Technical White Paper for IP Leased Line

Size: px
Start display at page:

Download "Technical White Paper for IP Leased Line"

Transcription

1 Technical White Paper for IP Leased Line

2

3 Contents Technical White Paper for IP Leased Line Preface Background of the IP Leased Line Technology Associated Technical Standards Technical Introduction Layer 2 Circuit Emulation Technical Scheme Pseudo Wire Technical Scheme MPLS L3VPN Technical Scheme Key Technologies Leased Line Bearing Technology End to End Quality Assurance for IP Leased Line Service Visualized Deployment of IP Leased Line IP SLA Visualized Report on the Quality of the Leased Line Visualized Detection of Leased Line Faults Protection Technology of the Leased Line Services Traditional Leased Line Migration Technology Typical Application Interconnection of Branches within an Enterprise Carrier Wholesale Service Migration of the Traditional Leased Line Conclusion References Acronyms and Abbreviations...43

4 Figures Figure 1-1 Revenue and development trend of the leased line of the enterprise... 2 Figure 2-1 Basic structure of the MPLS L2VPN...5 Figure 2-2 PWE3 basic transmission components...6 Figure 2-3 BGP/MPLS VPN model...8 Figure 3-1 VLL networking in the Martini mode...12 Figure 3-2 VLL networking in the Kempella mode...13 Figure 3-3 Topology model of PW protection...15 Figure 3-4 MS-PW reference model...16 Figure 3-5 Inter-AS BGP MPLS IP VPN Option A...18 Figure 3-6 Inter-AS BGP MPLS IP VPN Option B...19 Figure 3-7 Inter-AS BGP MPLS IP VPN Option C...20 Figure 3-8 Figure 12 Multicast VPN networking model...22 Figure 3-9 VLAN HQoS service and bandwidth model...23 Figure 3-10 MPLS HQoS service and bandwidth model...24 Figure 3-11 Deployment of the PWE3 service through the U Figure 3-13 Using a template to deploy services...26 Figure 3-12 Formulating a template...26 Figure 3-14 Replicating services...27 Figure 3-16 Creating an SLA monitoring instance...28 Figure 3-15 U2520 monitoring center...28 Figure 3-17 Checking the SLA detection result...29 Figure 3-18 Fault and alarm management...29 Figure 3-19 Presentation of the service topology...30 Figure 3-20 Test diagnosis...30 Figure 3-21 Scenario that the E-Trunk implements the redundant access at the access side...31 Figure 3-22 PW Redundancy in the dual-homing scenario...32 Figure 3-23 PW redundancy in the scenario where the E-Trunk accesses the VPLS network...33 Figure 4-1 Interconnection of branches in an enterprise in point-to-point mode Figure 4-2 Interconnection of branches in an enterprise in point-to-multipoint mode...37 Figure 4-3 Interconnection of branches in an enterprise in point-to-multipoint mode...38 Figure 4-4 Wholesale service...38 Figure 4-5 ATM leased line migration...39

5 Technical White Paper for IP Leased Line Keywords VPWS, VPLS, MPLS L3VPN, IP leased line OAM, ATM/TDM leased line migration, HQoS Abstract The ALL-IP service bearer technology has been widely recognized in the industry. The leased line service, as a high value-added service, attracts attention from carriers worldwide. More and more leading carriers worldwide adopt the IP technology to carry the leased line service. On the broadband MAN, more and more new leased line services are using the IP technology. At the same time, services carried over the traditional ATM/TDM leased line are migrating to the IP-based leased line. This document describes the background, development trend, implementation, key technology, and typical service scenarios of the IP leased line to explain the understandings and technical viewpoints of Huawei on the IP leased line service. 1

