Great slides about factors to consider when looking at migrating to MPLS. OnCall Telecom can help with all your migration and design concerns and handle your migration from order to implementation. Contact us today to discuss your organization's needs!
Ethernet Demarcation Devices for managing end to end Ethernet service deliveryMetrodata Limited
The use of Ethernet by Telecommunications Service Providers, for Corporate connectivity services, is growing rapidly and is set to dominate within just a few years.End-to-end Ethernet networks offer a number of advantages, particularly in terms of reduced cost and complexity, compared against today's 'managed Router' networks, deployed by the majority of Service Providers.Nevertheless, in today's deregulated Telecoms environment, many Ethernet Service Providers deploy Infrastructure Networks acquired on a wholesale basis, for either for long-haul circuits, local 'last mile' access, or both. Only by having their own manageable network demarcation entities at the customer premises can the Service Provider achieve effective visibility to both local customer connections and end-to-end circuits.Our White Paper examines the challenges of Management of end-to-end network connections experienced by Ethernet Service Providers and looks at how the use of cost-effective, manageable Ethernet Demarcation Devices can help them to meet those challenges
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
Ethernet Demarcation Devices for managing end to end Ethernet service deliveryMetrodata Limited
The use of Ethernet by Telecommunications Service Providers, for Corporate connectivity services, is growing rapidly and is set to dominate within just a few years.End-to-end Ethernet networks offer a number of advantages, particularly in terms of reduced cost and complexity, compared against today's 'managed Router' networks, deployed by the majority of Service Providers.Nevertheless, in today's deregulated Telecoms environment, many Ethernet Service Providers deploy Infrastructure Networks acquired on a wholesale basis, for either for long-haul circuits, local 'last mile' access, or both. Only by having their own manageable network demarcation entities at the customer premises can the Service Provider achieve effective visibility to both local customer connections and end-to-end circuits.Our White Paper examines the challenges of Management of end-to-end network connections experienced by Ethernet Service Providers and looks at how the use of cost-effective, manageable Ethernet Demarcation Devices can help them to meet those challenges
Leveraging IMS for VoLTE and RCS Services in LTE Networks Presented by Adnan ...Radisys Corporation
ETSI Workshop – RCS VoLTE and Beyond
Kranj, Slovenia
October 11, 2012
Adnan Saleem discusses the advantages of moving to VoLTE/RCS for mixed mobile operators – and addresses the key challenges along the way.
The success of today’s organizations and enterprises highly depends on reliable and secure connectivity. Enterprise connectivity exists between different branches, between a central offi ce and geographically widespread points of activity and between an enterprise and the public internet. The connectivity enables faster, more secure transactions and improved productivity by sharing information between entities,
no matter where they are.
Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™Multapplied Networks
This paper examines existing technologies that help increase network performance. It finishes by explaining the advantages and features of our Bonded Internet™ service - a service that bonds disparate WAN/Internet connections to give customers fater, more reliable networks.
For more discussions and topics around Service Providers, please visit our SP Community: http://cisco.com/go/serviceprovidercommunity
Download the full PDF report here: https://communities.cisco.com/docs/DOC-37834
Using Bonded Internet™ to Replace and Enhance Customer MPLS NetworksMultapplied Networks
This presentation shows how Multapplied Networks's Bonded Internet™ networking software gives customers an alternative to costly MPLS networks. By bonding ADSL, Cable, T1, and 3G/4G connections with seamless failover - and layering QoS over the traffic - Bonded Internet™ is a clear alternative to MPLS networks.
The service is available globally through service providers to enhance enterprise WANs by leveraging low-cost broadband connections and creating a reliable, cost-effective corporate network that enables the adoption of Cloud-based services.
These slides address the concerns that the Telecom industry has over IMS, the spread of OTTs, the importance of interoperability, and the search for the Telecom network standards of the future. It answers such questions as, "Do we need to simplify IMS?", "Do we need standards?", "Why is IMS so complicated?", "What do we mean by a 'seamless experience'?", and many more.
