Metro Ethernet Networks (MEN)
|
|
|
- Scot Wiggins
- 9 years ago
- Views:
Transcription
1 185 Metro Ethernet Networks (MEN) Luis Velasco, Jordi Perelló, Gabriel Junyent Optical Communication Group - Universitat Politècnica de Cataluya (UPC) [email protected], [email protected], [email protected] Ethernet is the predominant technology in Local Area Networks (LAN) and it is also becoming a technology of reference in the access networks, specifically in Wide Area (WAN) and Metropolitan Area Networks (MAN). Its objective is to provide connectivity between geographically dispersed locations of clients, as if they were connected to a same LAN. Adding to this the fast increase of the bandwidth demand for the transport of data and the availability of faster optical Ethernet interfaces at lower prices, we can think that it is possible to incorporate Ethernet technology to carrier networks. On the other hand, limits between packet switching networks and circuit switching networks are disappearing and it is possible to provide similar services using both types of networks. For example, the new generation of SDH (with LCAS, GFP and VCAT) provides services of circuits and data in a flexible and trustworthy form. From the economic point of view, it seems clear that the costs of implantation (CAPEX) and operation (OPEX) of the Ethernet technology are smaller than those of the SDH based networks. Nevertheless, to allow the Ethernet technology to be used in carrier networks, it is necessary to add it a set of essential characteristics that will allow it to offer services of quality. This article reviews the mechanisms that will allow the deployment of Ethernet in carrier metropolitan networks, also referred to as Optical Carrier-class Ethernet. 1 INTRODUCTION A Metropolitan Ethernet Network (MEN) is a network that connects geographically separated LANs directly or through a WAN, using Ethernet as main the protocol. As seen in Figure 1, nodes of a MEN can be switches or routers, depending on their location in the network, the service that they provide and the protection needed. Links are point to point of any Ethernet speed (from 10Mbit/s to 10 Gbit/s). MEN Networks are meshes of the necessary degree to provide the connectivity, services and the wished level of protection, and are interconnected with other MENs by means of WAN links. Ethernet services [MEF-1] [MEF-6] can be classified in point to point (E-Line) or multipoint to multipoint (E-LAN) (See Figure 2): Ethernet Line Service (E-Line). It provides a point to point Ethernet Virtual Connection (EVC). It is analogous to use Frame Relay PVCs, or TDM Leased lines. Ethernet LAN Service (E-LAN). It provides multipoint connectivity. Sent information can be received by several points. Each end is connected to a
2 186 L. Velasco, J. Perelló, G. Junyent multipoint EVC and when a new location is added, it is only necessary to add the new site to the multipoint EVC. MEN 1 WAN MEN 2 Figure 1 Example of interconnected MENs. E-Line Servicie CE MEN CE point to point EVCs CE E-LAN Servicie CE MEN CE multipoint to multipoint EVC CE Figure 2 E-Line and E-LAN Services. Deployment of gigabit Ethernet is based on the following drivers: Cost. The cost of the GbE equipment is significantly smaller than the one of FR or ATM, due to its relative technical simplicity and the economies of scale. In addition the operational cost is significantly lower than the one of TDM (PDH and SDH) and with smaller cost of implantation [ROI].
3 Metropolitan Ethernet Networks (MEN) 187 Fast on-demand provisioning. Ethernet services offer a big rank of speeds (1Mbit/s to 1Gbit/s) in increments of 1Mbit/s and they can be provisioned in a fast on-demand way. Packet based: Ethernet is an asynchronous technology based on frames that provides advantages by its flexibility over its more rigid competitors SDH and ATM. Ease of internetworking. It eliminates a layer of complexity (SDH and ATM) of the access, enabling simpler integration of client systems and networks and making the transport more efficient. Omnipresent adoption. Ethernet is the dominant technology in the LANs and there are standard interfaces for 10/100/1000/10000Mbit/s. Implications extend to benefits such as their training simplicity compared to ATM and SDH. A set of limitations can be identified when using pure Ethernet as a transport protocol, respect ATM or SDH. The adoption of Ethernet as a universal transport layer in the metropolitan area will depend on the resolution of these limitations: Scalability and use of the resources of the network. Because VLAN id is 12 bits length, the maximum number of VLANs in a domain is limited to Protection mechanisms. The loss of a connection is handled via STP which takes several seconds in acting as opposed to the 50ms of SDH. This time is critical in applications of voice and video. In addition, it presents a low capacity of failure isolation. SDH has alarms like LOS, RDI, etc. Transport of TDM traffic. If it is desired to construct a multiservice network, it is necessary to transport TDM circuits, like E1, E3 or STM-1. End to end QoS guarantees. Ethernet needs the following mechanisms: Planning, to assure that the service can be guaranteed in case of congestion. Connection admission for new services requests. Establishment of optimal path through the network. At the moment the spanning tree protocol (STP) is used. Packet priorization. In service OAM. Ethernet does not have error rate monitorization capacity as SDH makes with bytes BIP-8 of the overhead. The remaining of the article the mechanisms that will allow eliminating the previous limitations for the deployment of Ethernet as universal transport layer in the metropolitan area are reviewed. 2 ENCAPSULATION To support technologies that allow scalable services based on Ethernet, like Transparent LAN Services (TLS) to connect several client locations by means of a MEN, it is necessary to have some encapsulation mechanism. The more important aspects to deploy Ethernet in metropolitan networks are scalability, separation of clients and the limited size of MAC addresses table.
