Corporate Network Services of Tomorrow Business-Aware VPNs
|
|
|
- Primrose Henry
- 9 years ago
- Views:
Transcription
1 Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution of VPN Services: First 3 Generations... 2 The 4 th Generation: Business Aware VPNs...4 Understanding the BA-VPNs Market Opportunity...6 Overall Benefits of BA-VPNs...6 Functional Requirements of BA-VPNs...7 Implementing BA-VPNs...7 Conclusion...8
2 Introduction Serving Business Customers: New VPN Requirements There is a clear trend in the telecommunications enterprise market towards increasing the value of service providers product portfolio. Indeed, on the one hand, CIOs are looking for further reducing costs and improving productivity of company s distributed business processes (Figure 1). On the other hand, they would like to go a more disruptive way and shift their network service strategy from just enhancing productivity to value creation with new business processes and collaborative applications enabled by new communications means. Hence, emerging new generation communications services will have a significant and increasing impact on the enterprises and industry business processes. These services have to support communication critical applications in the changing environment of network and services convergence. Therefore VPNs, a key component of enterprise service offering, are evolving to shift the focus from multiple site connectivity to applications, collaborations, individuals and communities of individuals. The range of applications is huge, from healthcare solutions requiring very high robustness, to networked industry plants and services like online market exchanges requiring very low latency and delay variation. HQ Distributed Business Processes Figure 1: Distributed Business Processes Evolution of VPN Services: First 3 Generations The telecommunications market has been moving fast to the current 3 rd generation of VPN services, and it is already facing the 4 th generation. Let s briefly review the three first generations that focus on connectivity between multiple sites (Figure 2). The 1 st generation was based on circuit connectivity between sites based on TDM/PDH and then complemented with SDH network infrastructures. The lack of flexibility, coarse granularity, lack of efficient bandwidth utilization and relative high cost of these solutions, together with the readiness of new technologies, triggered a migration towards the 2 nd generation, in which TDM circuits were replace with Frame Relay and ATM connections. Flexibility was introduced in terms of provided bandwidth and classes of service; still the service provider network offered just end-to-end connectivity between sites, all the VPN Page 2
3 intelligence is located at customer premises. The typical topology of these VPNs was a star, centered in the company Headquarters. This solution nicely fits the system architectures and business processes used at that time. HQ VPN Distributed Business Processes Figure 2: VPN Connectivity Today, the market is focused on the 3 rd generation, for which the first service model was the IP VPNs, typically based on an IP/MPLS infrastructure. In this 3 rd generation, the VPN intelligence is managed by the service provider, by network located devices. In a simplified view, the key differentiator of this 3 rd generation is that each VPN site sends all the traffic to a device controlled by the service provider and this device (usually called a Provider Edge Equipment - PE) is responsible for forwarding the traffic to the right destination (e.g. customer site) with the expected quality of service (QoS). This service model introduces the flexibility to deploy, at a controlled cost, VPNs of any topology 1, which is well adapted to the new business processes of the enterprises. The enterprises therefore outsource the VPN intelligence to the service provider. As an example of network functionality that is outsourced, one can cite: connections termination, switching and routing. Other important characteristics of the 3 rd generation are: - the increasing usage of Ethernet as the IP transport layer, in particular as the access technology to IP VPNs (allowing high scalability and cost reduction). - the usage of DSL access allowing for low-cost, ubiquitous, mid-bandwidth connectivity well suitable to SMEs. - In addition, an increasing number of enterprises, including most large enterprises, have deployed or are in the process of deploying voice over their IP VPN. 1 In the 1 st and 2 nd generations, the services were built using multiple physical circuits (PDH, SDH) and virtual circuits (Frame Relay, ATM). The number of required connections depends on the number of sites and on the topology of the VPN. In the 3 rd generation, a given site send the traffic to a given network device (the PE) which is in charge of forwarding the traffic to the right destination site. As a consequence, the cost of the VPN is not directly related with the topology of the VPN, there is no restriction on the possible direct traffic exchanges between all the sites (direct means here that the traffic between two sites does not transit through a third site). Page 3