6 1 Preface The leased line service has long been the most important value-added service for the carrier. With the development of the IP technology and changes of the requirement of the leased line service, carriers need to carry all services uniformly over the IP network. The enterprise leased line service also needs to be carried in an IP network. Through the IP bearer network, enterprise sites interconnection, service wholesale, and data migration from the traditional ATM/TDM network to the IP network can be implemented to provide the high-quality and high value-added leased line services. 1.1 Background of the IP Leased Line Technology The Multi-protocol label switching (MPLS) technology implements high-speed data forwarding through the label over the IP network. Its value lies in that the feature of the connection mode can be used on the connectionless network and that multiple value-added mechanisms (such as the differentiated service, traffic engineering (TE), fault recovery, and path display) can be provided. This helps extend new applications flexibly and meets the new requirements. With these characteristics, the MPLS makes the high-quality and high-valued leased line services feasible. The statistics indicate that the IP-based leased line services are ever increasing, and meanwhile the ATM/TDM-based traditional leased line services are decreasing. For details, see the following figure. Enterprise Data Services Revenue, Worldwide Millions of U.S.Dollars Source: Gartner ( June 2008 ) 120, ,000 80,000 60,000 40,000 Ethernet WAN IP-VPN Legacy Packet Leased Lines Equipment Market Space 20, Figure 1-1 Revenue and development trend of the leased line of the enterprise 2

7 As shown in Figure 1-1, the IP leased line service in the enterprise data market is increasing rapidly, and the traditional ATM/TDM leased line service is decreasing very fast. In this case, carriers are all optimizing the existing network, that is, slowing down or stopping the traditional leased line service and promoting the MPLS-based IP leased line service. In the development of the MPSL-based IP leased line service, carriers, however, face a lot of troubles. During the service migration from the traditional leased line to the IP leased line, carriers need to protect the original investment, reuse the original ATM/TDM network transmission resources, and implement data migration on the network without affecting the user service. This document describes these issues in detail and also describes the smooth migration and the migration solution. 1.2 Associated Technical Standards The MPLS-based IP leased line involves the MPLS basic protocols, VPWS, VPLS, MPLS L3VPN, ATM over PSN, and TDM over PSN. The associated standards are as follows: RFC 2283-Multiprotocol Extensions for BGP-4 RFC 3107-Carrying Label Information in BGP-4 RFC 2547-BGP/MPLS VPNs RFC Pseudo Wire Emulation Edge-to-Edge RFC 4553-Structure-Agnostic Time Division Multiplexing (TDM) over Packet (SAToP) RFC 5086-Structure-Aware Time Division Multiplexed (TDM) Circuit Emulation Service over Packet Switched Network (SoPSN) 3

8 2 Technical Introduction 2.1 Layer 2 Circuit Emulation Technical Scheme Principle With the VPN service based on the MPLS network, carriers can provide the Layer 2 interconnection services based on different media on the same MPLS network, such as ATM, FR, VLAN, Ethernet, and PPP. The Layer 2 interconnection service is used to transmit the user Layer 2 data transparently on the MPLS network. From the perspective of the user, the MPLS network is a L3 switching network, and can set up Layer 2 connections between different nodes. The VLL mode and VPLS mode are mainly involved. VLL Virtual leased line (VLL) is the emulation of the traditional leased line. The IP network is used to emulate the leased line, providing the asymmetric point-to-point (PTP) interconnection service at a low cost. The VLL is a PTP virtual leased line technology, and can transmit all the user data transparently. From the perspective of users on the two ends of the virtual leased line, this virtual leased line is similar to the traditional leased line. VPLS Virtual private LAN service (VPLS) technology connects multiple Ethernet LAN network segments through the packet switched network (PSN) to make the network segments work as a LAN. The VPLS is also called transparent LAN service (TLS) or virtual private switched network service (VPSNS). Different from the ordinary L2VPN PTP service, the VPLS can help carriers provide the Ethernet-based point-to-multipoint (P2MP) service for the users through the MPLS network. Service Element The MPLS L2VPN contains three sections, AC, VC, and tunnel, as shown in the following figure. 4

9 AC VC AC Tunnel MPLS Network Figure 2-1 Basic structure of the MPLS L2VPN Attachment circuit (AC) is the access circuit. The AC is an independent link or circuit that connects the to the. The AC interface can be a physical interface or a logical interface. Attributes of the AC include interface parameters, such as the encapsulation type, maximum transmission unit (MTU), and specific link type. Virtual circuit (VC) is a logical connection between two nodes. Network tunnel is used to transmit the user data transparently. 2.2 Pseudo Wire Technical Scheme Principle PWE3 is a bearer technology that implements the end-to-end Layer 2 service bearing. It is a PTP L2VPN. Between two s on the PSN, the PWE3 takes the LDP/RSVP-TE as a signaling, and emulates various Layer 2 services of the end through the tunnel (MPLS tunnel, GRE, L2TPv3, or other types of tunnels) to implement the transparent transmission of the Layer 2 data on the end on the PSN network. The Layer 2 services include Layer 2 data packet and bit stream. Service Element The basic transmission components and functions of the PWE3 network are as follows: Attachment circuit (AC) is a link or virtual circuit that connects the and. All user packets on the AC need to be directly forwarded to the peer site, including Layer 2 and Layer 3 protocol packets. Pseudo wire (PW) is a VC plus a tunnel. The tunnel can be LSP, 5

