MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

Similar documents
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Addressing Inter Provider Connections With MPLS-ICI

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Multi Protocol Label Switching (MPLS) is a core networking technology that

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Connection-Oriented Ethernet: Operational and Deployment Considerations

How To Understand The Benefits Of An Mpls Network

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS in Private Networks Is It a Good Idea?

Introducing Basic MPLS Concepts

MPLS L2VPN (VLL) Technology White Paper

Migrating to MPLS Technology and Applications

Innovation in Access and Metropolitan Area Networks -

Transport for Enterprise VoIP Services

MPLS Concepts. Overview. Objectives

Understanding PBB-TE for Carrier Ethernet

The Essential Guide to Deploying MPLS for Enterprise Networks

Virtual Leased Lines - Martini

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

Introduction to MPLS-based VPNs

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

Cisco Configuring Basic MPLS Using OSPF

QoS Implementation For MPLS Based Wireless Networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Enterprise Network Simulation Using MPLS- BGP

INTRODUCTION TO L2VPNS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

IP/MPLS Networks for Public Safety

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

WHITE PAPER. Multi-Protocol Label Switching (MPLS) Conformance and Performance Testing

APRICOT 2012 MPLS WORKSHOP L2VPN

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Use of MPLS in Mobile Backhaul Networks

White Paper: Carrier Ethernet

Course Description. Students Will Learn

Project Report on Traffic Engineering and QoS with MPLS and its applications

Delivering MPLS VPLS VPN Services With Metro Service Edge Platform

MPLS - A Choice of Signaling Protocol

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?

November Defining the Value of MPLS VPNs

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

1.1. Abstract VPN Overview

SBSCET, Firozpur (Punjab), India

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

Master Course Computer Networks IN2097

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

IP/MPLS Networks for Highways

IxNetwork TM MPLS-TP Emulation

Protection Methods in Traffic Engineering MPLS Networks

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS Traffic Engineering in ISP Network

Bandwidth Management in MPLS Networks

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Lesson 13: MPLS Networks

Sprint Global MPLS VPN IP Whitepaper

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Industry s First QoS- Enhanced MPLS TE Solution

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

Evaluating performance on an ISP MPLS network

POINT OF VIEW. MPLS A Strategic Technology. Executive Summary

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Kingston University London

MPLS-TP in Metro Transport Networks. Bringing Carrier Grade Performance to Data Services

Agilent N2X Layer 2 MPLS VPN Emulation Software

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Service Assurance Tools

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

RSVP- A Fault Tolerant Mechanism in MPLS Networks

MPLS Virtual Private Networks

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Reliable Airport IP Networks

Implementing VPN over MPLS

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Junos MPLS and VPNs (JMV)

EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless,

Metro Ethernet Networks (MEN)

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

How Routers Forward Packets

RFC 2547bis: BGP/MPLS VPN Fundamentals

Comparative Analysis of Mpls and Non -Mpls Network

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

The Keys for Campus Networking: Integration, Integration, and Integration

Multiprotocol Label Switching (MPLS)

KEY REQUIREMENTS FOR INTERWORKING BETWEEN MPLS-TP NETWORK AND IP/MPLS NETWORK

Transcription:

MPLS Innovations: The Next Phase Technology for Today s Service Providers

Introduction MPLS technology enables a smooth evolution of core networks within today s service provider infrastructures. In particular, MPLS allows service providers to cost-effectively support triple-play services and the diverse traffic types generated by enterprises and residential customers. However, this new capability introduces additional challenges within the metro network. The role of data aggregation at the edge of the metro network becomes increasingly critical for economic and operational reasons, and continues to evolve as a broader array of services is envisioned. Faced with the need to manage diverse traffic types, service providers continually seek the best alternatives for aggregating user flows into the MPLS core as shown in Figure 1. User traffic largely arrives over: Private leased lines (T1/E1, T3/E3) carrying ATM or Frame Relay traffic. Over time, Ethernet will replace these leased lines. Consumer access lines are typically delivered to the network from DSLAMs, which carry broadband traffic over either ATM or Ethernet links. Over time, these links will migrate to IP over Ethernet, and some portion of these links will become PON connections, which are high-bandwidth optical links. Ethernet-Based Ethernet-Based Metro User Flows MPLS Core Aggregated Flows ATM/FR-Ethernet Mixed MPLS Aggregation Switch Running s ATM-Based Figure 1: Evolution and the Importance of Data Aggregation For your convenience, a list of acronyms can be found at the end of this document. 1

