Cloud Service Delivery Architecture Solutions for Service Providers
|
|
|
- Melvin Morris
- 10 years ago
- Views:
Transcription
1 Cloud Service Delivery Architecture Solutions for Service Providers Technical Paper for Network Engineers Brocade enables service providers to transition from bandwidth providers to cloud service providers with innovative Virtual Private LAN Services (VPLS)-based cloud service delivery Wide Area Network (WAN) architecture solutions that help them unlock new revenue streams.
2 CONTENTS Contents... 2 Introduction... 3 The Challenge... 3 Brocade Cloud Service Delivery Architecture... 4 Unified Packet Transport... 4 Overview and Benefits... 4 Topologies and Sample Configurations... 5 Multitenancy... 5 Scalability... 7 Endpoint Flexibility... 7 Traffic Load Balancing and Network Resiliency... 8 Hot-Standby Paths Detour and Bypass FRR Quality of Service in the Cloud Cloud Security Cloud Service Performance, Monitoring, and SLA Summary About Brocade Cloud Service Delivery Architecture Solutions for Service Providers 2 of 23
3 INTRODUCTION Deploying cloud services requires complete consideration of the network within both the cloud data center and the service delivery network (core and metro) connecting the data center to the end users. To ensure optimal application performance and customer experience, service providers must have the ability to provide Service-Level Agreements (SLAs) for all types of services. This paper focuses on the WAN side and details how Brocade VPLS infrastructure solutions address the challenges faced by service providers and provide a unified network for advanced cloud services. THE CHALLENGE The evolution of data consumption and bandwidth needs amplifies pressures on current service provider networks. With the proliferation of smart mobile devices and powerful apps, demand for bandwidth is escalating at a rapid pace. At the same time, increased competition is driving down the price providers can charge for bandwidth services. This leads to a revenue gap that challenges service provider profitability. Figure 1. The challenge for service providers. The evolution of data consumption and bandwidth needs amplifies pressures on current service provider networks. With the proliferation of smart mobile devices and powerful apps, demand for bandwidth is escalating at a rapid pace. At the same time, increased competition is driving down the price providers can charge for bandwidth services. This leads to a revenue gap that challenges service provider profitability. Service providers that have their own service delivery network are at an advantage; they can deliver cloud services via their WAN, providing end-to-end service-level guarantees. In addition they can leverage their geographic proximity to the end customer through their Point of Presence/Network Access Points to push content and latency-sensitive application services to the edge of their network, close to the customer. The data center is the new service delivery point, and moving data centers to the service edges helps to reduce backhaul and deliver latency-sensitive, interactive, and location-based services. With a service delivery network and distributed data centers, service providers can alleviate one of their main challenges significant bandwidth consumption across their network. Without a reliable and high-performance networking infrastructure to deliver services to end customers, there would be no public cloud service offerings. The unification of the service edge with the data center, the increasing role of virtualization, and the rise of Software-Defined Networking all allow the development of a new flexible and agile framework to deliver services to a provider s clients. With their data centers and network infrastructure, service providers can deliver end-to-end cloud services with SLAs from access to the data center. Cloud Service Delivery Architecture Solutions for Service Providers 3 of 23
4 BROCADE CLOUD SERVICE DELIVERY ARCHITECTURE To satisfy clients requirements, cloud providers must have a WAN infrastructure to their data centers that includes a unifying packet transport vehicle that can guarantee cloud Quality of Service (QoS), security, and SLAs, while maintaining high-quality service performance and monitoring. Each of these needs has its challenges. Within the WAN infrastructure, the primary focus a service provider must have is around unifying packet transport technologies into a single coherent network with consolidated, centralized application management and control. Addressing issues like scalability with technologies like 100 Gigabit Ethernet is a crucial part of this solution as well. Unified Packet Transport As service providers move their data centers closer to their customers, the need for scalable, seamless, and unified solutions to interconnect their geographically distributed data centers and deliver services to end users takes on more and more importance. Brocade Multiprotocol Label Switching (MPLS) VPLS is a scalable multitenancy solution targeting data center interconnection and WAN service delivery. Because it is built on top of MPLS, VPLS inherits all the benefits of MPLS, including Traffic Engineering (TE), QoS, Fast Reroute (FRR) and hot-standby Label Switch Paths (LSPs) for quick restoration from any disruptions, and more. VPLS provides fully resilient, multipoint transport of traffic between geographically distributed data centers, allowing for interconnection via one single VPLS domain. Overview and Benefits The networking infrastructure requirements for a service provider network to provide VPLS-based data center interconnection services are quite simple. The service provider network should support Provider Edge-to-Provider Edge (PE-to-PE) IP/MPLS. Options for doing so include