10 L2TPv3, GRE, or TE. The virtual connection has direction. The virtual connection of the PWE3 is set up by the VC message transfer through the signaling (LDP or RSVP). The VC message and tunnel is managed to form a PW. For the PWE3 system, the PW is direct connection channel from the local AC to the remote AC to implement transparent transmission of the Layer 2 data. Forwarders select the PW for forwarding the packet after the receives the data frame sent from the AC. The forwarder is actually the forwarding table of the PWE3. Tunnels are used to bear the PW. One tunnel can bear multiple PWs. The tunnel is generally the MPLS tunnel. The tunnel is actually a direct connection channel from the local to the remote to implement transparent transmission of the data between s. Encapsulation: The packet transmitted on the PW is encapsulated through the standard PW encapsulation format and technology. There are multiple encapsulation modes for the PWE3 packet on the PW, which are defined in the draft-itef-pwe3-iana-allocation-x. Pseudo wire signaling is the basis of the PWE3. It is used to create and maintain the PW. Currently, the PW signaling protocols are mainly LDP and RSVP. Quality of service (QoS): Based on the priority carried in the Layer 2 packet header, the packet is forwarded on the network according to the QoS priority. In this case, the MPLS QoS needs to be supported. The following figure shows the location of the PWE3 basic transmission components on the network. VPN1 Site 1 C PW C VPN1 Site 2 U -AGG N VPN2 Site 1 C C VPN2 Site 2 Tunnel AC PW Figure 2-2 PWE3 basic transmission components 6

11 The PWE3 provides a Layer 2 technology for the PTP transmission. With the PWE3, the user can access the IP network smoothly without changing the original access mode, and interconnection between different access modes can be also implemented, thus implementing the service interconnection between the traditional and IP leased line services. 2.3 MPLS L3VPN Technical Scheme Principle The BGP/MPLS IP VPN is a layer 3 virtual private network (L3VPN) technology. It uses the boarder gateway protocol (BGP) to advertise the VPN route information on the IP network of the carrier and forward the VPN packet on the IP network of the carrier. Service Element The basic model of the BGP/MPLS IP VPN contains,, and P. Customer edge () provides an interface for directly connecting to the network of the service provider (SP). The can be a router, a switch, or a host. Generally, the can not sense the existence of the VPN and need not support the MPLS. Provide edge () is an edge device of the SP and connected to the directly. On the MPLS network, all the processing of the VPN is performed on the, and therefore there is a high requirement on the performance. Provide (P) is a backbone router on the SP network, and is not directly connected to the. The P device only needs to support MPLS forwarding, but does not maintain the VPN information. The following figure shows the networking of a BGP/MPLS VPN. 7

12 VPN2 Site 2 VPN1 Site 1 P P VPN2 Site 3 VPN2 Site 1 P P VPN1 Site 2 Figure 2-3 BGP/MPLS VPN model Site 1 and site 5 belong to VPN1. Site 2, site 3, and site 4 belong to VPN2. The and are divided according to the management scope of the carrier and user. The is the boarder between the management scopes of the carrier and the user. The is generally a router. After the adjacency relationship is set up between the and the that is directly connected to the, the advertises the VPN route of this node to the and learns the route to the remote VPN from the. The and exchange the route information by using the BGP/IGP and the static route can be also used. 8