The Challenges: Complexity and Cost To handle user traffic, service providers are faced with supporting multiple Layer 2 technologies (e.g., ATM, Frame Relay, and Ethernet) simultaneously. Given the need for more bandwidth on access lines, Ethernet will gradually replace most of the existing ATM and Frame Relay infrastructure. Within this complex and dynamic environment, the effectiveness of per-data-flow management and service interworking become vital. Cost management will also remain critical such that the service providers need an aggregation solution that is engineered to provide only the required functionalities. Over-engineered solutions (i.e., those that can route IP packets at the data forwarding layer with extensive IP routing protocol capabilities) have become less attractive and quite costly for broad deployment at the metro edge. The Solution: MPLS Technology Service providers have migrated to a converged IP/MPLS core that is capable of supporting all traffic types, but also want a way to converge traffic at the metro edge. MPLS pseudowires have emerged as the preferred technology to create a uniform interface that can serve this role. Purpose-built MPLS pseudowire switches, with a subset of router features geared for metro aggregation, provide a cost-effective solution for all interface types (e.g., channelized interfaces, PoS, EoS, and Ethernet). MPLS pseudowire technology was originally designed to encapsulate Layer 2 packets into the MPLS packet format for transport over an MPLS-enabled router core network. The LDP allows MPLS pseudowires to be set up over packet networks [1]. Since the MPLS pseudowire encapsulation method retains the characteristics of original Layer 2 circuits, service providers retain the powerful capability to provision, monitor and control user traffic on a per-flow basis at the network edge. Realizing these important implications and their potential, Fujitsu has been working with service providers to establish MPLS pseudowire technology as a common network service layer. To be adopted as a viable service, the original MPLS pseudowire technology needed to be enhanced in the following key areas: Service interworking QoS OAM Traffic protection and redundancy Inter-service provider-network data transport Scalability The combination of the MPLS pseudowire encapsulation and the above enhancements enable service providers to manage and control any type of Layer 2 circuits from the network edge, and are therefore categorized as a Layer 2.5 technology. Today, several service providers have started the process of deploying MPLS pseudowire technology as the means for service convergence. Service providers and vendors alike have been working closely in various standards bodies (in particular, the IETF and MFA Forum) to advocate and define the appropriate Layer 2.5 techniques. 2

Access Options MPLS pseudowire termination devices, or MPLS pseudowire packet switches, have the potential to costeffectively aggregate the three predominant types of traffic coming into a metro network as shown in Figure 2: ATM: Many access networks, and in particular wireless backhaul networks, are still deployed using ATM. The MPLS pseudowire switches at the metro edge can map ATM VPIs or VCIs onto MPLS pseudowires, and thereby support traffic moving over the metro network towards the core. In most service provider networks, ATM traffic has been managed in the form of SPVCs using the ATM PNNI protocol. There are a number of methods to carry ATM traffic over an MPLS pseudowire-based network, and the most efficient technique available is defined in a specification included in the MPLS/Frame Relay Alliance Technical Committee draft [2]. This technique requires a gateway to process both PNNI and MPLS pseudowire signaling protocols and map each SPVC into a single MPLS pseudowire. Draft-Swallow allows the service providers to migrate ATM circuits into other forms of circuits (such as Ethernet) transparently. Ethernet: Ethernet is rapidly becoming the predominant access media for end users. Service providers use Ethernet VLANs to separate different types of user traffic. MPLS pseudowire switches can map each Ethernet VLAN to an individual MPLS pseudowire. Because Ethernet VLAN flows and MPLS pseudowires operate on different network layers, OAM represents the major challenge in this area. OAM mapping enables the operators to monitor and diagnosis edge-to-edge user flows for Ethernet. MPLS s: A number of service providers bring end-user traffic into the metro network over MPLS pseudowires. For this configuration, the MPLS pseudowire switch must first terminate the incoming MPLS pseudowires and switch the data packets onto another MPLS pseudowire to traverse the metro network (see Figure 2). Since MPLS pseudowires can be established using various conventions static, PWid (also known as FEC 128), or Generic FEC [1], the MPLS pseudowire switch functions as a proxy to switch MPLS pseudowires directly. This proxy role is known as MPLS pseudowire stitching or switching. All three types of applications involve diverse traffic, and individual data flows will have different priorities and QoS parameters. To ensure that these priorities and QoS requirements are met, MPLS pseudowire switches must be able to protect user flows on a per-mpls pseudowire basis. 3