either Label Distribution Protocol (LDP) or Resource Reservation Protocol (RSVP). To take advantage of the high availability provided by FRR and PE-to-PE traffic load balancing capability utilizing RSVP, Brocade recommends RSVP support in the service provider s core network. In a Brocade VPLS solution, targeted LDP is used for PE-to-PE signaling. To avoid traffic loops in the service provider network, all the PEs in the same VPLS instance are required to form fully-meshed targeted LDP peering. Traffic received from other PEs is only forwarded to the local customer and never to other PEs. Each VPLS domain is globally identified by a unique Virtual Circuit ID (VC-ID), which should be the same across all PEs. Each PE allocates a label (called the VC label) for each VPLS instance and distributes it to all peered PEs within the same VPLS domain. Interconnection with customer sites and data centers is simple as well. The Brocade VPLS solution has minimal impact on the existing networking infrastructure for both the service provider and the customer. The customer requires only a single Ethernet port to connect to the cloud service provider, and the provider does not need to overhaul their network to serve a new range of customers. The Brocade interface-based implementation of VPLS Virtual LAN (VLAN) isolates the customer s VLAN space from the service provider s VLAN space. In addition to this transparency, the Brocade VPLS solution has the following major advantages for cloud service providers: Multitenancy Scalability Endpoint Flexibility Traffic Load Balancing Network Resiliency Cloud Service Delivery Architecture Solutions for Service Providers 4 of 23
5 Topologies and Sample Configurations Figure 2. An example of VPLS deployment Multitenancy To support the multitenancy requirements of a cloud environment, the Brocade MPLS VPLS solution provides extensive multitenancy capabilities, with a single Brocade MLXe supporting 16K MPLS VPLS instances. An individual customer can be served with either single or multiple VPLS instances, depending on its specific requirements. VLAN spaces from different customers are completely isolated from each other in the service provider network, as well as isolated from the service provider itself. Figure 2 depicts a very basic IP/MPLS network deployment that provides Layer 2 VPLS services to customers. Both Customer A and Customer B are spread across three different physical locations. The same service provider serves both customers and interconnects all their sites together. Customer A has two data centers: one connects to the service provider s PE3, and the other connects to PE4. Customer A also has a site connecting to PE2, from which some users need to access the two data centers. Customer B s setup is almost the same, except that one of its data centers is connected to the service provider s PE1 instead of PE3 like Customer A. VPLS RED is configured for Customer A, while VPLS BLUE is configured for Customer B. Assume that VLAN 400 is for Customer A and VLAN 500 is for Customer B. The loopback addresses for PE1, PE2, PE3, and PE4 are /32 respectively. The sample configurations for PE1, PE2, PE3 and PE4 are: Cloud Service Delivery Architecture Solutions for Service Providers 5 of 23
6 ON PE1: Interface loopback 0 ON PE2: ip address /32 vpls-peer vlan 500 tag interface eth1/1 Interface loopback 0 ip address /32 vpls-peer vlan 400 tag interface eth1/2 vpls-peer vlan 500 tag interface eth1/1 ON PE3: Interface loopback 0 ON PE4: ip address /32 vpls-peer vlan 400 tag interface eth1/1 Interface loopback 0 ip address /32 vpls-peer vlan 400 tag interface eth1/2 vpls-peer vlan 500 tag interface eth1/1 Configuration 1. Cloud Service Delivery Architecture Solutions for Service Providers 6 of 23
7 Scalability In large networks, hundreds of thousands of MAC addresses may have to be maintained, leading to the need for large MAC address tables on each PE device. For even greater scalability, VPLS can be integrated with Provider Backbone Bridging (PBB) at the edge, to provide isolation between customer MAC addresses and provider core MAC addresses. Brocade ensures scalability through the Brocade MLXe Series platform, with support for up to 16K VPLS instances and 1 million MAC addresses. Endpoint Flexibility The Brocade MPLS VPLS solution provides flexible endpoint definitions: untagged access endpoints, single.1q tagged endpoints, and dual-tagged endpoints. In the Brocade solution, the proper.1q tag is added or removed from the end user s traffic before the Ethernet frame is forwarded back to customers, based on the endpoint type configured. The Brocade VPLS implementation also offers VLAN translation functionality. The VLANs for different VPLS endpoints in the same VPLS domain can be different, and VPLS can seamlessly translate the VLAN to match the configuration of local VPLS endpoints. This provides a high degree of flexibility to match different VLAN allocations and configurations across different sites from the same customer. For example, in the scenario for Configuration 1, you can assume all connections from the service provider to its customers are.1q ports. However, instead of single-tagged interfaces, now assume that Customer A connects to the service provider s PE3 via an untagged access interface, and Customer B connects to PE1 via a dual-tagged interface with the inner VLAN as 300. Assuming the other configurations stay the same, the configurations on PE1 and PE3 will change to: ON PE1: ON PE2: Interface loopback 0 ip address /32 vpls-peer vlan 500 inner-vlan 300 tagged interface eth1/1 Interface loopback 0 ip address /32 vpls-peer vlan 400 tag interface eth1/2 vpls-peer vlan 500 tag interface eth1/1 Cloud Service Delivery Architecture Solutions for Service Providers 7 of 23