13 3 Key Technologies 3.1 Leased Line Bearing Technology VPLS In the P2MP leased line service, direct interconnection between sites is required. In addition, the correlation between the carriers needs to be minimized. Therefore, the VPLS is recommended to bear the service. In the case of leased line service carried by the VPLS, to provide P2MP Layer 2 communication service, the following issues need to be considered. Prevention of the VPLS loop On the Ethernet, to prevent the loop, the Layer 2 protocols such as STP, RRPP, and REP need to be enabled. Considering the minimum correlation between the user and carrier network, the IP protocol of the user network must not be used on the carrier network, but runs only between the devices on the user network. This prevents the loop on the user network. In the VPLS, "full connection" and "spilt horizon" are used to prevent the loop. Each must create a tree to all the routers under this instance for a VPLS forwarding instance. Each router must support spilt horizon to prevent the loop. That is, the cannot forward packet between the PWs that have the same VPLS instance. Generally, in the same VPLS instance, the s are connected through the PW. Accordingly, spilt horizon means that the data packet received from the PW are not forwarded to other PWs but only forwarded to the AC. The full connection and spilt horizon between s ensure that the VPLS forwarding is reachable and free of loops. When multiple s are connected to the, or different s connected to the same VPLS VPN are connected between each other, the VPLS cannot ensure that the loop does not occur. Therefore, various mechanisms are needed to prevent the loop. User access mode User access modes can be classified into the VLAN access and 9

14 Ethernet access modes. The meanings are as follows: VLAN access: If the VLAN access mode is used, the frame header of the packet that is transmitted from the to the or from the to the carries a VLAN tag. This VLAN tag is a service boarder identifier marked for differentiating the users. It is also called Provider Tag (P-Tag). Ethernet access: If the Ethernet access mode is used, the frame header of the packet that is transmitted from the to the or from the to the does not carry a P-Tag. If the VLAN tag is carried in the frame header, it is only the inner VLAN tag in the user packet, and is called U-Tag (user-tag). The U-Tag is carried in the packet before the packet is transmitted but is not added by the during packet transmission. It is used for the to differentiate the VLAN of the packet and is of no significance for the. The user access mode in the actual scenario can be specified through the configured mode. Hierarchical VPLS (H-VPLS) The VPLS requires the full connection between the s. Therefore, the relation between the number of PWs of one VPLS instance and the number of s is the number of PWs = the number of s x (the number of s - 1)/2. In a large scale VPLS network, the number of PWs and the overhead of the PW signaling are both great. Therefore, network management and extension become complicated. To simplify the network management and improve the extensibility of the network, the H-VPLS networking is introduced. The H-VPLS divides the into U and N. The U mainly functions as the MTU when the user accesses the VPN and is used to connect the and the SP network. The N is on the edge of the core of the VPLS network and provides the transparent transmission of the user packet on the core network. The U need not set up connections with all Ns, but need to set up connections between Ns. Through hierarchy, the H-VPLS reduces the number of PWs and the load of the PW signaling. The advantages of the VPLS are as follows: The VPLS uses the Ethernet port at the user network side, which 10

15 simplifies the LAN/WAN boarder and supports the rapid and flexible service deployment. The VPLS hands over the control and management rights of route policies on the user network to the user, which simplifies the management of the carrier network. All the user router s in the VPLS service are part of the same subnet, which simplifies the IP addressing planning. The VPLS service neither need to sense nor need to participate in the IP addressing and routing. VLL/PWE3 VLL In the P2MP leased line service, direct interconnection between multiple sites is required. In addition, the correlation between the carriers needs to be minimized. Therefore, the VLL is recommended to bear the service. According to the protocols of setting up the VLL, two modes of VLLs are defined in the relevant standards: Martini mode This mode complies with RFC4762 specified by the IETF. In this mode, the LDP is used to transmit the signaling of the VC messages. In the Martini mode, the LDP remote session is set up between the s. The allocates a VC label to each link of the, and transmits the VC label to the remote through the LSP set up using the LDP. In this case, a virtual link is set up on the LSP. In this mode, an LSP between a pair of s on the carrier network can be shared to multiple virtual links. As shown in the following figure, site 1 and site 2 on VPN1 use the LSP1 and LSP2, site 1 and site 2 on VPN2 can also use LSP1 and LSP2. 11