4 188 L. Velasco, J. Perelló, G. Junyent The encapsulation schemes insert/extract fields or additional labels in the client Ethernet frames at the edge nodes. In order to select a scheme over the others it is necessary to consider backward compatibility, performance and complexity. 2.1 SCALABILITY MAC ADDRESSES Ethernet switches learn MAC addresses of remote machines and they associate them with ports at which the Ethernet frames arrive. If Ethernet switches were used in the core of the metropolitan network each switch would have to learn the MAC address of each remote machine of each client VLAN connected to the metropolitan network. This is known as explosion of the MAC addresses table VLAN A VLAN is a logic LAN over a physical Ethernet shared network, as defined in IEEE 802.1Q. This standard defines a Q label: the VLAN identifier (VID), which is inserted in the Ethernet frames. The VID is 12 bits length, reason why the maximum number of different VLANs in a domain is Since the network is used by different clients, the VLAN identifier of each client has to be managed to assure that duplicated VIDs do not exist. 2.2 ENCAPSULATION MECHANISMS VLAN STACKING: Q-IN-Q ENCAPSULATION This mechanism inserts an additional Q label in the client frames arriving to the edge switch of the MEN (see Figure 3). Combining the client VID labels and the MEN labels, the space of VLANs is increased beyond the limit of the This scheme is backward compatible and it has been introduced in the IEEE 802.1ad specification. MAC MAC Dest. Source Ethernet type VLAN tag 802.1Q (ether type) VLAN tag Original Ether Type Data CRC Stacked Q-tag 802.1p (3 bits) CFI (1 bit) VLAN ID (12 bits) Q-in-Q Encapsulation M Type Reserved (5 bits) Control (8 bits) Version (6bits) Domain Identifier (24 bits) Priority (3 bits) Figure 3 - VLAN Stacking. Virtual MAN (VMAN) tag
5 Metropolitan Ethernet Networks (MEN) VLAN STACKING: VIRTUAL MAN (VMAN) LABEL A new 24 bits length label, called VMAN, is introduced in order to increase the number of client VLANs on the MAN (see Figure 3). This way it is not necessary to restrict the client VIDs and the number of VLAN transported on the MAN is increased. Although the forwarding mechanisms, protocol stack, etc. are basically the same as in the IEEE 802.1Q architecture, this scheme is not compatible with existing switches LAYER 2 MPLS ENCAPSULATION Layer 2 MPLS encapsulation (also known as Martini encapsulation [Martini]) facilitates the transport of Ethernet frames through MPLS domains (see Figure 4). Encapsulation fields Tunnel VC (32 bits) (32 bits) MAC MAC Dest. Source VLAN tag Ether Type Data CRC Figure 4 - Martini Encapsulation. The ingress node (LER, MPLS Label Edge Router) inserts two MPLS labels in the client Ethernet frames, based on the destination information (MAC address, port and Q label). Tunnel label: It is used to transport frames through a MPLS domain. This label is eliminated by the penultimate LSR (MPLS Label Switch Router). Virtual circuit label (VC): Used by the egress LER to determine how to process the frame and where to send it towards its destination. The LER has to perform two functions: Ethernet bridge, learning client MAC addresses, and MPLS forwarding based on the LSP. The LER has to map learned MAC/VID addresses to a pre-established LSP transporting Ethernet frames through the MPLS domain. The use of MPLS as an encapsulation mechanism provides additional advantages more over the scalability problem. For example, with the MPLS encapsulation, the Ethernet frames can be transported over any type of network. In addition, all the characteristics of OAM, protection mechanisms, traffic engineering and bandwidth guarantees of MPLS, are introduced automatically TECHNIQUES COMPARISON Since MAC addresses must be learned only in the LERs of the domain, using MPLS the explosion of the table of MAC address is avoided. From the perspective of the added overhead: Q-in-Q it introduces 4 bytes of overhead. VMAN introduces a minimum of 6 bytes. MPLS introduces a minimum of 8 (2*4) bytes, until a maximum of 30 bytes. For small frames, about 64 bytes, it introduces an overhead of up to 46%. Q-in-Q encapsulation provides scalability without adding a significant complexity, but MPLS provides a set of characteristics, like traffic engineering and reliability,