8 ON PE3: Interface loopback 0 ip address /32 vpls-peer vlan 400 untagged interface eth1/1 ON PE4: Interface loopback 0 ip address /32 vpls-peer vlan 400 tag interface eth1/2 vpls-peer vlan 500 tag interface eth1/1 Configuration 2. Traffic Load Balancing and Network Resiliency Brocade VPLS supports load balancing across multiple tunnel LSPs from PE-to-PE. The multiple LSP paths can actively share the traffic carried between the PEs. The LSPs can be configured with primary and hot-standby paths. A failure of the primary path triggers failover to the hot-standby path. Failure detection can be done using RSVP messages. If very fast detection is desired, Bidirectional Failure Detection (BFD) can also be enabled. Cloud Service Delivery Architecture Solutions for Service Providers 8 of 23
9 Figure 3. VPLS Service Provider Network. To elaborate on Brocade PE-to-PE solutions for VPLS load balancing and tunnel LSP resiliency, Figure 3 continues with the same deployment scenario as Figure 2, with additional details about the service provider network. Four fullmeshed P routers are in the service provider core, and each PE router connects to two of the four P routers for physical link redundancy. Each router has a loopback0 interface configured with an IP address x/32, in which x is the router number. For example, PE1 s loopback0 has IP address /32, and P5 s loopback0 has /32. The links between routers are configured with subnet 10.1.xy/24 respectively, in which x and y are the router number, with x as the smaller of the two. The link between routers PE1 and P5 is configured with subnet /24. Interface e2/1 of PE1 is configured with IP address /24, and interface e2/1 of P5 is configured with IP address /24. The whole service provider network follows the same rule for IP address configuration. In order to allow service providers to optimize their networks, Brocade supports multiple methods of VPLS load balancing on PEs. Load balancing can be achieved in two ways: through dynamic load balancing across multiple eligible tunnel LSPs, or by statically specifying a set of tunnel LSPs for a VPLS peer. With the example in Figure 3, assume four tunnel LSPs are configured from PE2 to PE4, and vice versa: From PE2 to PE4 LSP_PE2_P5_P7_PE4 LSP_PE2_P5_P8_PE4 LSP_PE2_P6_P7_PE4 LSP_PE2_P6_P8_PE4 From PE4 to PE2 LSP_PE4_P7_P5_PE2 LSP_PE4_P7_P6_PE2 LSP_PE4_P8_P5_PE2 LSP_PE4_P8_P6_PE2 Cloud Service Delivery Architecture Solutions for Service Providers 9 of 23
10 Between PE2 and PE4, both VPLS RED and VPLS BLUE are configured, and there exist four tunnel LSPs in both directions. Traffic between PE2 and PE4 of VPLS RED and BLUE can be configured to dynamically load balance across the four tunnel LSPs. The configurations required for PE4 are: On PE4: path Path_PE4_P7_P5_PE2 strict strict strict strict exit path Path_PE4_P7_P6_PE2 strict strict strict strict exit path Path_PE4_P8_P5_PE2 strict strict strict strict exit path Path_PE4_P8_P6_PE2 strict strict strict strict exit lsp LSP_PE4_P7_P5_PE2 from to primary-path Path_PE4_P7_P5_PE2 lsp LSP_PE4_P7_P6_PE2 from to primary-path Path_PE4_P7_P6_PE2 lsp LSP_PE4_P8_P5_PE2 from to primary-path Path_PE4_P8_P5_PE2 Cloud Service Delivery Architecture Solutions for Service Providers 10 of 23
11 lsp LSP_PE4_P8_P6_PE2 from to primary-path Path_PE4_P8_P6_PE2 vpls-peer vpls-peer load-balance vlan 400 tag interface eth1/2 vpls-peer vpls-peer load-balance vlan 500 tag interface eth1/1 Configuration 3. The configurations for PE2 are very similar to the configurations for PE4. Brocade also provides configurable granularity to control which tunnel LSPs can be used to carry PE-to-PE traffic for a specific VPLS instance. In the Configuration 3 example, if the service provider wants to use two out of the four tunnel LSPs between PE2 and PE4 to carry traffic for VPLS RED and the other two for VPLS BLUE, this can easily be achieved by adding the following configurations: On PE2: On PE4: vpls-peer lsp LSP_PE2_P5_P7_PE4 LSP_PE2_P6_P8_PE4 vpls-peer lsp LSP_PE2_P5_P8_PE4 LSP_PE2_P6_P7_PE4 vpls-peer lsp LSP_PE4_P7_P5_PE2 LSP_PE4_P8_P6_PE2 vpls-peer lsp LSP_PE4_P8_P5_PE2 LSP_PE4_P7_P6_PE2 Configuration 4. In addition to providing the capability to support multiple tunnel LSPs between two VPLS peers for the same VPLS instance, Brocade supports two LSP options to provide flexibility for service providers: hot-standby LSP and FRRprotected LSP for PE-to-PE path failure protection. Both hot-standby LSP and FRR-protected LSP require the RSVP LSPs to be the tunnel LSPs. To provide PE-to-PE network resiliency, either hot-standby LSP or FRR-protected LSP is recommended. Hot-Standby Paths An RSVP LSP can be configured with one primary path and multiple secondary paths. By default, any secondary path is signaled and established only when the primary path fails. However, to eliminate service outages, this default behavior can be changed by configuring it to signal and establish the secondary path at the same time as the Cloud Service Delivery Architecture Solutions for Service Providers 11 of 23