A Leased line is Ethernet fibre connection which helps connecting businesses whilst no other business or third party can share your connection. Due to its high performance this network becomes the popular solution for many organisations. They are highly secure, flexible, resilient and consist of multiple backup options. Leased lines are essential for increasing bandwidth, high speed and symmetrical speeds.
A Business Guide to MPLS IP VPN Migration: Five Critical FactorsXO Communications
Multi-Protocol Label Switching Internet Protocol Virtual Private Network, or MPLS IP VPN, refers to a VPN service enabled over a trusted provider’s private MPLS core backbone. It delivers the flexibility of an IP service with the essential service quality, performance, and security previously available only with legacy technologies. Other benefits include cost-effective security, any-to-any connectivity, Quality of Service, scalable bandwidth, and a platform for convergence.
Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™Multapplied Networks
This paper examines existing technologies that help increase network performance. It finishes by explaining the advantages and features of our Bonded Internet™ service - a service that bonds disparate WAN/Internet connections to give customers fater, more reliable networks.
For more discussions and topics around Service Providers, please visit our SP Community: http://cisco.com/go/serviceprovidercommunity
Download the full PDF report here: https://communities.cisco.com/docs/DOC-37834
Using Bonded Internet™ to Replace and Enhance Customer MPLS NetworksMultapplied Networks
This presentation shows how Multapplied Networks's Bonded Internet™ networking software gives customers an alternative to costly MPLS networks. By bonding ADSL, Cable, T1, and 3G/4G connections with seamless failover - and layering QoS over the traffic - Bonded Internet™ is a clear alternative to MPLS networks.
The service is available globally through service providers to enhance enterprise WANs by leveraging low-cost broadband connections and creating a reliable, cost-effective corporate network that enables the adoption of Cloud-based services.
These slides address the concerns that the Telecom industry has over IMS, the spread of OTTs, the importance of interoperability, and the search for the Telecom network standards of the future. It answers such questions as, "Do we need to simplify IMS?", "Do we need standards?", "Why is IMS so complicated?", "What do we mean by a 'seamless experience'?", and many more.
A Leased line is Ethernet fibre connection which helps connecting businesses whilst no other business or third party can share your connection. Due to its high performance this network becomes the popular solution for many organisations. They are highly secure, flexible, resilient and consist of multiple backup options. Leased lines are essential for increasing bandwidth, high speed and symmetrical speeds.
A Business Guide to MPLS IP VPN Migration: Five Critical FactorsXO Communications
Multi-Protocol Label Switching Internet Protocol Virtual Private Network, or MPLS IP VPN, refers to a VPN service enabled over a trusted provider’s private MPLS core backbone. It delivers the flexibility of an IP service with the essential service quality, performance, and security previously available only with legacy technologies. Other benefits include cost-effective security, any-to-any connectivity, Quality of Service, scalable bandwidth, and a platform for convergence.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. A Business Guide to MPLS IP VPN Migration: Five Critical Factors
Contents
Abstract 3
Introduction 4
The Evolving Needs of Today’s Enterprise Network
5
How MPLS Works
6
Factor 1: Understanding Your Business Goals
7
Factor 2: Defining Your Network Needs
9
Factor 3: Choosing Your Migration Path
10
Factor 4: Assessing the TCO of your Migration Solution
12
Factor 5: Selecting a MPLS IP VPN Services Provider
13
Conclusion 15
Appendix A: XO MPLS IP-VPN: Converged Voice, Data, and Video Solution
with Class of Service Routing
Appendix B: XO MPLS IP-VPN Secure, Scalable, Redundant Solution for
Multi-site Networks
17
Appendix C: XO MPLS IP-VPN Supports a Wide Range of Integrated VoIP
Service Offerings
2
16
18
Solutions you want. Support you need.
3. XO Communications
Abstract
This paper outlines five critical factors for successful migration to an MPLS IP VPN service.