6 190 L. Velasco, J. Perelló, G. Junyent desirable for carriers. Since both technologies are complementary, they can be used together; Q-in-Q in the access network and LERs and MPLS in the core network. 3 OPERATION, ADMINISTRATION AND MAINTENANCE (OAM) With the introduction of traffic sensible to the real-time and to the quality of service (QoS), like voice and video services, it becomes necessary to control the switching, routing and the delivery of the packets corresponding to these services. In the last times an important effort is being made within the ITU and the IETF, to reflect the requirements of carriers in MPLS s OAM function [Y.1710] [Y.1730] [ReqOAM] and several standards with new and improved OAM functions have appeared. The mechanisms impelled by the ITU and the IETF, are: Connectivity Verification (CV) and Fast Failure Detection (FFD). Forward Defect Indication (FDI) and Backward Defect Indication (BDI). MPLS LSP ping. Bidirectional Forwarding Detection (BFD). LSR Self Test. In the next paragraphs we will present these mechanisms. 3.1 CONNECTIVITY VERIFICATION AND FAST FAILURE DETECTION The Connectivity Verification (CV) and Fast Failure Detection (FFD) mechanisms proposed by the ITU [Y.1711], allows detecting and diagnosing end to end connectivity defects in a LSP. The flow of CV packets, with a periodicity of 1 packet/sec, has origin in the ingress LSR of the LSP and goes towards the egress LSR of this LSP. Its purpose is the diagnosis of possible errors in reception: Loss of packets, Reception of packets with another destination, etc, as it is observed in Figure 5. FFD mechanism is identical to CV, except in that it allows the variation of the frequency of the packet flows, thus allowing fast detection of failures. The recommended value is 20 packets per second (a packet each 50ms). Loss of Connection Misconnection Swapped connection Loop Figure 5 Types of LSP defect.
7 Metropolitan Ethernet Networks (MEN) FORWARD DEFECT INDICATION AND BACKWARD DEFECT INDICATION The Forward Defect Indication (FDI) and Backward Defect Indication (BDI) mechanisms are proposed by the ITU [Y.1711]. The objective of FDI is to suppress the alarms produced in the client LSPs of a LSP affected a failure. FDI packets have a periodicity of 1paq/sg and they are sent from the first node detecting the failure to the LSP end point. If the error has taken place in the server layer, it will be the first node following the failure. If the error has taken place in the MPLS layer it will be the end point of the LSP of the level in which the failure has been produced. BDI mechanism informs, with a periodicity of 1paq/sg., to the source end of a LSP of a failure observed at destination. BDI needs a return path, which can be a dedicated LSP, a LSP shared by several LSPs, or a non MPLS return path. Figure 6 briefly describes FDI and BDI mechanisms. BDI FDI BDI FDI BDI Figure 6 FDI and BDI mechanisms. FDI and BDI can be useful to measure the network availability or to trigger the switching event in protection mechanisms. 3.3 MPLS LSP PING MPLS LSP Ping, proposed by the IETF [LSPPing], has the purpose of verifying that packets corresponding to a certain Forwarding Equivalent Class (FEC) end its MPLS path in the correct end node for that FEC. MPLS LSP Ping packets are sent by the ingress node towards the egress node, following the same path as the packets corresponding to the tested FEC. It has two operation modes: Basic connectivity check: the echo request packet arrives at the egress node and it is sent to the control plane to verify if the LSR is really the end node for that FEC. Once the verification has been made, the end LSR will send an MPLS LSP Ping echo reply reflecting the result of this verification. Traceroute: the packet will be sent to the control plane in each transit LSR. The transit LSP will verify that it is really a transit LSR for that FEC. 3.4 BIDIRECTIONAL FORWARDING DETECTION As we have seen above, LSP Ping is a mechanism capable to detect failures in the data plane and to make an analysis of the data plane as opposed to the control plane. The Bidirecional Forwarding Detection (BFD) mechanism, also proposed by the IETF [BFDBase][BFDMPLS], is a mechanism designed to detect failures only in the data