12 primary path. When the primary path failure is detected, the already established secondary path takes over within sub-50ms. In such a scenario, the secondary path is operating in hot-standby mode. LSP with a hot-standby secondary path can be another option that is used in the Configuration 3 example to achieve VPLS PE-to-PE tunnel LSP high availability between PE2 and PE4. Instead of having four LSPs from PE2 to PE4, two RSVP LSPs are configured between each, with a primary path and a hot-standby secondary path. Hot-standby paths can also provide the following advantages simultaneously: Concurrent routing and MPLS label switching over the same links MPLS LSP signaling protocols: RSVP-TE, LDP Traffic Engineering link state database protocols: OSPF-TE, ISIS-TE Distribution of IP, L3VPN, and L2VPN traffic across multiple LSPs for load balancing and redundancy MPLS over LAG interfaces Configurable tunnel experimental bits (EXP) or mapping from customer packet priority Priority queuing and scheduling based on EXP at each LSR to ensure service differentiation MPLS OAM: LSP Ping and Traceroute LSP liveliness monitoring with BFD Continuing with the example, VPLS RED and VPLS BLUE are both configured to use one of the two LSPs. VPLS RED uses LSP PE2_PE4_RED with primary path Path_PE2_P5_P7_PE4 and secondary path Path_PE2_P6_P8_PE4. VPLS BLUE uses LSP PE2_PE4_BLUE with primary path Path_PE2_P6_P7_PE4 and secondary path Path_PE2_P5_P8_PE4. On PE2: lsp PE2_PE4_RED from to primary-path Path_PE2_P5_P7_PE4 secondary-path Path_PE2_P6_P8_PE4 standby lsp PE2_PE4_BLUE from to primary-path Path_PE2_P6_P7_PE4 secondary-path Path_PE2_P5_P8_PE4 standby vpls-peer vpls-peer load-balance vpls-peer lsp PE2_PE4_RED vlan 400 tag interface eth1/2 vpls-peer Cloud Service Delivery Architecture Solutions for Service Providers 12 of 23
13 On PE4: vpls-peer load-balance vpls-peer PE2_PE4_BLUE vlan 500 tag interface eth1/1 lsp PE4_PE2_RED from to primary-path Path_PE4_P7_P5_PE2 secondary-path Path_PE4_P8_P6_PE2 standby lsp PE4_PE2_BLUE from to primary-path Path_PE4_P7_P6_PE2 secondary-path Path_PE4_P8_P5_PE2 standby vpls-peer vpls-peer load-balance vpls-peer lsp PE4_PE2_RED vlan 400 tag interface eth1/2 vpls-peer vpls-peer load-balance vpls-peer PE4_PE2_BLUE vlan 500 tag interface eth1/1 Configuration 5. Hot-standby paths are one LSP option for service providers in the Brocade VPLS solution; detour and bypass FRR is another option. Detour and Bypass FRR Using FRR-protected LSPs is another option for load balancing and network resiliency that Brocade supports. The flagship Brocade MLXe platform provides line-rate label switching of any number of LSPs and numerous optimizations for higher scalability and faster performance, including RSVP Refresh Reduction, Message Bundling, prioritized processing for FRR-protected paths, and CPU offload for BFD, among others. Cloud Service Delivery Architecture Solutions for Service Providers 13 of 23
14 Figure 4. Number of LSPs switched to a FRR path. Unlike RSVP LSP with a hot-standby secondary path to protect the full path, FRR provides more granular control for protecting any segments of an LSP path. FRR on Brocade MPLS provides both one-to-one detour backup and manyto-one bypass facility backup options. When FRR is enabled on an LSP, it defaults to detour backup. If facility backup is desired, you can enable it by entering the facility-backup keyword in FRR configuration mode. Assume, in the Configuration 3 example, that detour backup is desired for tunnel LSPs for both VPLS RED and VPLS BLUE. The necessary configuration to achieve this is: On PE2: lsp PE2_PE4_RED from to primary-path Path_PE2_P5_P7_PE4 frr lsp PE2_PE4_BLUE from to primary-path Path_PE2_P6_P8_PE4 frr vpls-peer vpls-peer lsp PE2_PE4_RED vlan 400 Cloud Service Delivery Architecture Solutions for Service Providers 14 of 23
15 tag interface eth1/2 vpls-peer vlan 500 vpls-peer PE2_PE4_BLUE tag interface eth1/1 Configuration 6. When detour FRR is configured on an LSP, an automatic process is triggered to set up protecting LSP on each node along the LSP path, except for the LSP exiting node, since these are potentially Points of Local Repair (PLR) for the protected LSP. On each potential PLR, a detour path is automatically calculated and signaled with the following priority order: 1. A detour path to next-next-hop along the protected LSP path to protect the link and next node. 2. If the above cannot be set up, fall back to a detour path to next-hop along the protected LSP path to protect the link only. 3. If both of above cannot be set up, fall back to a detour path to next-next-next-hop along the protected LSP until the LSP exiting node is reached. Figure 5. Detour FRR-Protected Tunnel LSP. Cloud Service Delivery Architecture Solutions for Service Providers 15 of 23
16 Figure 5 depicts how the tunnel LSP used by VPLS BLUE is protected by detour FRR. The solid blue line is the protected tunnel LSP with path PE2-P6-P8-PE4. The three dotted arrow lines are the detour paths automatically set up by PE2, P6, and P8, which are potential PLR along the protected tunnel LSP path. As the diagram illustrates, PE2 and P6 both set up their detour paths as ending at their next-next-hops (P8 for PE2 and PE4 for P6) along the protected LSP path. P8 sets up its detour path to the next hop, since its next hop is actually the exiting node for the protected LSP. The configuration for bypass FRR involves a little more manual configuration on potential PLR along the protected LSP path. In the Configuration 6 example, if bypass FRR is desired instead of detour FRR, then in order to achieve the same protection as depicted in Figure 5, the configurations on PE2, P6, and P8 should change to: On PE2: path Path_PE2_P5_P8 strict strict strict exit lsp PE2_PE4_BLUE from to primary-path Path_PE2_P6_P8_PE4 frr facility-backup bypass-lsp BLUE_bypass primary-path Path_PE2_P5_P8 exclude-interface e2/1 vpls-peer vpls-peer PE2_PE4_BLUE vlan 500 tag interface eth1/1 On P6: path Path_P6_P7_PE4 strict strict strict exit bypass-lsp BLUE_bypass primary-path Path_P6_P7_PE4 exclude-interface e2/5 Cloud Service Delivery Architecture Solutions for Service Providers 16 of 23