4 More recently, layer 2 (Ethernet) VPN services started to be provided. This was facilitated by the Metro Ethernet Forum (MEF), which clearly defined the framework for various Ethernet services. These layer 2 VPNs belong to the same generation in our classification since as for layer 3 (IP) VPNs, the forwarding intelligence is deployed in network located devices, and a given site sends all his traffic to a given PE which is in charge of the forwarding towards the destination site (let us remark that, in addition, Ethernet is also being use for point to point connectivity). As for the layer 3 VPNs, these services are suitable for metro, country-wide and global networks (let us remind here that the MEF is changing his name to GEF, Global Ethernet Forum). To clarify the concept of layer 2 VN, let us remark that since most user applications are IPbased, most of the traffic over a layer 2 VPN is IP. The major difference with layer 3 VPNs is that the service provider bases the forwarding decisions on the layer 2; the layer 3 routing, when required, remains under control of the customer. Layer 2 Ethernet VPNs are typically deployed with dedicated Ethernet network termination units (NTU) that are located at customer premises and ensure end-to-end service control, fault management (with standard Ethernet OAM) and traffic handling. In fact, in case of IP VPN, a customer-located router usually serves as the IP NTU that enables required termination functionality at IP layer. A lot has been written and said regarding layer 3 and layer 2 VPNs comparison. We will not repeat this debate here, we would like just to remind that main VPN service providers have arrived to a conclusion that both VPN types will co-exist and roughly estimate that layer 2 VPNs, a market that is now growing even faster than layer 3 VPNs, will represent 30% of the total VPNs market in the near future (once a stationary growing of these two services is reached). Still, in both service models of the 3rd generation, the customer is required to have strong network competences, since the SLAs are based on technical parameters, such as bandwidth, Classes of Service, Quality of Service, etc. It is the customer responsibility of defining the mapping policies between the applications and the Classes of Service, even when the effective mapping (marking) is done by a service provider s network equipment. Also the customer has to understand the benefits and drawbacks of the Layer 2 and Layer 3 solutions in order to select what solution better fits his specific needs. When both service models are available, a customer would prefer to have a hybrid solution; for example, adapting the technology per type of site (small/large branches connection, data centers interconnection, etc.). Both 3 rd generation IP and Ethernet VPNs enable basic connectivity between multiple customer sites that is used as the foundation for value-added services (VASs) to provide additional value proposition with premium services. Such VASs are in particular important when IP VPNs are becoming a commodity that results in pricing erosion. For instance, this could be end-to-end quality assurance (with several Classes of Service). Another example is OBS Enterprise Application Management offering, which is a value-added service for IP VPN. In fact this OBS service is a clear move towards the 4 th VPN generation, yet not a case of Business- Aware VPN that is introduced in the White Paper. The 4 th Generation: Business Aware VPNs The driver for the 4 th VPNs generation is the customer desire to completely outsource VPNs to service providers. Indeed, as indicated in recent market analysis, CIOs prefer to focus on their business processes, their applications, the level of criticality of the applications and the Quality of Experience expected by the end-users (individuals and communities of end-users) rather than deal with technical issues of network functionality. They don t want to be involved in technology choices (e.g. level 2 or level 3), nor to be familiar with technical concepts like bandwidth and classes of services. In Service Level Agreements (SLAs) of the 4 th generation VPNs, the customer will define its requirements in a non-technical language that he understands: the sites he has, the applications he runs, the expected Quality Page 4
5 of Experience (instead of Quality of Service), the relative criticality of the various applications, the required level of security, etc.; of course, along with the classical metrics of reliability and availability. A main advantage is that the VPN service definition is agnostic with respect to the type of enabling connectivity. This will be a huge benefit for service providers that introduce the 4 th generation. Instead of being confronted to the complexity of marketing Layer 2 and Layer 3 VPNs and presenting technoeconomical comparisons, the service provider will focus his marketing efforts and differentiators on how close his service is to the real customer needs, as understood from a business process point of view. The service provider can decide whether it is preferable to deploy layer 2 or layer 3 VPN solutions per client, per network segment and even per site. Indeed, such a solution can combine Layer 2 Ethernet and Layer 3 IP connectivity (see Figure 3). HQ Ethernet VPN Distributed Business Processes IP VPN Figure 3: Network technology agnostic VPNs The key concept of the 4 th generation is that the service provider identifies the application that has generated a flow (a voice call, a file download, a Citrix activity, etc.) and uses this information for handling the entire flow end-to-end (the sequence of packets of the flow), according to the type and level of criticality of the application, as defined in the SLA. In addition to the controlled application aware connectivity, some added-value functionality is provided: visibility (end-to-end quality monitoring, resource usage monitoring), online configuration, security, expenses control (alerts when new resources are required), applications acceleration, etc. We will call these 4 th generation VPNs Business-Aware VPNs (BA-VPNs). The following two major features differentiate this new generation: 1. Service requirements are defined in terms of quality of experience per application and performance of the business processes (not technical parameters of required connectivity) 2. The service is provided transparently to enabling connectivity and network type ( connectivity-agnostic ), so it might be delivered with IP and/or Ethernet connectivity of multiple customer sites. Page 5