16 VPN 1 Site 1 VLAN 10 VCI601 VPN 2 Site 2 VCI P P VLAN P P VPN 1 Site 2 VCI605 VPN Site VCI705 Figure 3-1 VLL networking in the Martini mode In the Martini mode, the on the carrier network needs to maintain a few VC labels and mapping information of the LSP. The P device needs not process any L2VPN information, and therefore the extensibility is good. In addition, when a new virtual link needs be set up, unidirectional virtual links only need to be configured on the s on the two ends. Therefore, network running is not affected. The Martini mode is applicable to the Layer 2 connection, such as star connection. Kompella mode The Kompella mode complies with FRC4761. Through the setup of the IBGP session between the s, the sites of the L2VPN are detected automatically, and the VPN information is transmitted. The L2VPN information is transmitted between the s through the extended BGP. In label allocation, the MPLS L2VPN uses the label block manner in the Kompella mode. The size of the label block is equal to the range (specified by the user) for the convenience of allocating labels to multiple connections. This mode allows the user to allocate some extra label to the VPN, which reduces the configuration workload during the VPN deployment and capacity expansion. In the Kompella mode, the vpn-target is used to differentiate the VPNs. This brings great flexibility to the VPN networking and is applicable to various VPN network topologies. Different from the MPLS L2VPN in the Martini mode, in the Kompella mode, no operation is performed for the link between the s, but the SP network is divided into different VPNs. The is numbered within the VPN. When the connection needs to be set up between 12

17 two s, the IDs of the local and the remote need only to be configured on the, and the virtual link ID allocated to the link of the local needs to be specified. Site 4 VLAN 10 VOI Site 1 VLAN 11 P P Site 3 VOI Site 2 VLAN 12 P P Site 0 Figure 3-2 VLL networking in the Kempella mode In Kempella mode, the VLL user can be reserved for configuration. When the L2VPN site needs to be added in the future, only the of the new site needs to be configured, and other s need not be configured. As shown in Figure 3-2, in the initial phase, the number of labels allocated to the s on the s is greater or equal to six, and the link to 6 is bound in advance. In this case, when site 4 is added to 6, only 6 and other s bound to 6 need to be added. The advantages of the leased line service through the VLL are as follows: High extensibility Overcoming the complexity of the extension on the traditional ATM or FR network, the MPLS VPN uses the label technology to reuse multiple virtual circuits on the same LSP. Therefore, the only needs to maintain information of one LSP, which greatly improves the extensibility of the system. Clear administrative responsibility The MPLS L2VPN carrier provides the Layer 2 connectivity, and the customer provides the L3 connectivity. Route oscillation caused by the incorrect configuration of the user does not affect the stability of the carrier network. Better security and confidentiality 13

18 The security and confidentiality equivalent to the ATM or RF VPN network are provided. The user maintains its own route information. Therefore, the carrier need not consider IP address overlay of each user, and also need not concerns about route information leakage to the private networks of other uses. This reduces the management workload of the carrier and also improves the security of the user information. Supports from multiple network protocols The carrier provides only the Layer 2 connection. The customer can use any L3 protocol, such as IP, IPv6, IPX, and SNA. Smooth evolution of the L2VPN The MPLS L2VPN is transparent to users. When the carrier upgrades the traditional L2VPN such as ATM and FR to the MPLS L2VPN, the users need not perform any reconfiguration. Except temporary data loss during the switchover, the user services are not affected. PWE3 It is recommended that you deploy the PWE3 to carry services in the traditional leased line transition scenario. Sites with various media can be interconnected through PWE3. In deploying PWE3, you need to consider different networking modes: Networking of Static-and-Dynamic Multi-Hop The static-and-dynamic multi-hop PW indicates that a static PW is set up on one end and a dynamic PW is set up on the other end. The static PW and dynamic PW can be multi-hop PWs. They, however, cannot alternate between each other. The processing of the PW on the U- and the S- is the same as the processing of the static PW or dynamic PW, but is different from the processing of the PW on the S- where the static PW and the dynamic PW meet. On the S- where the static PW and the dynamic PW meet, for the dynamic PW, the static PW can be regarded as the AC of the dynamic PW; the status change of the static PW can be regarded as the status change of the AC of the dynamic PW. The parameters such as the PW 14

19 type and interface MTU need to be specified for signaling negotiation and these parameters must be the same as those configured for the interface of the static PW. For the static PW, it is Up if a tunnel exists; for a dynamic PW, the remote PW is Up if a tunnel exists. If the type and the MTU of the remote PW have the same setting as the local ones, the dynamic PW is Up. PW Protection The PW protection indicates that when a PW fails, such as a PW tunnel is deleted, the traffic can be rapidly switched to another PW. The fast switching on the data plane thus can be implemented. As shown in the following figure: Primary PW U-1 PW1 PW5 PW4 S- PW2 PW3 U-2 PW6 PW7 PW8 S- Secondary PW Figure 3-3 Topology model of PW protection To protect the PW, you need to do the following (in the case of the multi-hop): Configure two PWs on two U-s respectively. The two PWs map each other. Configure one PW (PW5) on one U- (U-1) as the secondary PW. Configure PWs on the S-s that are passed. The PWs configured on the S-s and on the U-s thus form multihop PWs, as shown in figure Figure 3-3. Both the primary PW and the secondary PW need to negotiate and process the signaling. This is the same as the processing of ordinary dynamic multi-hop PWs. If the primary PW fails (for example, the LDP session is Down or the tunnel is deleted), the secondary PW must be immediately 15