8 192 L. Velasco, J. Perelló, G. Junyent plane with a smaller computational cost compared to LSP Ping, allowing fast detection of failures (<1s compared to the several seconds of LSP Ping) and supports failure detection of bigger number of LSPs. In addition, thanks to its packet fixed format it is easier to implement in hardware. 3.5 LSR SELF TEST The LSR Self Test mechanism proposed by the IETF [LSP-ST], defines a mechanism to allow an LSR test its label associations and the connectivity with the LSRs to which it is directly connected. LSR Self Test can be used in unicast LDP tunnels and in RSVP based tunnels. 4 PROTECTION MECHANISMS SDH based transport networks provide traffic protection schemes with restoration times lower than 50ms. This characteristic allows that link connectivity losses, for example due to an optical fiber breakage or equipment card failures, do not have impact over the service provided to the clients. On the other hand, pure Ethernet traditional solutions provide protection by means of standard mechanisms based on the spanning tree protocol, originally designed to recover failures in 30sg. Requirements and protection mechanisms objectives for MEN are proposed and described in [MEF-2]. 4.1 SPANNING TREE Reaching a high availability is difficult using traditional bridging by means of the Spanning Tree Protocol (STP), defined in 802.1d. Spanning Tree prevents the appearance of loops and provides a back up mechanism in case of connection or port failure (see Figure 7). Mail Path Redundant path STP Domains Figure 7 - Spanning Tree Protocol.
9 Metropolitan Ethernet Networks (MEN) 193 Nevertheless, the slow convergence time of STP is inadequate to support quality services. Depending on the network topology, the Spanning Tree Protocol can take between 30 seconds and several minutes to recover from a failure. Although fast versions of STP exist, this protocol is not able to provide protection below 50 ms, threshold used by the carriers. Nevertheless, STP protocol can be supported in the access, as it is showed in Figure PROTECTION BY MEANS OF REDUNDANT CONNECTIONS To provide protection times below 50 ms two ways of protection have been defined (see Figure 8): Aggregate Link and Node Protection (ALNP): It uses a detour LSP to avoid the resource with failure. End to End Path Protection: It uses an end to end protection path. The detection of Loss Of Signal (LOS), Loss Of Link (LOL), Loss Of Frame (LOF) and Loss Of Sync in the Ethernet connection can be used to send protection events. Moreover, Ethernet uses the 8B/10B line code for clock recovery and power balance. This code is also used to detect physical link degradation, measuring the error rate (BER). Thresholds of BER can be used to trigger protection events. Detour path (ALNP) End to end Protection LER Figure 8 - Protection by means of redundant connections AGGREGATE LINK AND NODE PROTECTION (ALNP) ALNP provides local protection of multiple links or nodes through the network, using detour LSPs created using disjoined resources of which main path uses (see Figure 9). When a failure is detected: the last element in the path before the failure resource adds an additional MPLS label to reroute the traffic from the primary LSP to the detour LSP, the failure resource is avoided and the following element in the main path subsequent to the resource with failure is reached, this element eliminates the additional label and sends the traffic by the main path.