6 Understanding the BA-VPNs Market Opportunity The customer demands for this type of VPN solutions is not new. Historically, when an enterprise was facing Quality of Service problems, the first natural move was to negotiate the increase of the access bandwidth of the sites facing the quality degradation. This solution is expensive, and doesn t always solve the problem. Indeed, the congestion may be in other parts of the network, in the servers, etc. Therefore, in the late 90th, several start-ups introduced new enterprise monitoring appliances. Such equipment, owned by the customer allowed monitoring the usage of the access (WAN) links and optionally provided basic traffic control over available access bandwidth. This allows the customer to validate whether the problem is in the access or not. In the cases the problem is indeed in the access link, a natural solution is to increase the bandwidth, but this is not always necessary. Indeed, the impact of the degradation of the quality of experience on the performances of the business processes depends on the application, and usually non-critical applications bandwidth requirements increase much faster than critical applications bandwidth requirements. To handle this issue, the monitoring appliances were enhanced with application-aware flow control. This functionality enables to identify the applications and to control the flows in case of access link congestion in order to protect the critical applications. As noted in the previous sections, in order to better fit the requirements of enterprises business processes, the 3 rd generation of VPNs was introduced, allowing, for example, services with no restriction on the VPN topology, specifically enabling direct traffic exchanges between sites (usually based on the so-called hose model ). The new enabled business processes are more distributed and the consequence is that controlling the traffic access link by access link is suboptimal and a global control of the whole traffic of the VPN is required. A very few companies in the world are today proposing solutions for this requirement. In any case, today the companies see the application / traffic awareness solution as appliances to be deployed in their sites, usually under their control (even when selected and bought by the service provider). In the new generation VPNs, this functionality is outsourced and sold as an added value service, a key enabler for advanced business processes and a new source of revenues for service providers. Overall Benefits of BA-VPNs The most important benefits of BA-VPNs for customers are as follows: - Network transparency from the CIO s and individual end-user s point of view. The CIO can outsource ALL possible networking functionality to a service provider (of course, this type of service allows also for a limited outsourcing adapted to each CIO strategy). The end-user obtains the expected Quality of Experience on critical applications under any circumstances. - As a consequence, the business process of the company can be enhanced, but more important, new business process, with an increased productivity and generating new revenues, become possible. Indeed, the dynamic protection of critical applications, in a Page 6
7 seamless approach from the end-user point of view, and without the requirement of any specific expertise for the IT team, is a main enabler for deploying new business processes. - The obtained global visibility allows the enterprise for better expenses control and planning (predictable services). The most important benefits of BA-VPNs for service providers are as follows: - The service provider sells the BA-VPN as an integrated service; it doesn t need to market different technically defined offers (IP VPN, L2 VPN), requiring technical insides and controversial discussions. This is becoming more and more important as the trend of many CIOs is towards the outsourcing of networking facilities, to focus on their core activities, more closely related with the enterprise business processes. - Differentiating new VPN services with high value proposition (from basic connectivity to enabling business processes and collaboration) that leads to increased revenue and preventing customer churn. - The new VPN offering is highly adaptable to any specific needs of every customer. - Optional additional VASs (application management, security, etc.) are facilitated. Functional Requirements of BA-VPNs To supply BA-VPNs, the service provider has to identify the flows generated by the various sites of a VPN instance, then recognize which application and at which site has generated the flow, and after that make a decision regarding forwarding (which destination, which path) and quality control (scheduling among the various flows based on the type and criticality level of the application that has generated them). For this purpose, the service provider may have to analyze the customer traffic. The analyses can de bone in different ways; the most popular today is the so called Deep Packet Inspection (DPI). In DPI, at least for the first packets of a flow, the content of the traffic is analyzed up to the application layer in order to identify the application. DPI can be complemented with a statistical analysis of the temporal structure of the flows. Traffic awareness may therefore require analyzing the traffic at several layers, including the application layer, as well as certain traffic semantics. This does not impose any restriction on the traffic forwarding; usually traffic is forwarded at Layer 2 or Layer 3. In other words, a packet will be analyzed to decide to which flow it belongs to, or if the packet initiates a new flow. From this analysis, a decision will be taken on functionality like scheduling (the order at which packets are transmitted) and queue management (which packets are drop in case of congestion). Still all the packets are forwarded based on Layer 2 or Layer 3 addresses, as in the case of VPNs without application awareness. More precisely, the forwarding will be based on MAC addresses forwarding tables or on IP addresses routing tables, while the application awareness enables flow identification, and mapping the traffic over the required network Class of Service or specific network connection. Implementing BA-VPNs This section describes a possible approach to implement a BA-VPN, which is a simplified overview of the solution being developed by RAD and Ipanema. Page 7