17 On P8: path Path_P8_P7_PE4 strict strict strict exit bypass-lsp BLUE_bypass primary-path Path_P8_P7_PE4 exclude-interface e2/1 Configuration 7. The exclude interface specifies the protected physical link on PLR, which should not be included in the path of a bypass LSP. Another benefit of FRR has to do with adaptive LSPs. Brocade has extended FRR protection support to an adaptive LSP, which enables on-the-fly configuration changes on an established LSP. When configuration changes are implemented on an adaptive LSP, the LSP is re-signaled in a make-before-break fashion to avoid traffic disruption. Adaptive LSPs can be enabled simply by adding the keyword adaptive to the LSP. For example: lsp PE2_PE4_RED from to primary-path Path_PE2_P5_P7_PE4 adaptive frr By supporting both hot-standby paths and detour and bypass FRR, Brocade enables service providers to optimize their networks based on their customers needs. When implementing a cloud service delivery architecture, providers must make sure that the solution not only enacts a unified transport for cloud services, but also addresses considerations like QoS, SLAs, security, and performance and monitoring techniques. Quality of Service in the Cloud In a service provider cloud network, the capability of supporting end-to-end Quality of Service (QoS) is as important as the capability of differentiating various customers traffic and servicing separately. The Brocade QoS implementation provides the capability to honor a customer s 802.1p Priority Code Point (PCP) setting end-to-end. The PCP value of the incoming customer s frames can be mapped to MPLS experimental (EXP) bits on the ingress PE, and the MPLS EXP can also be mapped back to the PCP value on the egress PE. In Brocade QoS architecture, decode-map is used to map packet priority (Differentiated Services Code Point [DSCP], PCP, or EXP) of incoming traffic to an internal priority, while encode-map is used to set the packet priority (DSCP, PCP, or EXP) for outgoing traffic. Customized decode-map and encode-map can be defined globally or on a specific interface if the default map settings are not desired. Cloud Service Delivery Architecture Solutions for Service Providers 17 of 23
18 For details on Brocade QoS architecture and default map setting, please refer to chapter 14, Configuring Quality of Service for the Brocade NetIron XMR and Brocade MLX Series, in the Brocade NetIron configuration guide at this link: ConfigGuide.pdf Here is a sample configuration to define customized decode-map and encode-map: Table 1. Decode-map and encode-map customization. Map Type Sample Configuration Explanation PCP decode-map PCP encode-map qos-mapping pcp decode-map Customer_decode pcp-value 7 to priority 3 drop-precedence 2 qos-mapping pcp decode-map Customer_encode priority 7 drop-precedence 2 to pcp-value 3 Mapping an incoming frame with PCP 7 to internal priority 3 and drop-prec 2 (optional) Mapping an internal priority 7 and drop-prec 2 to PCP 3 on an outgoing frame The decode MPLS VPLS can operate in two different VC modes: tagged mode and raw mode. This gives service providers the flexibility to choose one or the other per VPLS instance, based on a customer s requirements, enabling service providers to support multiple customer requirements in the same network. The setting of PCP values of outgoing frames on the egress PE is a little different for the two different modes. VPLS tagged mode enables the preservation of the VLAN tag information in the payload. In VPLS tagged mode, the VLAN priority of the original (incoming) packets is carried across the MPLS cloud to remote peers. On the ingress PE, the mapping of PCP values to internal priority and MPLS EXP is as follows: Untagged endpoint: PCP is defaulted to 0 if no other priority setting is in effect (e.g., port priority). Single-/Dual-tagged endpoint: The PCP of the outer VLAN contributes to the internal priority. The mapping of incoming PCP values to internal priority is controlled by PCP decode-map. The internal priority is mapped to EXP of the outgoing packets based on EXP encode-map. In VPLS tagged mode, the inner VLAN is carried in the payload all the way to the egress PE. The PCP value of the inner VLAN is the same as the one carried in the payload, which is the same as the originally incoming customer s PCP setting on the ingress PE. On the ingress PE in tagged mode, the PCP value in the MPLS cloud payload is set as the following: Single-tagged endpoint: the PCP value of the incoming VLAN. Dual-tagged endpoint: the PCP value of the inner VLAN. Untagged endpoint: the PCP value is set to 0. VPLS raw mode behaves differently. By default, VPLS packets are sent to remote peers over the MPLS cloud in raw mode. This means that no VLAN tag information in the payload is carried across the MPLS cloud. On the egress PE in raw mode, the EXP of the VC label are mapped to the PCP values of all VLAN tags (single- or dual-tagged endpoint) for outgoing frames. In the MPLS cloud, the packets are differentiated and serviced based on different EXP values. On VPLS ingress PE, two labels are pushed on top of the incoming legacy Ethernet frame: an inner VC label and an outer tunnel label. The packet s priority resides in the EXP field of the MPLS label header. The VC label and the tunnel label carry the same Cloud Service Delivery Architecture Solutions for Service Providers 18 of 23