10 194 L. Velasco, J. Perelló, G. Junyent Detour LSP Figure 9 - ALNP Protection. Bandwidth reserved for the detour LSP can be used for extra traffic in dedicated protection 1:1 or shared 1:n architectures when they are not used for protection END TO END PATH PROTECTION The end to end path protection creates two or more redundant end to end LSPs between the ingress and the egress node [Y.1720]. The ingress and the egress node sent connectivity verification messages (CV or FFD) among them. In the 1:1 protection architecture the ingress node sends the traffic through the main path. When a failure is detected, the reception endpoint sends a backward defect indication (BDI) packet to the transmission endpoint to switch the traffic to the protection LSP. In the 1+1 protection architecture, the ingress node sends the traffic using both paths simultaneously to obtain a protection switching time lower than 50 ms. 5 CIRCUIT EMULATION Circuit Emulation Services (CES) allows the transport of constant bit rate synchronous circuits, like E1 (2Mbit/s), E3 (34 Mbit/s), STM-1 or STM-4, over variable bit rate asynchronous networks. CES provides support to the traditional TDM voice applications and leased lines. The Metro Ethernet Forum [MEF-3] has defined four general types of services: TDM Access Line Service (TALS). In this type of service, at least one of the end points finishes in another network (for example, PSTN), and it allows the transport of voice, Frame Relay and ATM circuits over Ethernet networks. The service is provisioned and managed by the MENs service provider. TDM Line Service (T-Line). In this type of service, the end points belong to a company. The service is provisioned and managed by the MENs service provider. Service operated by the client. The service is managed by the client. Mixed way: Any combination of the three previous services. Figure 10 shows an example of T-Line and TALS services.
11 Metropolitan Ethernet Networks (MEN) 195 E1 T-Line E1 E3 MEN TALS PTSN Figure 10 Circuit Emulation Services. 5.1 T-LINE SERVICE OPERATION MODES It is possible to provide multiplexed services, for example aggregating several E1 in a E3 or STM-1 link, creating configurations point to multipoint or multipoint to multipoint. This multiplexing service is made at the TSP optional block, that processes TDM services [MEF-3][MEF-4]. There are three possible operation modes, the first two are point to point and the third one allows multipoint configurations. Unstructured mode: Service between points with the same type of interface. The traffic is transported in a transparent way from one end to the other. For example, leased lines. Structured mode: Service between points with the same type of interface. The traffic is handled as overhead and payload. The overhead is terminated in the end points and the payload is transported transparently from one end to the other. For example, a STM-1 containing a VC-3. Multiplexed mode: Several lower rate services are multiplexed into a higher hierarchy level. Although service multiplexing is usually performed in the TDM domain, the emulation service is structured. 5.2 TALS SERVICE OPERATION MODES TALS service is very similar to the T-Line multiplexed service. Both modes use the MEN similarly, unless in the TALS service, the final multiplexed service is handled by another network instead of by the end user. For that reason it has some additional performance requirements. The MEN must maintain bit integrity, clock and other specific characteristics of the transported traffic format, without causing degradation that exceeds the offered service requirements. In addition, all the management, monitoring, etc. functions must be performed without affecting the transported service. 5.3 CES REQUIREMENTS Some of the CES requirements are: Packetization: Process to convert a synchronous traffic flow into Ethernet frames. It requires the introduced delay to be constant and as low as possible. It is also possible to encapsulate multiple frames of synchronous flows to reduce the latency of the process.
12 196 L. Velasco, J. Perelló, G. Junyent Latency (frame delay): Delay between the MEN entry point of the TDM flow, to the exit point. If it is very high it introduces the necessity of echo cancellation in telephone applications. MENs are able to provide latencies below 10 ms, which makes it possible to provide circuit emulation with no need of echo cancellation. Frame delay variation (jitter): The variable delay introduced by the MEN is due to the asynchronous nature of Ethernet switching and the variety of lengths of the frames crossing the MEN. The delay variation can be compensated using buffers (jitter buffers) at destination, with the cost of increasing latency. Frame loss and resequencing: The frames may not arrive in the same order in which they were sent. The destination node must rearrange the frames, using the sequence number field present in the overhead of the frame. The jitter buffer must be able to verify the sequence number of the arriving frames and rearrange them if necessary. All this must be done maintaining the buffer size as smaller