8 Based on the facilities of the 3 rd generation VPNs, like IP VPNs or Ethernet VPNs, and of new technologies (like IP Telephony), the direct traffic exchanged between multiple sites of a company is increasing (let us remind here that we call direct traffic the traffic between two sites that is not forwarded through a third site). As an example, in IP telephony the signaling for session (call) set-up and the media may follow different paths: typically the signaling will be exchanged through a server located in the Head quarters or datacenter, whereas the media (voice) will be exchanged directly between the terminals that may be located at different branch offices, therefore resulting in a meshed traffic. In such a distributed environment, the traffic aware control has to be done in a distributed way and requires specific functionality at customer premises. This functionality is under full control of the service provider in the BA-VPN service model. Moreover, a service provider will deploy at the customer premises a device that will enable smart demarcation (fault management, quality of service control, etc) at Layer 2 (Ethernet) or Layer 3 (IP). It seems natural, for CAPEX and OPEX reduction, to integrate the whole functionality (traffic awareness and smart demarcation) in the same device. These customer-located devices will collaborate in the VPN architecture with centralized servers that will allow for a policy-based configuration of the customer-located devices, therefore further reducing OPEX. The routing and switching functionality is provided by the existing Layer 2 and Layer 3 VPN infrastructure, no additional investment is required here, previous investment is leverage for the provision of the BA-VPNs. Conclusion The present document introduces the concept of BA-VPN, its benefits, a short overview of its requirements and a possible implementation framework. BA-VPNs are defined here as a new service model instead of an added value to existing service models, proposing an integrated new value proposition and cost reduction approach. They leverage existing investments in Layer 2 and layer 3 VPNs, no additional investment is required for connectivity. The White Paper presents a very first draft of the new BA-VPN model. Its main target is to facilitate further discussion on the concept, its business model and implementation in specific carrier environment. Page 8
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Simwood Carrier Ethernet
Simwood Carrier Ethernet Simwood Carrier Ethernet is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use a number of technologies on top of our own
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
Carrier Ethernet 2.0 Service Delivery Case Study: Telstra s Ethernet Services Powered by MRV
White Paper Carrier Ethernet 2.0 Service Delivery Case Study: Telstra s Ethernet Services Powered by MRV Prepared by Heavy Reading www.heavyreading.com on behalf of www.mrv.com March 2014 Introduction
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
Solving the Access Conundrum for the All-IP Network:
Solving the Access Conundrum for the All-IP Network: Business Service Delivery Across Diverse Infrastructures London, June 27 th, 2006 Presented by: Dr. Yuri Gittik Chief Strategy Officer [email protected]
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Converged Business Networks: Simplifying Network Complexity Sponsored by: Level 3 Melanie Posey November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
The Role of Carrier Ethernet in Business Applications
The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics
MITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+.
Carrier Ethernet vs. (Standard) Ethernet The Ethernet Evolution. The Basics What is Ethernet? Ethernet (technical term is IEEE 802.3) has set the standard in how service providers connect customers to
CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS
CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS INTERNET TECHNOLOGIES DIVISION JANUARY 2005 1 Cisco IOS IP Service Level Agreements Presentation Agenda Overview
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Unifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,
Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device
Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device THE NEED Communications Service providers (CSPs) have been transitioning from legacy SONET/SDH to IP and
MPLS VPN basics. E-Guide
E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While
SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration
SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
CARRIER MPLS VPN September 2014
CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
EVALUATING NETWORKING TECHNOLOGIES
WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION
Customer white paper. Carrier Ethernet for Business Delivering L2/L3 Converged Services. Smart Enterprise Access Solutions for Service Providers
Carrier Ethernet for Business Delivering L2/L3 Converged Services June 2011 Author Patrick De Boeck Customer white paper About this Whitepaper Integrated management and deployment: Processes and tools
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet
Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that
Mastering Network Design with MPLS
Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual
Efficient and low cost Internet backup to Primary Video lines
Efficient and low cost Internet backup to Primary Video lines By Adi Rozenberg, CTO Table of Contents Chapter 1. Introduction... 1 Chapter 2. The DVP100 solution... 2 Chapter 3. VideoFlow 3V Technology...
Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning
Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.
APPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
Multi-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
Comparing MPLS and Internet Links for Delivering VoIP Services
IP Telephony Contact Centers Mobility Services WHITE PAPER Comparing MPLS and Internet Links for Delivering VoIP Services September 2005 avaya.com Table of Contents Overview... 1 Historical Perspective...