Written for business executives and IT decision makers, the paper discusses the current
status of MPLS IP VPN adoption for the medium-to-large business (5 to 50 locations),
especially with regard to the evolving (and expanding) role of MPLS technology. The paper
also identifies key questions you should ask before migrating from a legacy infrastructure
to an MPLS-enabled IP VPN, discusses the benefits of migration, describes the types of
companies that would benefit from MPLS IP VPNs, and suggests what a business should
look for in an MPLS provider. The good news is that the early adopters of the technology have implemented MPLS with great success, particularly as it relates to network
performance.
Trends in the MPLS/IP VPN Services Market
• raditional TDM services continue to dominate the access space, but alternative
T
access technologies such as Ethernet and 3G wireless are gradually gaining
traction
• Integration of video applications such as TelePresence is expected to drive
spending on MPLS VPN services
• Layer 2 Ethernet-based VPNs (VPLS) are complementing layer 3 MPLS VPNs
• Hybrid networks are seeing growth even as VPLS gains traction
• Ability to support multicast is fast emerging as a key competitive differentiator
Source: Frost Sullivan, “U.S. MPLS-IP VPN Services Market Update 2010,” October 2010, p. 8.
3
4. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
Introduction
With the emergence of converged IP services, all businesses are demanding greater performance from their enterprise networks than ever before, including support for media-rich
applications. Medium-to-large businesses with five to 50 sites throughout the United States
tell us they understand the urgent need to evolve enterprise networks and control the
power of today’s information technology, but many lack the tools and budgets to do so. For
these businesses, MPLS-based private IP networks, or MPLS IP VPNs, have been hailed
as an ideal choice for the corporate WAN, ideal for multi-location businesses that use IP
applications and want to interconnect very large numbers of sites.
Multi-Protocol Label Switching (MPLS) Internet Protocol (IP) Virtual Private Network (VPN),
or MPLS IP VPN, refers to a VPN service enabled over a trusted provider’s private MPLS
core backbone. It delivers the flexibility of an IP service with the essential service quality,
performance and security previously available only with legacy technologies (dedicated,
high bandwidth capacity lines). Other benefits include cost-effective security, any-to-any
connectivity, Quality of Service (QoS), scalable bandwidth, and a platform for convergence
– one that eliminates network redundancies and supports enterprise VoIP.
Since many enterprises find it difficult to manage routing across hundreds of sites, an
MPLS-based IP-VPN service is popular because organizations can outsource network
management to a service provider. IT departments who manage these complex networks
must be knowledgeable enough to handle the limitations and details of sophisticated routing tables. MPLS IP-VPN also can be a better choice for organizations using applications
that broadcast themselves when they come online—or VoIP.
Voice over Internet Protocol (VoIP), which uses the same communications protocol to
carry voice traffic that the Internet uses to carry data traffic, is the key driver for network
convergence. With MPLS IP VPN, not only are multiple networks (voice, data, and video)
assimilated on one IP platform, but the converged voice and data network is also easier to
maintain than two or three separate legacy networks.
4
Solutions you want. Support you need.
6. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
How MPLS Works
Traditional IP packet routing
In most standard packet networks including traditional IP, packets are routed according to
information contained in the header of each packet. As the packets make their way across
the network, they are examined by each switch/router they pass through to determine how
to handle it in terms of Quality of Service (QoS) and outbound routing. In many cases, each
packet is encrypted before it enters the network to ensure confidentiality (Figure 1).
Each router performs all the handling functions—checking for errors, verifying address,
repackaging, re-transmitting, and so on. These necessary functions result in robust network architecture, but they take time. For delay-sensitive traffic like VoIP and video conferencing, delays are unacceptable.
MPLS packet routing
MPLS makes this process faster by using another method to route and prioritize traffic.
In an MPLS network, packets are given labels that identify their priority individually and
relative to other packets. With this unique prioritization scheme, traffic delivered over an
IP-based MPLS network demonstrates QoS levels that are identical to those previously
available only on Frame Relay, ATM, and Private Line networks (Figure 2).
MPLS offers the best of both a Layer 2 and a Layer 3 network—relying on the robustness
of a fully meshed network and the survivability and efficiency of a routed Layer 3 network.