as possible in order to minimize the latency. Clock recovery and synchronization: Circuits transport clock information that is used to synchronize the transmitter and the receiver. If clock differences exist between the transmitter and the receiver, some information will be lost, causing a reduction of the quality of the circuit. A clock recovery mechanism, that resists latency, jitter and the loss of frames, has to be used. 6 CONCLUSIONS The combination of high speed Ethernet at reduced prices with optical switching can fulfill the growth of the bandwidth demand, and it can represent one alternative, in the metropolitan scope, to the SDH technology traditionally used by carriers. Optical Ethernet provides the platform to construct big Metropolitan Ethernet Networks, providing quality services incurring in total costs (TCO), implantation (CAPEX) and operation (OPEX) much smaller than those of the alternative technologies (New Generation SDH and Ethernet over WDM). To allow that, is necessary to add a set of mechanisms (protection, OAM, emulation of circuits, Engineering of traffic, QoS, etc.) to pure Ethernet technology so it can fulfill the strict requirements that carriers have. These requirements have been specified by standardization organizations, mainly ITU and IETF, and in the next months it is expected the appearance of equipment able to fulfill all these requirements. REFERENCES [MEF-1] Metro Ethernet Forum. Technical Specification MEF 1 Ethernet Services Model, Phase 1, Nov [MEF-2] Metro Ethernet Forum. Technical Specification MEF 2 Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks, Feb [MEF-3] Metro Ethernet Forum. Technical Specification MEF 3 Circuit Emulation Service Definitions, Framework and Requirements in Metro Ethernet Networks, Abr. 2004
13 Metropolitan Ethernet Networks (MEN) 197 [MEF-4] Metro Ethernet Forum. Technical Specification MEF 4 Metro Ethernet Network Architecture Framework - Part 1: Generic Framework, May [MEF-6] Metro Ethernet Forum. Technical Specification MEF 6 Ethernet Services Definitions - Phase I, Jun [ROI] Metro Ethernet Forum, Comparison to Legacy SONET/SDH MANs for Metro Data Service Providers July [Martini] Martini, et al. Encapsulation Methods for Transport of Ethernet Frames Over IP/MPLS Networks, Sep [Y.1710] ITU-T Y-1710, Requirements for OAM functionality for MPLS networks, Nov [Y.1711] ITU-T Y-1711, Operation & Maintenance mechanism for MPLS networks, Feb [Y.1720] ITU-T Y.1720, Protection switching for MPLS networks Sept [Y.1730] ITU-T Y-1730, Requirements for OAM functions in Ethernet-based networks and Ethernet services, Ene [ReqOAM] T. D. Nadeau et al., OAM Requirements for MPLS Networks, IETF Internet draft draft-ietf-mpls-oam-requirements-05.txt, Dec [LSPPing] Kompella et al., Detecting MPLS Data Plane Failures, IETF Internet draft draft-ietf-mpls-lsp-ping-07.txt, Oct.2004 [BFDMPLS] R. Aggarwal et al., BFD for MPLS LSPs, IETF Internet draft draftietf-bfd-mpls-00.txt, Jul [BFDBase] D.Katz, D.Ward, Bidirectional Forwarding Detection IETF Internet draft draft-ietf-bfd-base-00.txt, Jul [LSP-ST] G. Swallow, K. Kompella, D. Tappan, Label Switching Router Self- Test, IETF Internet draft draft-ietf-mpls-lsrself-test-03.txt, Oct [RFC3469] V. Sharma, F. Hellstrand, Framework for Multi-Protocol Label Switching (MPLS)-based Recovery IETF RFC 3469, Feb
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Innovation in Access and Metropolitan Area Networks -
Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and
Evaluating Carrier-Class Ethernet Services
Technical Paper Evaluating Carrier-Class Ethernet Services Demand for Ethernet-based services is on the rise, and the key driving force behind this is continuous growth of data traffic in the metro/access
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.
Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers
MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
White Paper: Carrier Ethernet
White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s
Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s The fast path to increased bandwidth for carriers, service providers, and enterprises Printed in the USA.
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Virtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN
Carrier Grade Ethernet Ethernet in service provider networks, MAN/WAN Carrier grade The term Carrier Ethernet implies that Ethernet services are carrier grade. Carrier grade is a system that is extremely
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
Designing Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
Testing Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Metro Ethernet Services
CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET White Paper Provider Backbone Transport Market overview For many years, Ethernet has been the dominant networking protocol in the LAN. Its simplicity
Scalability Analysis of Metro Ethernet
Scalability Analysis of Metro Ethernet Heikki Mahkonen Helsinki University of Technology Email: [email protected] Abstract This document gives a scalability analysis of Metro Ethernet architecture.