20 informed of the fault. If the secondary PW is Up, it upgrades to a primary PW. MS-PW Generally, a PW is a Single-Segment PW, referred to as an SS-PW. The SS-PW is applied to most bearer scenarios. But some scenarios have limitations and problems. The service pressure on the core and the convergence node service is great. When the services traverse the PSN network with heterogeneous media, the tunnel cannot be established in end to end mode. When the inter-area services are required, the tunnel cannot be established in end to end mode. The capabilities of fast protection on many times of faults are low. The MS-PW can solve the above mentioned problems. Native Service (AC) < Multi-Segment Pseudowire > PSN PSN < -Tunnel- > < -Tunnel- > V V 1 V V 2 V V Native Service (AC) 1 T1 S1 T2 PW.Seg t1 PW.Seg t3 PW.Seg t2 PW.Seg t4 2 < Provider Edge 1 Provider Edge 2 < < PW switching point Emulated Service > Figure 3-4 MS-PW reference model 16

21 The preceding figure shows the MS-PW reference model. T-1 and T-2 are respectively connected to 1 and 2 and provide the end-to-the-end Layer 2 service simulation for the s. The MS-PW, traversing two or multiple PSN networks, is comprised of two or multiple PWs. When each PW is established on the tunnel of the PSN network, the switching of these PWs occurs on one or multiple S- nodes. According to the way in which the PSN tunnel is established and the switching relationship is configured on the S- node, MS-PW can be set up in the following ways: Statically configure the PW label and PW switching relationship on each T-/S-. Establish each PW dynamically and configure the PW switching relationship statically on the S- node. Establish the end-to-end MS-PW dynamically and the PW switching on the S- node is automatically completed. The configurations must support the mode 1 and mode 2 and can totally meet requirements for the MS-PW application. But the mode 3 only simplifies users' configurations and requires more protocol extensions. At present, the mode 3 has not become mature yet in the aspect of the standard. It remains at the stage of the private draft and the commercial products supporting the mode 3 have not been unveiled in the industry, in particular, in the extension for the PW reachable information advertisement. BGP/MPLS IP VPN Multiple sites are required to be directly interconnected for the scenario of the point-to-multipoint leased line services. If large scale interconnected sites faces the extension problem or the leasedline clients are not capable of maintaining the information about the Layer 3 network and the IP router, it is expected that carriers can maintain the information in place of the leased line clients and can also charge them for the value-added services. At this time it is recommended that you deploy the BGP MPLS IP VPN and provide the Layer 3 interconnection service between multiple sites. In this case, you need to consider the following: 17

22 Inter-AS VPN In the actual networking, the sites of some leased line client at multiple branches may be connected to many carriers' network with different AS numbers or to multiple ASs of one carrier (for example, multiple sites of the leased line clients are located in different MANs and different WANs distribute different AS numbers). This application mode that the VPN spans multiple autonomous systems is called inter- AS VPN (Multi-AS BGP/MPLS VPN). At present, there are three technological solutions to the above mentioned inter-as problems: VRF-TO-VRF (back-to-back mode) -ASBR1 VPN-1 VPN-1 -ASBR2 AS-X VPN-2 VPN-2 AS-Y VPN-1 Site 1 VPN-1 Site 2 VPN-2 Site 1 VPN-2 Site 2 Figure 3-5 Inter-AS BGP MPLS IP VPN Option A For an inter-as VPN client, the VPN-A needs to configure a same VPN in the -ASBR of the AS. As shown in the preceding figure, configure VPN-AS on the -ASBR-1 and the -ASBR-2, create a logic link (or a physical link) between the two ASBRs and then associate VPN-As with this link. In this networking, the ASBR, as a device, creates a same VPN on the and regards the peer ASBR as its own device. In this case, two ASs play the role as operating the MPLS VPN services in one AS. Specifically, advertise the VPN information in the AS to the ASBR ( device), and advertise the VPN information to the remote ASBR (considered as the ASBR's device). After the VPN on the ASBR receives the VPN information (considered as another device of the AS), it advertises the information to the device of the VPN AS. Finally, the VPN is advertised to the device and then the VPN 18