MPLS does a good job managing the network and the traffic that traverses it because it
performs two tasks well: prioritizing traffic based on header information, and shaping traffic
according to its knowledge of network topology and current load. (Shaping is the process
of spreading traffic across all paths in the network to guarantee optimal traffic handling by
the resources available within the network.)
Traditional IP versus MPLS IP Networks
Figure 1. Traditional IP Network
Figure 2. MPLS-enabled IP Network
Packets are checked by each router
Packets contain labels that identify their
priority and destination, and quickly
route to their destination without
multiple checkpoints, which enhances
traffic speed.
along their paths to determine their
priority and destination.
6
Solutions you want. Support you need.
7. XO Communications
Factor 1: Understanding Your Business Goals
MPLS IP VPN is the ultimate in WAN connectivity. Are its benefits aligned with
your enterprise needs?
A move to MPLS IP VPN requires a financial and operational commitment from the enterprise in order to be successful. Establishing clear business goals can help secure funding
and continued support from the enterprise, and keep the project on track in terms of time
and resources. Examples of some typical business goals behind a switch to MPLS IP VPN
from a legacy network are given below.
Reduce costs associated with separate networks for voice, video and data: Reducing
costs is often a primary goal behind network consolidation projects. MPLS IP VPN can
reduce network total cost of ownership (TCO)—including costs such as acquisition,
monthly recurring charges, and annual maintenance fees—by converging voice, video and
data from multiple networks onto a single platform. It also decreases costs for enterprises
with multiple, regionally dispersed sites that require a fully meshed network. In fact, as
the degree of meshing increases, the TCO for MPLS IP VPN decreases dramatically when
compared with a Frame Relay network (Figure 3). Last, the extraordinary scalability of an
MPLS network enables an enterprise to deliver all the communication capacity for highbandwidth applications (like data storage or video) without provisioning bandwidth.
Re-deploy IT resources to more critical tasks: An excellent ability to self-configure eliminates the need for circuit mapping, capacity planning, and monitoring of multiple pointto-point connections. It also simplifies billing, customer premises equipment (CPE) support,
vendor management, network management, and operations functions, resulting in the ability
to re-deploy some of those IT resources to other tasks within the enterprise. The remaining
functions can then be handled internally or, as many companies are now doing, outsourced
to a provider of managed services.
Improve network performance: IP-dependent MPLS offers QoS over IP – the best possible combination for QoS-dependent enterprise networking. An MPLS-enabled IP network
provides built-in security with dedicated IP edge routers isolated from the public Internet
and provides superior routing performance while adhering to stringent SLAs. MPLS delivers defensible QoS supported by SLAs that address such issues as jitter, service availability, round-trip delay, packet loss, and QoS.
Increase performance of mission-critical applications: MPLS uses Class of Service (CoS)
tags on packets to ensure that VPN customers have priority throughout their network and
that each application gets the quality of service it needs. The ability to control how classes
of data move on the network gives MPLS-enabled IP VPNs a performance edge over traditional IP VPNs.
7
8. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
Improve network security: MPLS provides a private, segregated VPNs for each customer,
with dedicated IP VPN provider edge routers isolated from the public Internet, plus secure
Internet access options.
Provide a platform for the future: MPLS supports an array of emerging IP-enabled applications that must be supported across enterprise networks, fixed and mobile devices, and
location types.
Table 2. Profiles of Typical Businesses Choosing MPLS IP VPN
MPLS IP VPN is particularly suited for certain business types, as shown below.
Typical Profiles of Businesses Adopting MPLS IP VPN
Business characteristic
Decentralized, regionally dispersed
• Any-to-any communications across
numerous and regionally dispersed sites
Large number of leased lines
• Easier management
• Cost savings from bandwidth
consolidation
Multiple traffic streams
• Companies with data, voice, video
conferencing, and business applications
are likely to see the merits of an MPLS
IP VPN.