19 value in the EXP field. On each LSR, the EXP are propagated according to the EXP decode-map and encode-map settings. The EXP value in the tunnel label controls the QoS behavior on all intermittent LSRs, until the penultimate LSR, on which the tunnel label is popped and the VC label is exposed. The egress PE sees only the VC label, so the EXP value on the VC label is in effect. On the ingress PE, in addition to mapping the customer s PCP values on the incoming frame to EXP of the outgoing MPLS packets, Brocade also provides the following options: Assign a Class of Service (CoS) value for the VPLS instance at the time of configuration. In this method, the ingress PE router overrides the priority of an incoming frame and selects a tunnel LSP with a CoS value that matches what was configured for the VPLS instance. If the incoming frame is untagged, the router can also be configured to assign a priority to the port to determine the CoS value for an incoming untagged Ethernet frame. The priority of a port can be configured from 0 to 7, with a default value of 0. In an MPLS cloud, transit PE routers and ingress/egress PE routers give an appropriate priority to frames marked with a higher CoS value when making scheduling and congestion-handling decisions. With routers on all segments of service delivery maintaining QoS, customers can be assured that their data and services will be handled properly anywhere in the network. Cloud Security As applications, data, and user identity are stretched from a company-specific domain to a provider domain that may be spread out among different organizations in a cloud computing environment, a number of security concerns arise. These issues fall into three broad categories: user authentication policies for customers at the edge, network security policies faced by cloud providers (organizations providing Software-, Platform-, or Infrastructure-as-a-Service via the cloud), and application security and availability. Brocade provides a comprehensive suite of security solution support, ranging from authentication to network to applications. These include user authentication solutions based on Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access Control System Plus (TACACS+), and Secure Shell (SSH). These solutions allow for authentication, authorization, and accounting management for users and computers to connect to and use a network service. Table 2. Security Policies Security Policies for Customers or Tenants TACACS+ RADIUS SSH Security Policies for Network Access MDS authentication Password authentication Flow security policies Access Control Lists Virtual Routing and Forwarding (VRF) tables VLANs Security Policies for Hosted Applications DDoS mitigation SYN attacks Spam mitigation SSL Certificate Management There are several types of Distributed Denial of Service (DDoS) attacks, including brute force flooding attacks and protocol-based attacks such as Smurf, ping of death, TCP SYN, and TCP blind reset. See Table 4 for more information. Cloud Service Delivery Architecture Solutions for Service Providers 19 of 23
20 Table 3. DDoS attacks. Brute Force Flooding Attacks Attacks are aimed at consuming a finite resource such as CPU bandwidth or a limited amount of buffer space in the system. Protocol-Based Attacks Attacks on TCP vulnerabilities include SYN flood, ACK flood, reset attack, and XMAS tree attack. Attacks on ICMP include Smurf attack, ping flood, and ping of death. Attacks based on fragmentation include teardrop attack and ping of death. DNS-based DDoS attacks include DNS amplification attack. Brocade provides rich solutions to protect against different types of security attacks such as Transmission Control Protocol (TCP)-based attacks (such as TCP SYN) and Internet Control Message Protocol (ICMP)-based attacks (such as Smurf). To protect against TCP-based attacks, Brocade devices are configurable to drop TCP SYN packets when excessive numbers are encountered. Threshold values can be set for TCP SYN packets that are targeted at the device, which can be dropped when the thresholds are exceeded, as shown in this example: Brocade(config)# ip tcp burst-normal 10 burst-max 100 lockup 300 The number of incoming TCP SYN packets per second is measured and compared to the threshold values, as follows: If the number of TCP SYN packets exceeds the burst-normal value, the excess TCP SYN packets are dropped. If the number of TCP SYN packets exceeds the burst-max value, all TCP SYN packets are dropped for the number of seconds specified by the lockup value. When the lockup period expires, the packet counter is reset and measurement is restarted. In the above example, if the number of TCP SYN packets received per second exceeds 10, the excess packets are dropped. If the number of TCP SYN packets received per second exceeds 100, the device drops all TCP SYN packets for the next 300 seconds. Brocade also provides enhanced TCP security functionality to protect against other types of TCP-based security attacks, such as TCP blind reset and TCP data injection attacks. This functionality can be enabled by simply adding one line of configuration: Brocade(config)# ip tcp tcp-security In addition to TCP-based attacks, ICMP-based attacks, such as Smurf attacks, are also great threats to cloud security. Brocade products are configurable to protect against Smurf attacks as well: Brocade(config)# no ip directed-broadcast Brocade(config)# ip icmp burst-normal 5000 burst-max lockup 300 By disabling IP-directed broadcasts, you can avoid being an intermediary in a Smurf attack, while monitoring and limiting ICMP bursts can prevent you from being a victim of such attacks. Brocade also provides Reverse Path Forwarding (RPF) checks for all traffic that can be enabled either globally or at the interface level. RPF can be configured to reduce IP address spoofing, providing enhanced security for service providers. With the rich security feature set that is part of Brocade solutions, cloud providers can ease customers concerns and protect the sanctity of their data from a wide range of potential security threats. Cloud Service Delivery Architecture Solutions for Service Providers 20 of 23