23 routing information is exchanged between the two ASs. MP-EBGP (single-hop MP-EBGP mode) -ASBR1 MP-eBGP -ASBR2 AS-X AS-Y VPN-1 Site 1 VPN-1 Site 2 VPN-2 Site 1 VPN-2 Site 2 Figure 3-6 Inter-AS BGP MPLS IP VPN Option B The MP-EBGP runs between two ASBRs and transmits all the VPN information of an AS to another AS. The transmitted information is about VPN routes and labels. When the MP-EBGP transmits the route, it changes the next hop of routes. According to the principle of the label distribution, when the next hop of an FEC is changed, the label must be replaced in the local ASBR. So when the ASBR receives the information about the VPN router of the AS and advertises the information, the ASBR must redistribute labels for the information about the VPN router. After the information is advertised with new labels, new and old labels form a switching operation of labels in the local ASBR. The remote ASBR receives the information about the VPN route advertised through MP-EBGP, the information is saved in the local end and continues to be advertised to the device of the ASBR AS. When this ASBR advertises the route to MP-IBGP neighbors of the AS, it can choose not to change the next hop of the route or change the next hop of the route to itself. If the next hop of the route is changed, the ASBR also needs to redistribute the labels for the VPN routes and the switching operation of labels is formed in the local ASBR, as shown in the preceding principle of the label distribution. 19

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers MPLS Innovations: The Next Phase Technology for Today s Service Providers Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular,

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information

APRICOT 2012 MPLS WORKSHOP L2VPN

APRICOT 2012 MPLS WORKSHOP L2VPN APRICOT 2012 MPLS WORKSHOP L2VPN Alastair Johnson February 2012 alastair.johnson@alcatel-lucent.com 2 MPLS WORKSHOP L2VPN 1. Introduction to L2VPN a. Background to VPNs b. Why L2VPNs c. Types of L2VPNs

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

IP/MPLS Networks for Public Safety

IP/MPLS Networks for Public Safety APPLICATION NOTE IP/MPLS Networks for Public Safety Highly reliable mission-critical communications infrastructures Abstract Alcatel-Lucent delivers a converged IP/MPLS-based network for public safety

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

The Essential Guide to Deploying MPLS for Enterprise Networks

The Essential Guide to Deploying MPLS for Enterprise Networks White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL

Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL SERVI PROVIDER Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL An overview of Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL) and Brocade solutions for deploying

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000 Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

MPLS-Enabled Network Infrastructures

MPLS-Enabled Network Infrastructures T E C H N O L O G Y W H I T E P A P E R MPLS-Enabled Network Infrastructures Delivering Reliable Enterprise VPN Services Enterprise and government CIOs will testify that lowering information technology

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Building Trusted VPNs with Multi-VRF

Building Trusted VPNs with Multi-VRF Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several

More information

What Is a Virtual Private Network?

What Is a Virtual Private Network? C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure

More information

Implementing Virtual Leased Lines Using MPLS

Implementing Virtual Leased Lines Using MPLS Lines Using MPLS able of Contents 1. Objective... 3 2. arget Audience... 3 3. Pre-Requisites... 3 4. Introduction: MPLS and IP-Based VPNs... 3 5. he Promise of MPLS Layer-2 VPNs... 5 6. unneling Layer-2

More information

Fundamentals Multiprotocol Label Switching MPLS III

Fundamentals Multiprotocol Label Switching MPLS III Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

IP/MPLS Networks for Highways

IP/MPLS Networks for Highways A P P L I C A T I O N N O T E IP/MPLS Networks for Highways Infrastructures for highly available mission-critical communications Abstract Alcatel-Lucent delivers a converged IP/MPLS-based network for highways

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

VLAN and QinQ Technology White Paper

VLAN and QinQ Technology White Paper VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Multi-Provider Ethernet Service Delivery