Access s LDP Psuedowire Access Switching Metro ATM Access Draft Swallow OAM Mapping Protection Ethernet Access Working Protection User VLAN Flow ATM PNNI SPVC Figure 2: MPLS Termination and Switching Devices Metro Deployment: MPLS LSR Within the metro network, MPLS pseudowire switches provide a cost-effective alternative to full-function routers. As shown in Figure 3, affordable MPLS pseudowire switches can function as typical MPLS LSRs if designed with the following built-in capabilities: Discover topology by using an IGP such as OSPF or IS-IS Set up LSPs using RSVP-TE or LDP Apply RSVP Fast Reroute [4] and other path protection techniques to ensure that service level requirements are met for each traffic flow Service providers have applied traditional MPLS-enabled routers for both the LER and LSR roles, but the requirements for these two functions are very different. The LERs must extensively interface with IP routing protocols (such as routing filtering, import and export) to route each individual data packet onto the corresponding LSPs. As a result, these routers are quite complex to operate and expensive to build. The LSRs, in contrast, are mainly used to switch data paths based on the MPLS labels and are therefore simpler to operate and less expensive to build. Purpose-built MPLS pseudowire switches can perform extremely well and provide cost savings when applied as LSRs within the metro network.

RSVP Fast Reroute and Path Protection Metro RSVP Transit LDP Transit Label Switching (Data Path) Core OSPF, ISIS Primary LSP s Working Protection Figure 3: Metro Deployment with MPLS LSRs (MPLS Switches MPLS Implementation and Innovations Recognizing the potential benefits and widespread applicability of MPLS pseudowire technology within wireline and wireless service provider networks, Fujitsu became an early innovator using the emerging standard. Today, the Fujitsu 6400 Layer 2.5 aggregation switch offers the most advanced MPLS pseudowire implementation and several advanced features that transform the technology into a robust service platform for today s service provider networks. The 6400 platform combines the best of Layer 3 application awareness and the best of Layer 2 economics, operations, and interworking in a single platform. 5

Metro-Core Interface Alternatives Two prevalent methods exist for connecting metro networks to a provider s core network. The first conventional approach is the attachment circuit model as shown in Figure 4. This method has the advantage of simplicity because it is easy to implement with existing products. However, this model requires traffic to hop over multiple underlying technologies that may operate on different network management planes, making it very difficult to troubleshoot failures and manage end-to-end per-flow traffic. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 4: Conventional Model #1 s for Metro-Core Interfaces 6

The second conventional alternative is the service provider-over-service provider model as shown in Figure 5. This method is easy to understand since it is based on the well-known BGP 2547 specification. It offers the advantage of end-to-end MPLS functionality. RSVP tunnels are established to create an edge-toedge MPLS pseudowire connection. The most serious drawback in this model is the lack of security. To set up inter-domain RSVP tunnels, this model requires that the networks share network resource information, a condition that introduces numerous vulnerabilities between competing service providers. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 5: Conventional Model #2 Carrier-over-Carrier There have been a number of attempts in standards bodies to overcome the information leaking problem in RSVP-TE for inter-domain traffic engineering. More time is required to determine if these efforts will be successful. 7

To connect metro and core networks efficiently, Fujitsu has been working closely with service providers to pioneer an advanced capability known as the MPLS pseudowire multi-hop model as shown in Figure 6. In this model, the networks remain independent. Each user data flow goes through the entire network as a single MPLS pseudowire, and is mapped and aggregated into different RSVP tunnels at the edges of service provider networks. In other words, the MPLS pseudowires traverse multiple hops before reaching their destination. Metro 1 Secondary LSP Core Metro 2 Secondary LSP Primary LSP Primary LSP Figure 6: Carrier-preferred Model MPLS Multi-hop The MPLS pseudowire multihop capability provides service providers a solution characterized by: Management simplicity: MPLS pseudowire technology is becoming well understood, and service providers have access to network management tools that support MPLS pseudowires. Instead of working with multiple technologies as required in the attachment circuit model, the multihop model allows operators to monitor and control data traffic at the MPLS pseudowire level across the entire network. Security: MPLS pseudowires are handled at each service provider s network edge, which means that data forwarding can be controlled based on the service provider s resource and network policy criteria. Consequently, no network information must be exchanged between service provider networks. Scalability: All MPLS pseudowires are managed via a single control session between any two adjacent edge nodes. The edge nodes will always re-map and aggregate the MPLS pseudowires into different MPLS tunnels. The fact that the MPLS pseudowires are divided into segments enables the control plane to handle a greater number of connections. Standardization: The MPLS pseudowire multi-hop specification is in the process of being standardized within an IETF committee [3]. The Fujitsu implementation validates this approach and is driving this and future standardization efforts. 8