• Inherent traffic separation
• QoS
• Traffic stream prioritization
• Security
Undertaking mergers or
‘organizational change
• Scalability
• Flexibility
Holding group
• Secure segregation of traffic
• Economies of scale through centralized
buying and consolidation
Small, growing
8
MPLS IP VPN Benefit
•
•
•
•
Scalability
Frees up scarce resources
Immediate cost savings
Ability to add applications over one
network solution
Solutions you want. Support you need.
9. XO Communications
Factor 2: Defining Your Network Needs
Different providers have different strengths. Assess your network needs first.
Does the provider meet your bottom line requirements?
Specific network capabilities, including Quality of Service (QoS), availability, flexibility
and security can vary among service providers—be sure to take these into consideration.
You will need to examine your own current network operation, and determine the type of
capabilities you will need. A service provider should be able to help. Some use a ‘discovery
questionnaire’ to identify the functions performed at each of your locations, survey your
current telecom environment, and ask about your growth plan and future network
requirements. Following are some examples of network needs:
• Quality of Service (QoS) backed by SLAs: SLAs for QoS parameters typically include
measures of uptime, mean time between failures, degree of survivability, repair response
time, latency (delay), jitter, and packet delivery.
• End-to-end service quality: As bandwidth-hungry voice and video conference traffic
spills over to another traffic class, circuits can be overloaded and network performance
deteriorates. Class of service (a tag applied to each packet indicating level of priority must
be monitored at the application level so that network managers have visibility into
application-specific traffic performance. Service providers may offer tools to help.
• Availability: A subjective measure of network performance typically negotiated by the
buyer and seller of network services. Most commonly defined as a percentage of uptime in
a given period of time, like the ‘five nines of reliability’ (99.999% availability).
• Flexibility: A measure of network flexibility related to survivability and customer service.
One measure is the degree to which a network can self-configure during facility failure to
avoid disruption of service. A fully meshed architecture lends itself to this because in the
event of failure of the primary route, traffic can be instantly and automatically rerouted to
ensure service continuity. Another measure is how much the network can adapt to the
disparate traffic types.
• Security: Privacy, confidentiality, and non-repudiation are critical today. In VPN
environments, private traffic is routed across public infrastructures with absolute
confidence, and the need to guarantee this level of information security continues to
be critical.
9
10. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
Factor 3: Choosing Your Migration Path
When migrating from legacy technologies, there are options. What plan will
work best for you?
Staying with what you have: The legacy Layer 2 VPN
Initially, virtual network services were delivered over Layer 2 networks (Frame Relay and
ATM), using full-duplex virtual circuits established through a traditional call setup signaling
process. These Layer 2 VPN networks are typically organized around a physically
centralized, hub-and-spoke architecture (Figure 3). While this architecture has its limitations, it
also has advantages. Because these networks are based on dedicated resources, they are
secure and predictable. And while they aren’t based on IP, which is a Layer 3 IP protocol, a
very high percentage of the traffic transported over them (more than 75%) are IP packets.
Therefore, these hub-and-spoke designs can form the basis for a very effective transition
strategy to MPLS-enabled IP VPNs, since they are already transporting IP packets and
offer a high degree of performance.
However, Layer 2 VPNs, while effective, are connection-oriented and therefore costly and
inflexible. Also, because communication must transit a hub, it takes longer to transmit,
creating delays and bottlenecks. Also, hub failure can affect multiple sites. By extension,
the only way a Layer 2 network can have the many-to-many flexibility of a Layer 3 (IP)
network is if it is fully meshed; that is, the network architecture is such that every node in
the network has a connection to every other node in the network.
The fully-meshed Layer 2 VPN
In a situation where a meshed network is already in place (Figure 4), MPLS can be
implemented directly over it, taking advantage of the survivable Layer 2 architecture as a
foundation for the robust Layer 3 capabilities enabled by MPLS. In this case, communication
bypasses the hub, avoiding bottlenecks. Expensive Layer 2 switches become far more
capable Layer 3 routers. VPNs are implemented through these routers.
While this scenario may be a feasible migration path for some large enterprises with special
needs and security concerns, enabling a fully-meshed Layer 2 VPN architecture is infeasible
for most medium-to-large enterprises.