Multi-Provider Ethernet Service Delivery Multi-Provider Ethernet Service Delivery Ananda Rajagopal Product Manager, Service Provider Solutions Foundry Networks Agenda Multi-Provider Ethernet Service Delivery Ethernet Service Delivery Today A

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Reliable Airport IP Networks

Reliable Airport IP Networks APPLICATION NOTE Reliable Airport IP Networks MPLS enables mission-critical communications Abstract Alcatel-Lucent envisions a converged IP/MPLS-based network for airports using next-generation products

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Virtual Private LAN Service (VPLS)

Virtual Private LAN Service (VPLS) White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice #128 TECHNOLOGY WHITE PAPER Page: 1 of 6 MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice Tim Wu, Riverstone Networks ABSTRACT Since there s been data networking, there s been a debate between switched

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Solving the Access Conundrum for the All-IP Network:

Solving the Access Conundrum for the All-IP Network: Solving the Access Conundrum for the All-IP Network: Business Service Delivery Across Diverse Infrastructures London, June 27 th, 2006 Presented by: Dr. Yuri Gittik Chief Strategy Officer yuri_g@rad.com

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Agilent N2X Layer 2 MPLS VPN Emulation Software

Agilent N2X Layer 2 MPLS VPN Emulation Software Agilent N2X Layer 2 MPLS VPN Emulation Software E7884A Technical Data Sheet An easy-to-use solution specifically designed for measuring the scalability and performance of Layer 2 MPLS VPNs and pseudo wire

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

Virtual Private LAN Service

Virtual Private LAN Service Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : kireeti@juniper.net Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place

More information

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol

More information

Testing Edge Services: VPLS over MPLS

Testing Edge Services: VPLS over MPLS Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts

Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts STANDARDS TOPICS Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts Paul Knight, Nortel Networks Chris Lewis, Cisco Systems ABSTRACT Virtual private network services

More information

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

Removing Cell Demultiplexing Performance Bottleneck in ATM Pseudo Wire Emulation over MPLS Networks 1 Introduction

Removing Cell Demultiplexing Performance Bottleneck in ATM Pseudo Wire Emulation over MPLS Networks 1 Introduction 1 Removing Cell Demultiplexing Performance Bottleneck in ATM Pseudo Wire Emulation over MPLS Networks Puneet Konghot and Hao Che {pxk7783@omega.uta.edu, hche@cse.uta.edu} The Department of Computer Science

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

The Evolution of Ethernet

The Evolution of Ethernet June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction

More information

Innovation in Access and Metropolitan Area Networks -

Innovation in Access and Metropolitan Area Networks - Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

Datacom Services Description and their applications

Datacom Services Description and their applications Datacom Services Description and their applications What is data communication services? Data communication ( datacom ) is range of services that will help organise communication and data exchange between

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Independent Submission. R. Huang L. Andersson M. Chen. Huawei Technologies Co., Ltd. August 2015

Independent Submission. R. Huang L. Andersson M. Chen. Huawei Technologies Co., Ltd. August 2015 Independent Submission Request for Comments: 7625 Category: Informational ISSN: 2070-1721 J. T. Hao Huawei Technologies Co., Ltd P. Maheshwari Bharti Airtel, Ltd. R. Huang L. Andersson M. Chen Huawei Technologies

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

H3C SR8800 RPR Technology White Paper

H3C SR8800 RPR Technology White Paper H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Interconnecting Data Centers Using VPLS

Interconnecting Data Centers Using VPLS Interconnecting Data Centers Using VPLS Nash Darukhanawalla, CCIE No. 10332 Patrice Bellagamba Cisco Press 800 East 96th Street Indianapolis, IN 46240 viii Interconnecting Data Centers Using VPLS Contents

More information

EVALUATING NETWORKING TECHNOLOGIES

EVALUATING NETWORKING TECHNOLOGIES WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION

More information

Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 3. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 3 Qin Yin Fall Semester 2013 1 Outline A Brief History of Distributed Data Centers The Case for Layer 2 Extension

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Delivering Ethernet services in the Metro

Delivering Ethernet services in the Metro Delivering Ethernet services in the Metro MICHAEL S. BERGER Research Center COM Technical University of Denmark DTU Building 33, 800 Kgs. Lyngby DENMARK Abstract: - Today, Ethernet is widely deployed in

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Virtual Leased Lines - Martini

Virtual Leased Lines - Martini Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls

More information

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information