Cox Business. L2 / L3 and Network Topology Overview. February 1, 2011
Cox Business L2 / L3 and Network Topology Overview February 1, 2011 Layer 3 / Layer 2 Comparo Protocol Architecture Control Change: Adding sites Change: IP changes Faults: Management Faults: Calls Layer
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
IP/MPLS. Marios Parperis - Alcatel-Lucent Energy Systems Integration Division. October 2012. Alcatel-Lucent 2010 All Rights Reserved
IP/MPLS Marios Parperis - Alcatel-Lucent Energy Systems Integration Division October 2012 Agenda Today s Landscape in Electric Utilities Why Consider IP/MPLS as a Network solution? MPLS Concerns TDM Applications
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
MPLS-TP The New Technology for Packet Transport Networks
MPLS-TP The New Technology for Packet Transport Networks Dieter Beller, Rolf Sperber FS/O/PDL, FS/R/VP Alcatel-Lucent Deutschland AG Lorenzstraße 10 D-70435 Stuttgart [email protected] [email protected]
Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks
Connection-Oriented Ethernet On-Ramp Aggregation for Next-Generation Networks Introduction The GIG and its component networks, including the DISN, form the state-of-the-art network foundation for DoD communications.
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
EPIPE Connectivity Services
EPIPE Connectivity Services VTCW018 - I 08/13 EPIPE Connectivity Services 2 In an always on hyperconnected world choosing the right networking technology is now more important than ever. Around the world
Introduction to Circuit Emulation Services over Ethernet
Introduction to Circuit Emulation Services over Ethernet Abstract This paper provides an introduction to Circuit Emulation Services over Ethernet (CESoE) enabling the support of synchronous services such
Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure
Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure Introduction The migration of Ethernet technology from the LAN to metro networks, driven by increasing demand in VoIP,
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Implementing Virtual Leased Lines Using MPLS
Lines Using MPLS able of Contents 1. Objective... 3 2. arget Audience... 3 3. Pre-Requisites... 3 4. Introduction: MPLS and IP-Based VPNs... 3 5. he Promise of MPLS Layer-2 VPNs... 5 6. unneling Layer-2
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
The Role of Carrier Ethernet in Business Applications
The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol
APRICOT 2012 MPLS WORKSHOP L2VPN
APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 [email protected] 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Bandwidth Profiles for Ethernet Services Ralph Santitoro
Ralph Santitoro Abstract This paper provides a comprehensive technical overview of bandwidth profiles for Ethernet services, based on the work (as of October 2003) of the Metro Ethernet Forum (MEF) Technical
Performance Management and Fault Management. 1 Dept. of ECE, SRM University
Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported
Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE)
Carrier Ethernet A Wave is Building Provider Backbone Bridges with Traffic Engineering (PBB-TE) D. Kent Stevens Western Region Optical Architect [email protected] 714-803-1050 Next Generation Packet
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
Virtual Private LAN Service (VPLS)
White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
Packet-Optical Ethernet Business Access Networks
T E C H N O L O G Y W H I T E P A P E R Packet-Optical Ethernet Business Access Networks Services without boundaries Ethernet has rapidly become the technology of choice for service providers supporting
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
Application Notes Multi-service EDD-Ethernet Demarcation Device
Application Notes EDD-Ethernet Demarcation Device IERU Communications Ltd EDD Page 1 of 8 2000 EDD Introduction: As the benefits of Ethernet networking in the metro and wide-area have become clear, service
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Multi-Provider Ethernet Service Delivery
Multi-Provider Ethernet Service Delivery Ananda Rajagopal Product Manager, Service Provider Solutions Foundry Networks Agenda Multi-Provider Ethernet Service Delivery Ethernet Service Delivery Today A
Bandwidth Profiles for Ethernet Services Ralph Santitoro
Ralph Santitoro Abstract This paper provides a comprehensive technical overview of bandwidth profiles for Ethernet services, based on the work of the Metro Ethernet Forum (MEF) Technical Committee. The
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
UNDERSTANDING BUSINESS ETHERNET SERVICES
UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more
Ethernet Business Services
Ethernet Business Services Introduction Why market Ethernet Business solutions? This represents large revenue streams for Service Providers Commercial services market experiencing huge growth Most Service
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
UNDERSTANDING BUSINESS ETHERNET SERVICES
EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
How To Make A Network Cable Reliable And Secure
ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1
MPLS Multiprotocol Label Switching
MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Operational Core Network
Service Assured Networking for Power Utilities Application Brochure Operational Core Network Using Carrier-Grade Ethernet Typical users: Transmission & Distribution Power Utilities For more than 30 years,
Service Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