ATM SPVC to MPLS Interworking Many vendors support ATM-MPLS pseudowire network-level interworking as shown in Figure 7. At the network ingress edge, each ATM SPVC is mapped into an MPLS pseudowire and transported over the core. At the egress edge, the MPLS pseudowire is recovered and mapped to an ATM SPVC. There are a number of disadvantages in this approach, the most serious of which is that the access networks must all be ATM-based. This requirement will handicap a service provider s ability to move away from the existing ATM infrastructure to IP or Ethernet. In addition, this approach does not scale well since each SPVC-MPLS pseudowire mapping pair must be statically configured at the edge nodes. ATM SPVC-1 ATM SPVC-2 PW-1 PW-2 MPLS/IP SPVC-1 ATM SPVC-2 Figure 7: Conventional ATM-MPLS Interworking A more efficient approach, Draft-Swallow, has been undergoing standardization in the MFA Forum. The Fujitsu 6400 platform is the first system that supports this functionality in response to significant demand from service providers. 9

With the Draft-Swallow approach, the MPLS pseudowire switch performs the role of a gateway for connecting the PNNI-based ATM/Frame Relay networks and MPLS/IP networks as shown in Figure 8. This is referred to as service interworking (as opposed to network interworking) since the ingress and egress networks are not the same. As a gateway, the MPLS pseudowire switch will first translate IP edge node addresses into ATM, and then inform the ATM edge nodes about those addresses. Therefore, ATM edge nodes will view the IP edge nodes as ATM neighbors connected through the MPLS pseudowire switch. The ATM edge nodes will initiate the SPVCs and transfer data traffic to the MPLS pseudowire switch, which will then map each SPVC to an MPLS pseudowire and forward the traffic to the appropriate IP edge nodes. ATM Flow Frame Flow ATM-SW Frame-SW SPVC-1 ATM with PNNI SPVC-2 PW-1 MPLS/IP PW-2 Router 1 Router 2 Figure 8: ATM-MPLS Service Interworking (Draft-Swallow) There are two major differences between the Draft-Swallow approach and the conventional approach: 1. The conventional approach is to tunnel one protocol/application across another network. The Draft-Swallow technique translates one service to another and provides true service interworking. 2. With the conventional approach, the network interworking is to terminate and encapsulate the protocol over point-to-point connections. The Draft-Swallow approach is to translate the control protocol information transparently via an interworking gateway. The result is that the new approach will allow service providers to seamlessly transfer the existing ATM or Frame Relay services onto IP/MPLS networks. Since the MPLS pseudowire switches interface with both PNNI and MPLS signaling protocols, all the connections can be established automatically. 10

MPLS Traffic Protection and Restoration Service providers need to ensure traffic protection on every segment and in every layer of the network. MPLS pseudowire deployments can incorporate adequate protection and redundancy as shown in Figure 9. Working s MPLS/IP Protection s Figure 9: MPLS Protection For each operational (or working) MPLS pseudowire, the network edge nodes will set up one or multiple back-up (or protecting) MPLS pseudowires. In the event of a network failure, data traffic can continue to be forwarded through the backup MPLS pseudowires. In today s MPLS networks, service providers have been deploying MPLS Fast Reroute [4] for traffic protection. However, there are a number of limitations that can only be solved with MPLS pseudowire protection: Bandwidth mismatch: When a lower-speed link is being used as a backup for a higher-speed link, problems can arise during protection and restoration operations. If the higher-speed link fails, all traffic will be switched onto the lower-speed link. However, mission-critical traffic could be dropped as the result of link congestion during the switchover process. This problem is easily resolved by giving each MPLS pseudowire its own priority, which allows the MPLS pseudowires to preempt each other when necessary. Also note that, since the MPLS pseudowires are always bidirectional, the priority assignment must be consistent on both ends of the MPLS pseudowires. Low-cost access devices: Due to cost and operational reasons, network access devices such as PON ONTs do not have the full functionality of an IP/MPLS router, and use MPLS FRR for traffic protection. However, these access devices can implement MPLS pseudowires and MPLS pseudowire protection for data access and protection. The 6400 platform allows the configuration of hot, warm, and cold standby connections. In the case of hot standby situations, the platform delivers a fast switchover of less than 50 ms. Planned traffic shifting: During times of network maintenance, MPLS pseudowire traffic on one link may be shifted to another link. To support this capability, MPLS pseudowire protection features of the 6400 platform give operators the ability to manually trigger traffic shifting when desired. MPLS pseudowire protection is currently undergoing standardization in the IETF [5]. 11

