries are pre-configured along the backup path to minimize the failover and restoration times. PBEB-D receives the traffic and removes the MAC header encapsulation. Since the S-VID values are only locally significant per PB network, a provider has the flexibility to translate the S- VID value. In this case, PBEB-D has been configured to associate I-SID with S-VID 110. In Figure 15, traffic from the tunnel is de-encapsulated and the S-VID is re-mapped to the value of 110. The traffic is forwarded to the PB attached to. The S-Tag encapsulation is removed by the PB device and the original customer frame from is delivered to. 7

8 Figure 16 provides an analysis of the benefits and limitations of PBB-TE. Benefits > 16M services > Transparency of multiple 4K S-VID ranges > No learning or flooding in core network > Customer MAC addresses tunneled on provider network enhancing security and scalability > Maximum utilization of core network with engineered paths Limitations > PBEB devices learn all Backbone and transiting Customer MACs Summary Carrier Ethernet represents an exciting, rapidly growing market opportunity. The vast majority of domestic and international service providers and multiple system operators are either deploying or investigating Carrier Ethernet rollouts. As more and more customers and services are turned up, larger scale transport technologies are required. PBB-TE, in conjunction with IEEE 802.1ah PBB, has risen to meet the challenges and overcome the limitations of legacy techniques. PBB-TE and PBB offer large-scale, high-performance native Ethernet alternatives for efficient, transparent Layer 2 provider networks. Ciena offers competitive, innovative True Carrier Ethernet solutions to meet the present and future needs of these deployments. > Separation of Customer, Provider and Backbone Control Domains > Customer and PB layer two control protocols are transported through PBB network > 802.1ag CCMs monitor primary, backup tunnels > Sophisticated management system to provision core tunnels Figure 16. PBB-TE benefits and limitations Occasionally, services are impacted by soft failures. A soft failure usually consists of configuration or operator errors. For instance, a set of VIDs on a particular device or port may be disabled by an administrator. Upon initial inspection, some troubleshooting techniques may conclude the port is active and other traffic is passing normally. This result may lead the operator to look elsewhere for the problem. A proposed project within IEEE deals with these configuration errors. It is known as Data Dependent-CFM. These advancements will further enhance the ability of Carrier Ethernet transport technologies, such as PBB-TE, to provide lower-cost of operations and enhanced resiliency. Specialists in enabling new application-driven possibilities over high-performance networks Winterson Road Linthicum, MD (US) (outside US) (international) Ciena may from time to time make changes to the products or specifications contained herein without notice. All rights reserved. IEEE is a registered trademark of the IEEE Ciena Corporation. WP

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Understanding PBB-TE for Carrier Ethernet

Understanding PBB-TE for Carrier Ethernet Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.

More information

Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN

Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN Carrier Grade Ethernet Ethernet in service provider networks, MAN/WAN Carrier grade The term Carrier Ethernet implies that Ethernet services are carrier grade. Carrier grade is a system that is extremely

More information

Shortest Path Bridging IEEE 802.1aq Overview

Shortest Path Bridging IEEE 802.1aq Overview Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE

More information

How To Make A Network Cable Reliable And Secure

How To Make A Network Cable Reliable And Secure ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1

More information

ethernet alliance Provider Backbone Transport Overview Version 1.0 December 2007 Authors:

ethernet alliance Provider Backbone Transport Overview Version 1.0 December 2007 Authors: Provider Backbone Transport Overview Version 1.0 December 2007 Authors: David Allen, Nortel Paul Bottorff, Nortel Harpreet Chadha, Extreme Networks Peter Lunk, Extreme Networks David Martin, Nortel ethernet

More information

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff, Mark Holness, Norival Figueira, Michael Chen, Dinesh Mohan, Glenn Parsons Version 2.0 Page 1 A Provider

More information

Ethernet as a Carrier Grade Technology: Developments and Innovations

Ethernet as a Carrier Grade Technology: Developments and Innovations 1 Ethernet as a Carrier Grade Technology: Developments and Innovations Rafael Sánchez (rsfuente@it.uc3m.es) Universidad Carlos III de Madrid, Spain Lampros Raptis (Lampros.Raptis@hol.net), Kostas Vaxevanakis

More information

Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations

Ethernet Controller as Solution for Embedded Applications, New Developments and Innovations IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735, PP: 39-43 www.iosrjournals.org Ethernet Controller as Solution for Embedded Applications, New Developments

More information

Provider Backbone Transport

Provider Backbone Transport Provider Backbone Transport David Allan Paul Bottorff Dinesh Mohan Alan McGuire dallan@nortel.com pbottorf@nortel.com dmohan@nortel.com alan.mcguire@bt.com Agenda > Motivation > Problem statement > What

More information

How To Understand The Concept Of Redundancy In A Network (Uni, Enni)