21 Cloud Service Performance, Monitoring, and SLA Cloud service providers need to have fault detection, verification, and isolation of cloud services throughout the network at every level, while simultaneously providing proactive detection of service degradation. OAM tools such as 802.1ag Connectivity Fault Management (CFM) are a standards-based approach to tracking a high level of care for these services. Service fault detection and verification can be achieved through performance monitoring and SLA verification techniques such as Y Figure 6. Available OAM tools. Brocade provides standards-based comprehensive end-to-end OAM tools such as 802.1ag CFM, compliant stack with support for Continuity Check Messages (CCM), LinkTrace, and Loopback messages. Hierarchical service monitoring for cloud services is supported at every level for both Maintenance Intermediate Point (MIP) and Maintenance End Point (MEP), covering all seven maintenance domain (MD) levels within a maintenance association. These cloud fault detection service supports are available through the entirety of the cloud network, including the customer endpoints and service endpoints with flexible support for Layer 2 VLANs, Layer 3 interfaces, and MPLS endpoints. Figure 7. Hierarchical service monitoring. Cloud Service Delivery Architecture Solutions for Service Providers 21 of 23
22 Brocade performance monitoring through Y.1731 allows for real time hardware-based statistics based on Frame Delay and Frame Delay Variation per service, as specified by the maintenance points. The Brocade real-time monitoring technique uses a four-way timestamp mechanism for true roundtrip delay between the cloud customer and the service location within the provider data center. Figure 7 shows an example of a hierarchical OAM in case MPLS VPLS is configured in the service provider network as the data center interconnection for the customer network. A level 5 MD is configured for customer-to-customer service monitoring, and a level 3 MD is configured for service provider CE-facing PE-to-PE service monitoring. The configurations are: On CE1: cfm-enable domain-name customer id 5 level 5 ma-name ma100 id 100 vlan-id 500 priority 4 ccm-interval 1-second mep 1 down port ethe 1/1 On CE2: cfm-enable domain-name customer id 5 level 5 ma-name ma100 id 100 vlan-id 500 priority 4 ccm-interval 1-second mep 12 down port ethe 1/1 On PE1: cfm-enable domain-name SP id 4 level 4 ma-name ma100 id 100 vpls-id 200 priority 4 ccm-interval 100-ms mep 3 up vlan 500 port ethe 1/1 domain-name customer id 5 level 5 ma-name ma100 id 100 vpls-id 200 priority 4 On PE2: cfm-enable domain-name SP id 4 level 4 ma-name ma100 id 100 vpls-id 200 priority 4 ccm-interval 100-ms mep 5 up vlan 500 port ethe 1/1 domain-name customer id 5 level 5 ma-name ma100 id 100 vpls-id 200 priority Configuration 8. A complete WAN cloud service delivery solution offers dependable performance and monitoring techniques, as well as guaranteeing cloud QoS, security, and SLAs. The Brocade VPLS solution provides all this through a unified transport solution that interconnects a provider s data centers and delivers cloud services to its customers. Cloud Service Delivery Architecture Solutions for Service Providers 22 of 23
23 SUMMARY Service providers need a complete cloud solution to combat the revenue gap and network strain that they face today. With Brocade VPLS-based cloud service delivery architecture solutions for their WAN infrastructure, providers can implement a scalable and transparent network with high resiliency and load balancing, enabling providers to differentiate themselves and fortify their position against increased competition. By virtue of its heritage and technology leadership in both the data center and service provider markets, Brocade is uniquely qualified to help service providers deploy cloud-optimized networks and build out their cloud infrastructures. Brocade VPLS cloud service delivery architecture solutions and Brocade CloudPlex with Ethernet Fabrics offer an attractive end-to-end option for service providers to increase scalability, business agility, and resiliency in their network while focusing on cost efficiency as they make the transition from connectivity provider to cloud provider. See the Brocade NetIron Configuration Guide for more details. ABOUT BROCADE Brocade (Nasdaq: BRCD) networking solutions help the world s leading organizations transition smoothly to a world where applications and information reside anywhere. This vision is realized through the Brocade One strategy, which is designed to deliver key business benefits such as unmatched simplicity, non-stop networking, application optimization, and investment protection. Innovative Ethernet and storage networking solutions for data center, campus, and service provider networks help reduce complexity and cost while enabling virtualization and cloud computing to increase business agility. To help ensure a complete solution, Brocade partners with world-class IT companies and provides comprehensive education, support, and professional services offerings. ( Brocade Communications Systems, Inc. All Rights Reserved. 08/12 GA-TB ADX, Brocade, Brocade Assurance, Brocade One, the B-wing symbol, DCX, Fabric OS, ICX, MLX, SAN Health, VCS, and VDX are registered trademarks, and AnyIO, HyperEdge, MyBrocade, NET Health, OpenScript, and The Effortless Network are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of their respective owners. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. Cloud Service Delivery Architecture Solutions for Service Providers 23 of 23
Cloud Service Delivery Architecture Solutions for Service Providers
WHITE PAPER www.brocade.com SERVICE PROVIDER Cloud Service Delivery Architecture Solutions for Service Providers White Paper for Network Managers Brocade enables service providers to transition from bandwidth
DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Scalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Multi-Chassis Trunking for Resilient and High-Performance Network Architectures
WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL
SERVI PROVIDER Technical Brief: Offering Scalable Layer 2 Services with VPLS and VLL An overview of Virtual Private LAN Service (VPLS) and Virtual Leased Line (VLL) and Brocade solutions for deploying