OAM and OAM Mapping The OAM function is critical in access networks. In core networks, data traffic can be readily re-routed over an alternative path in the event of a network failure. In access networks, however, data traffic seldom has alternative or backup paths. Another challenge is imposed by end-to-end OAM support. A variety of OAM techniques are employed for the various network topologies. ATM, Ethernet, and MPLS all have different OAM requirements and mechanisms. However, in most of the service provider networks, an access network is based on either Ethernet or ATM while the core is typically based on MPLS. Therefore, the pseudowire switches must be able to support multiple OAM mechanisms and map the OAM parameters from one network type to another. Figure 10 illustrates how the Fujitsu 6400 platform handles OAM and OAM mapping using VCCV and Ethernet OAM (802.3ah). For example, in the event of an Ethernet failure, the switch will capture the failure alarms and piggyback them onto the VCCV messages. Consequently, remote nodes will receive the failure notification and act appropriately. MPLS/IP Ethernet Ethernet OAM-VCCV Mapping Backbone s Ethernet User Flows Figure 10: OAM and OAM Mapping 12

Conclusion MPLS pseudowire technology presents today s service providers with many opportunities to cost-effectively aggregate diverse traffic onto an IP/MPLS core network while maintaining excellent service to customers with legacy networks. The purpose-built 6400 switch allows service providers to reduce costs at the metro edge by deploying a lower-cost alternative to traditional full-function IP/MPLS routers. Fujitsu provides service providers with the most stable, full-function MPLS pseudowire foundation technologies, and will continue to lead in offering advanced features required for robust, commercial networks. This future direction and commitment are evident in the most recent 6400 MPLS pseudowire enhancements, including: MPLS pseudowire multihop networking for secure, scalable metro-core interfacing; Service interworking functionality for connecting ATM and Frame Relay networks to IP/MPLS networks; MPLS pseudowire traffic protection and restoration features for fast switch-overs Ethernet-MPLS OAM mapping for end-to-end traffic monitoring and diagnosis. References [1] PW-Ctrl Pseudo-wire Setup and Maintenance using the LDP, Luca Martini, et al, IETF draft [2] Draft-Swallow Soft Permanent Virtual Interworking between MPLS MPLS s and ATM: Unmapped Mode Version 1.0, George Swallow, MFA Contribution, July 2005 [3] PW-Mhop Dynamic Placement of Multi Segment Pseudo Wires, Balus et al, IETF draft [4] MPLS-FRR Fast Re-route Extensions to RSVP-TE for LSP Tunnels (RFC 4090), P. Pan et al [5] PW-Protect Protection, P. Pan, IETF draft 13

Acronym ATM BGP BGP 2547 DSLAM EoS FEC FRR IETF IGP IP IS-IS LSP LDP LER LSR MFA Forum MPLS OAM ONT OSPF PON PoS PNNI PW PWE3 PWid QoS RSVP RSVP-TE SPVC TDM VPI VCI VCCV VLAN Descriptor Asynchronous Transfer Mode Border Gateway Protocol RFC2547 a BGP extension for MPLS VPN Digital Subscriber Line Access Multiplexer Ethernet over SONET/SDH Forward Error Correction Fast Re-route Internet Engineering Task Force Interior Gateway Protocol Internet Protocol Intermediate System-Intermediate System Label-Switched Path Label Distribution Protocol Label Edge Router Label Switch Router MPLS/Frame Relay Alliance Forum Multi-Protocol Label Switching Operation, Administration, and Management Optical Terminal Open Shortest Path First Passive Optical Packet over SONET/SDH Private - Interface Edge-to-Edge Emulation ID Quality of Service Resource Reservation Protocol Resource Reservation Protocol for Traffic Engineering Soft Permanent Virtual Time-Division Multiplexing Virtual Path Identifier Virtual Identifier Virtual Connection Verification Virtual LAN 14