The Layer 3 MPLS IP VPN
Choosing an MPLS IP VPN service allows a business to minimize personnel and capital in
managing the enterprise WAN, and leverage the expertise of a service provider (Figure 5).
The most commonly outsourced functions include some aspects of design, installation,
and ongoing management (such as VPN installation and testing, router management and
monitoring, security management, VPN design, and VPN product selection).
10
Solutions you want. Support you need.
11. XO Communications
VPN Migration Paths
Figure 3. Layer 2 Hub-and-Spoke VPN Architecture
Critical, costly resources are focused in the
center of the network (yellow circle). All edge devices
have access to them on a shared basis. Costs are
controlled by limiting the number of point-to-point
connections between edge devices. However,
communication (blue dotted lines) must transit
through the hub, creating delays and bottlenecks.
Figure 4. Fully Meshed Layer 2 VPN Architecture
The hub (yellow circle) and surrounding “spoke”
devices are connected in a fully meshed topology.
Communication between sites (blue dotted line)
now bypasses the hub, avoiding bottlenecks.
However, establishing multiple point-to-point
connections significantly increases operating and
maintenance costs.
Figure 5. Layer 3 MPLS IP VPN Architecture
A service provider can offer a fully managed
MPLS IP VPN with end-to-end network
management and monitoring. Only one link per
site to the service provider’s network is needed to
provision applications enterprise-wide.
11
12. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
Factor 4: Assessing the TCO of your
Migration Solution
Your network costs now—and in the future
To establish a foundation for making sound financial decisions regarding migration, it is
important to assess the total cost of ownership (TCO) of the solution. Consider capital
expenditures, operating expenses, and opportunity costs over a period of time—beyond
the initial deployment.
• Capital Costs: The ability to consolidate disparate network operations within an organization
naturally leads to cost reductions through the more efficient use of existing equipment,
property, and facilities. Companies that decide to migrate to an MPLS IP VPN find that
accessing a service provider’s lower cost structure results in a greater economy of scale,
and this is one of the most compelling reasons for outsourcing. A service provider can also
charge less than a business would otherwise spend for operations, maintenance, service,
equipment, and technology upgrades.
• Operating Costs: Companies that migrate to an MPLS IP VPN not only reduce their
capital costs, they make recurring costs more predictable by shifting from a variable cost
to a fixed-cost model. Businesses will know their monthly costs in advance, as compared
to businesses that need to find the budget for unexpected expenses related to network
hardware, software and service upgrades, and maintenance. The good news is that for
multi-location businesses that require T1 or higher services, an MPLS IP VPN is actually
a cost-cutting measure that frees IT resources to concentrate on the core objectives of
the business.
• Opportunity Costs: Though sometimes difficult to quantify, opportunity costs may include
lost enterprise revenue and lower productivity, often the result of network downtime or
the inability to deploy new services and locations. Service providers have the resources
to offer 24-hour monitoring, management, and support – capabilities not readily available in-house to any but the largest enterprises. Service providers also can offer rapid
deployment of applications and services because of their deployment experience. Even
for companies with large in-house staffs, service providers can fill critical resource gaps,
which typically require special training and expertise.
Figure 6. Total Cost for Frame Relay vs. MPLS IP VPN
As more PVCs are added to a Frame
Relay network to make it fully meshed,
the cost goes up dramatically. For MPLS
IP VPN, the cost remains constant.
Source: Ovum 2003, “Frame Relay versus QoS IP VPN Costs,” reprinted in “From Frame Relay to VPN:
Why to Migrate, Why to Out-task to a Service Provider” white paper by Cisco Systems, 2005.
12
Solutions you want. Support you need.
13. XO Communications
Factor 5: Selecting a
MPLS IP VPN Services Provider
What can a service provider do for you?
MPLS eliminates the need for circuit mapping, capacity planning, and monitoring of
multiple point-to-point connections. It also simplifies billing, customer premises
equipment (CPE) support, vendor management, network management, and operations
functions, so some of those IT resources can be re-deployed to other tasks within the
firm. The remaining functions can then be handled internally or outsourced to a provider of
managed services.