How To Understand The Concept Of Redundancy In A Network (Uni, Enni) E-NNI Redundancy (Considerations and Musings) Stephen Haddock November 19, 2009 802.1 Plenary, Atlanta 1 Introduction This presentation is kind of a random walk considering aspects of providing redundancy

More information

White Paper: Carrier Ethernet

White Paper: Carrier Ethernet White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research

More information

Joint ITU-T/IEEE Workshop on Carrier-class Ethernet

Joint ITU-T/IEEE Workshop on Carrier-class Ethernet Joint ITU-T/IEEE Workshop on Carrier-class Ethernet Carrier Bridge Architecture Stephen Haddock Chief Technology Officer Extreme Networks 802.1 Bridging Architecture for Carrier Ethernet from D & Q bridges

More information

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

How To Use Connection-Oriented Ether (Coe) For Cloud Services

How To Use Connection-Oriented Ether (Coe) For Cloud Services Connection-Oriented Ethernet for Delivery of Private Cloud Services Ralph Santitoro Director of Carrier Ethernet Market Development Ralph.Santitoro@us.Fujitsu.com February 23, 2012 Contents What problem

More information

Carrier Ethernet: The native approach

Carrier Ethernet: The native approach Carrier Ethernet: The native approach Howard Green, Sylvain Monette, Jonathan Olsson, Panagiotis Saltsidis and Attila Takács This article reviews the developments and emerging standards of native Ethernet

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Multi-Provider Ethernet Service Delivery

Multi-Provider Ethernet Service Delivery Multi-Provider Ethernet Service Delivery Ananda Rajagopal Product Manager, Service Provider Solutions Foundry Networks Agenda Multi-Provider Ethernet Service Delivery Ethernet Service Delivery Today A

More information

PBBN in the Data Center IEEE 802.1 May 2009 Interim Meeting Pittsburgh, PA., USA

PBBN in the Data Center IEEE 802.1 May 2009 Interim Meeting Pittsburgh, PA., USA PBBN in the Data Center IEEE 802.1 May 2009 Interim Meeting Pittsburgh, PA., USA Bob Sultan Ben Mack-Crane www.huawei.com Growing number of MACs in Data Center Large numbers of servers with multiple Virtual

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks

Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Introduction The GIG and its component networks, including the DISN, form the state-of-the-art network foundation for DoD communications.

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE)

Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE) Carrier Ethernet A Wave is Building Provider Backbone Bridges with Traffic Engineering (PBB-TE) D. Kent Stevens Western Region Optical Architect kesteven@nortel.com 714-803-1050 Next Generation Packet

More information

Software Defined Networking Supported by IEEE 802.1Q

Software Defined Networking Supported by IEEE 802.1Q Software Defined Networking Supported by IEEE 802.1Q János Farkas, Stephen Haddock, Panagiotis Saltsidis janos.farkas@ericsson.com, shaddock@stanfordalumni.org, panagiotis.saltsidis@ericsson.com Abstract

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

Provider Link State Bridging (PLSB)

Provider Link State Bridging (PLSB) Provider Link State Bridging (PLSB) By Don Fedyk and Paul Bottorff, Nortel Networks January 2007 Introduction With the evolution of the provider data plane in Provider Backbone Bridges (PBB) (802.1ah)

More information

> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET

> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET > ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET White Paper Provider Backbone Transport Market overview For many years, Ethernet has been the dominant networking protocol in the LAN. Its simplicity

More information

Metro Ethernet Services

Metro Ethernet Services CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet

More information

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Service Definition. Internet Service. Introduction. Product Overview. Service Specification Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

Connection-Oriented Ethernet: Operational and Deployment Considerations

Connection-Oriented Ethernet: Operational and Deployment Considerations Connection-Oriented Ethernet: Operational and Deployment Considerations Connection-oriented Ethernet technology holds great promise. It creates, for the first time, a single metro aggregation and transport

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Evaluating Carrier-Class Ethernet Services

Evaluating Carrier-Class Ethernet Services Technical Paper Evaluating Carrier-Class Ethernet Services Demand for Ethernet-based services is on the rise, and the key driving force behind this is continuous growth of data traffic in the metro/access

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Bandwidth Profiles for Ethernet Services Ralph Santitoro

Bandwidth Profiles for Ethernet Services Ralph Santitoro Ralph Santitoro Abstract This paper provides a comprehensive technical overview of bandwidth profiles for Ethernet services, based on the work of the Metro Ethernet Forum (MEF) Technical Committee. The

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

Bandwidth Profiles for Ethernet Services Ralph Santitoro

Bandwidth Profiles for Ethernet Services Ralph Santitoro Ralph Santitoro Abstract This paper provides a comprehensive technical overview of bandwidth profiles for Ethernet services, based on the work (as of October 2003) of the Metro Ethernet Forum (MEF) Technical

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their

More information

Technical Specification MEF 6.1. Ethernet Services Definitions - Phase 2. April, 2008