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
The Business Case for Software-Defined Networking
WHITE PAPER The Business Case for Software-Defined Networking Brocade enables customers a means of reducing costs of service delivery through Software-Defined Networking (SDN) technologies. In addition,
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform
Delivering MPLS VPLS VPN Services With Metro Service Edge Platform Objective This paper outlines the overall network architecture and elements for delivering MPLS VPLS VPN services by extending MPLS (Multiprotocol
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Testing Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
W H I T E P A P E R. Security Features of the 7705 Service Aggregation Router
W H I T E P A P E R Security Features of the 7705 Service Aggregation Router NOV, 2009 Table of Contents 1 Executive Summary... 3 2 ITU-T x.805 Security Architecture... 4 3 7705 SAR Security Feature Summary...
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Multitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.
L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet. Petr Grygárek rek 1 Layer 2 VPNs 2 Usages of L2 VPNs Server farms/clusters and other L2- dependent applications redundancy and
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine
Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Protection Methods in Traffic Engineering MPLS Networks
Peter Njogu Kimani Protection Methods in Traffic Engineering MPLS Networks Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information technology Thesis 16 th May 2013 Abstract
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Brocade SDN/OpenFlow. Norival Figueira Office of the CTO. January 9, 2015 2014/2015 BROCADE COMMUNICATIONS SYSTEMS, INC. ALL RIGHTS RESERVED.
Brocade SDN/OpenFlow Norival Figueira Office of the CTO January 9, 2015 2014/2015 BROCADE COMMUNICATIONS SYSTEMS, INC. ALL RIGHTS RESERVED. 1 Legal Disclaimer All or some of the products detailed in this
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Multi-Provider Ethernet Service Delivery
Multi-Provider Ethernet Service Delivery Ananda Rajagopal Product Manager, Service Provider Solutions Foundry Networks Agenda Multi-Provider Ethernet Service Delivery Ethernet Service Delivery Today A
Implementing Virtual Leased Lines Using MPLS
Lines Using MPLS able of Contents 1. Objective... 3 2. arget Audience... 3 3. Pre-Requisites... 3 4. Introduction: MPLS and IP-Based VPNs... 3 5. he Promise of MPLS Layer-2 VPNs... 5 6. unneling Layer-2
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Ethernet Fabrics: An Architecture for Cloud Networking
WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
VCS Monitoring and Troubleshooting Using Brocade Network Advisor
VCS Monitoring and Troubleshooting Using Brocade Network Advisor Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products.
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Sprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
The Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
Brochure More information from http://www.researchandmarkets.com/reports/2251494/ Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL Description:
DEDICATED NETWORKS FOR IP STORAGE
DEDICATED NETWORKS FOR IP STORAGE ABSTRACT This white paper examines EMC and VMware best practices for deploying dedicated IP storage networks in medium to large-scale data centers. In addition, it explores
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
Diagnostics and Troubleshooting Using Event Policies and Actions
Diagnostics and Troubleshooting Using Event Policies and Actions Brocade Network Advisor logs events and alerts generated by managed devices and the management server and presents them through the master
Quality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
Transformation of the enterprise WAN with dynamic-path networking
Transformation of the enterprise WAN with dynamic-path networking Greg Ferro November 24, 2014 This report is underwritten by Sonus Networks. TABLE OF CONTENTS Executive summary... 3 How dynamic-path networking
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
Brocade Monitoring Services Security White Paper
WHITE PAPER Monitoring Services Security White Paper In today s globally connected world, the enterprise network is a strategic platform, a platform that demands deep and instantaneous integration between
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Innovation in Access and Metropolitan Area Networks -
Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 [email protected] AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper
White Paper Ethernet Service OAM Standards and Functionality As Ethernet continues to replace legacy TDM services in QoS sensitive, high-capacity applications such as business services and WiMAX/LTE 4G
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
Chapter 7 Protecting Against Denial of Service Attacks
Chapter 7 Protecting Against Denial of Service Attacks In a Denial of Service (DoS) attack, a Routing Switch is flooded with useless packets, hindering normal operation. HP devices include measures for
Virtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
Fibre Channel over Ethernet: Enabling Server I/O Consolidation
WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)
WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Building Trusted VPNs with Multi-VRF
Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN
Carrier Grade Ethernet Ethernet in service provider networks, MAN/WAN Carrier grade The term Carrier Ethernet implies that Ethernet services are carrier grade. Carrier grade is a system that is extremely