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
How To Get More Bandwidth From Your Business Network
Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,
The term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
UNDERSTANDING BUSINESS ETHERNET SERVICES
UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more
MPLS: Key Factors to Consider When Selecting Your MPLS Provider
White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com
UNDERSTANDING BUSINESS ETHERNET SERVICES
EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Monitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
STEELHEAD HYBRID NETWORKING
STEELHEAD HYBRID NETWORKING INCREASE NETWORK APPLICATION PERFORMANCE AND AVAILABILITY WHILE REDUCING COSTS WITH RIVERBED PATH SELECTION THE RISE OF THE HYBRID INFRASTRUCTURE Today, businesses are rapidly
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
MARKET BRIEF Plug and Play: Managed IP Telephony
MARKET BRIEF Plug and Play: Managed IP Telephony Sponsored by: NEC William Stofega September 2006 IP TELEPHONY: BENEFITS AND CHALLENGES Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200
LoopStar 700. Next Generation Ethernet Access and Transport Solutions
LoopStar 700 Next Generation Ethernet Access and Transport Solutions The LoopStar 700 Product Family The LoopStar 700 product family delivers all efficiently consolidate all services onto a the features
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
Winning Strategies for Delivering Premium VPN Services to the Always-on Enterprise
Winning Strategies for Delivering Premium VPN Services to the Always-on Enterprise By R. Latraverse Technology executives in always-on enterprises face daunting challenges as they transition to an all-ip
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
Colt VoIP Access. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt VoIP Access 2010 Colt Technology Services Group Limited. All rights reserved. Business requirements Are you looking for ways to simplify management of national or even international voice services
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS SARO VELRAJAN Director of Technology, Aricent APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS Service providers are constantly exploring avenues
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Ethernet Business Services
Ethernet Business Services Introduction Why market Ethernet Business solutions? This represents large revenue streams for Service Providers Commercial services market experiencing huge growth Most Service
Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper
White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G
Driving Service Delivery with SLA Performance Management
Driving Service Delivery with SLA Performance Management Providers #1 competitive advantage Service providers more and more depend on Ethernet services as the networks are evolving from traditional voice
Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
Switched Ethernet (SW-E) Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA
Overview INTRODUCTION SERVICE OFFERINGS ACCESS OPTIONS PROVISIONING SERVICE LEVEL AGREEMENT (SLA) KEY SEGMENT AREA StarHub pioneers in forward-looking technology innovations to enhance ability and connectivity.
Building integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
IVCi s IntelliNet SM Network
IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
Evolving Your Network with Metro Ethernet and MPLS VPNs
Evolving Your Network with Metro Ethernet and MPLS VPNs Change is a constant in enterprise networking and the axiom definitely holds true when considering wide-area connectivity options. Experienced IT
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
SDN CENTRALIZED NETWORK COMMAND AND CONTROL
SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016
How to cut communications costs by replacing leased lines and VPNs with MPLS
in association with How to cut communications costs by replacing leased lines and VPNs with MPLS March 09 End of the line for leased lines and IPSec VPNs as MPLS comes of age Contents Executive summary
Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study
Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study Kashif Islam, Technical Leader Cisco Carlos Sanchez, Systems Engineer Cisco Edward Kerner, Network Engineering
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
Verifying Metro Ethernet Quality of Service
White Paper Verifying Metro Ethernet Quality of Service Introduction Metro Ethernet is widely accepted as a cost-effective, resilient, and scalable switching and transport technology. Used for delivery
US Data Services 2014-2019
US Data Services 2014-2019 Executive Summary CMR Market Research April 2015 Reproduction without permission 1 The contents of this report represent CMR s analysis of the information available to the public
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
Silver Peak s Virtual Acceleration Open Architecture (VXOA)
Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,
Building Access Networks that Support Carrier Ethernet 2.0 Services and SDN
In cooperation with Building Access Networks that Support Carrier Ethernet 2.0 Services and SDN COMMTECH Show Toronto, April 15-16 Mississauga Center by Pasquale Tagliarini Senior Solutions Engineer Agenda
Connection-oriented Ethernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of Ethernet
Connection-oriented ernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of ernet Topics Just what is connection-oriented ernet (COE) anyway? Fundamental
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers s Executive Summary Cloud computing, video streaming, and social media are contributing to a dramatic rise in metro
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
WHITE PAPER. Hybrid Networking. Managed Network Services Buyers Guide
WHITE PAPER Hybrid Networking Managed Network Services Buyers Guide A global network is a company s central nervous system that influences the overall health and performance of a business and it s critical