Technical Specification MEF 6.1. Ethernet Services Definitions - Phase 2. April, 2008 Technical Specification Ethernet Services Definitions - Phase 2 April, 2008 contain the following statement: "Reproduced with permission of the Metro Ethernet Forum." No user of this document is authorized

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

WHITE PAPER. Network Virtualization: A Data Plane Perspective

WHITE PAPER. Network Virtualization: A Data Plane Perspective WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Carrier Class Transport Network Technologies: Summary of Initial Research

Carrier Class Transport Network Technologies: Summary of Initial Research Carrier Class Transport Network Technologies: Summary of Initial Research This document is a summary of the JRA1 Task 1 Carrier Class Transport Network Technologies deliverable [DJ1.1.1], which presents

More information

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and

More information

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

Innovation in Access and Metropolitan Area Networks -

Innovation in Access and Metropolitan Area Networks - Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and

More information

Cox Business. L2 / L3 and Network Topology Overview. February 1, 2011

Cox Business. L2 / L3 and Network Topology Overview. February 1, 2011 Cox Business L2 / L3 and Network Topology Overview February 1, 2011 Layer 3 / Layer 2 Comparo Protocol Architecture Control Change: Adding sites Change: IP changes Faults: Management Faults: Calls Layer

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

Scalability Analysis of Metro Ethernet

Scalability Analysis of Metro Ethernet Scalability Analysis of Metro Ethernet Heikki Mahkonen Helsinki University of Technology Email: heikki.mahkonen@piuha.net Abstract This document gives a scalability analysis of Metro Ethernet architecture.

More information

White Paper. Carrier Ethernet

White Paper. Carrier Ethernet White Paper Carrier Ethernet 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com Rev. A, September 2007 2 Table of Contents Introduction... 4 Benefits of Carrier

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

MEF Carrier Ethernet Certified Professional Training Program

MEF Carrier Ethernet Certified Professional Training Program shaping tomorrow with you MEF Carrier Ethernet Certified A complete educational, study and preparation program for MEF Carrier Ethernet Certified Professional Certification (MEF-CECP) 1 Comprehensive Training

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

John Ragan Director of Product Management. Billy Wise Communications Specialist

John Ragan Director of Product Management. Billy Wise Communications Specialist John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode

More information

DELIVERING TRUE CARRIER ETHERNET BUSINESS SERVICES

DELIVERING TRUE CARRIER ETHERNET BUSINESS SERVICES DELIVERING TRUE CARRIER ETHERNET BUSINESS SERVICES Rapid increases in the breadth and sophistication of business applications are impacting enterprises networking requirements and driving the adoption

More information

Resilient Metropolitan Area Networks

Resilient Metropolitan Area Networks Resilient Metropolitan Area Networks t. 902.442.1540 f. 902.442.1559 w. www.internetworking-atlantic.com 1 Resilient Metropolitan Area Networks Technologies for wide area network (WAN) and metropolitan

More information

Maximizing Revenue Opportunities with Converged IP Services over Ethernet Transport

Maximizing Revenue Opportunities with Converged IP Services over Ethernet Transport Extreme Networks Carrier Ethernet Transport Solution Overview Maximizing Revenue Opportunities with Converged IP Services over Ethernet Transport Carriers all over the world are facing explosive demand

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

LE-311v Service. Features & Benefits

LE-311v Service. Features & Benefits LE-311v Service Delivery Switch Features & Benefits > Uses a common service-aware operating system for efficiency > Enables high-velocity Ethernet service rollout, reducing time-to-service revenue > Provides

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

QoS in Ethernet Access Ring

QoS in Ethernet Access Ring QoS in Ethernet Access Ring G. Sathish Kumar,Timothy.A.Gonsalves TeNet Group, Department of Computer Science and Engineering Indian Institute of Technology Madras, India Email:{gsatish,tag}@lantana.tenet.res.in

More information

Guidebook to MEF Certification

Guidebook to MEF Certification WHITE PAPER Guidebook to MEF Certification www.ixiacom.com Rev A September 2012, 915-6015-01 2 Table of Contents Introduction... 4 Benefits of Certification... 7 Overview... 7 Equipment Vendor... 7 Service

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

The Metro Ethernet Network

The Metro Ethernet Network The Metro Ethernet Network Comparison to Legacy SONET/SDH MANs for Metro Data Service Providers Revision 1.0 July 2003 Abstract This paper focuses on the results of a study commissioned by the MEF to quantify

More information

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

CARRIER ETHERNET. Black Book. Edition 10. Carrier Ethernet. PN 915-2624-01 Rev F October 2013 i

CARRIER ETHERNET. Black Book. Edition 10. Carrier Ethernet. PN 915-2624-01 Rev F October 2013 i CARRIER ETHERNET Black Book Edition 10 Carrier Ethernet PN 915-2624-01 Rev F October 2013 i CARRIER ETHERNET Your feedback is welcome Our goal in the preparation of this Black Book was to create high-value,

More information