By outsourcing all or some of the migration a business can more fully realize the benefits
of its MPLS-based network. Outsourcing enables a business to minimize personnel and
capital in managing the enterprise WAN, while leveraging the expertise of the service
provider. The most commonly outsourced functions include some aspects of design,
installation, and ongoing management (such as VPN design, product selection, installation,
and testing; router management and monitoring; and security management).
When selecting a provider, verify that its network supports the business strategy that
drove you to migrate to MPLS in the first place. While very few providers will excel in
every category, consider those that will support your highest priorities now and in the
foreseeable future.
13
14. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
Table 3. Service Provider Selection Criteria Checklist
Criteria
Questions
Access Options
Does the provider offer an array of access speeds and technology
options (remote access, T1/DS3, Ethernet, fiber, and higher speed optical
interfaces) to support site connectivity, legacy networks, and scalability
needs?
Voice/Data
Does the provider offer a range of VoIP options that will enable an
Convergence
end-to-end VoIP solution that connects all of your company sites?
Performance
How does the company measure network performance? Are those measures
Measurement
available to the enterprise? If so, how? What are the key performance
thresholds that the provider uses as service delivery triggers?
Service and
Is the service provider capable of managing end-to-end QoS and network
Support
security, even when the circuit traverses other providers’ networks?
Service Level
Are there Class of Service SLAs that prioritize application traffic differently?
Agreement
Does the SLA address remuneration for service outages? What are the
terms for response to a network problem or failure?
Universal
Does the service provider have agreements with other providers to ensure
Connectivity
universal connectivity, even in areas where the provider lacks a presence?
Security
How robust is the service provider’s network security? MPLS is a highly
secure infrastructure, but even the best networks have vulnerabilities. Is
Internet access provided across the same core infrastructure as access
to the VPN, or it is done over a separate infrastructure?
For multi-site networks, find a service provider with a private, MPLS-enabled
IP backbone, thereby segregating your data from other customers and the
public Internet.
Redundancy
Does the service provider offer some level of Business Continuity support?
Look for redundant service offerings that may include both wireless and
non-wireless links, collocation, back-up power, customized design, and
24/7 technical support.
Managing VPNs
Does the service provider configure, deploy, and manage CPE at each
of your network sites? Some MPLS service providers will simplify
network management this way. Are Web-based reporting and monitoring
tools available?
14
Solutions you want. Support you need.
15. XO Communications
Conclusion
What Every Enterprise Should Know
MPLS is enjoying success as a viable solution for multi-site enterprise connectivity. The majority
in the industry that are implementing VoIP, expanding their reliance on VoIP, or improving their
QoS ratings are also implementing MPLS as part of their strategy to do so. Because IP has also
ascended to a level of prominence in large, QoS-dependent enterprise networks, and because it is
beginning to demonstrate its ability to support the promise of convergence, MPLS emerges as an
ideal access and transport solution. It offers the same level of service as legacy Layer 2 technologies,
but at a much lower cost and with much greater flexibility.
Is Your Enterprise Ready to Migrate to MPLS?
The time to consider converting to an MPLS solution has arrived. Before doing so, however, be
sure that the decision to convert is based on: (1) your business goals, (2) an understanding of
your network needs, (3) a strategic migration path, (4) the TCO of your migration solution and (5)
a service provider with a network, features and capabilities that supports your business strategy.
The end result will be a secure, flexible, cost-effective network with near-infinite scalability that will
meet your enterprise needs for a very long time.
What’s Next?
Solution providers, such as XO Communications, offer a suite of MPLS migration tools, people,
and processes to assume management of your networking environment should your enterprise not
have the resources to design and operate an MPLS-based network. For more information on XO
MPLS IP-VPN service and how XO can help you migrate to MPLS, please visit:
http://www.xo.com/services/network/mpls-ipvpn/Pages/overview.aspx.
15
16. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
APPENDIX A: XO MPLS IP-VPN: Converged Voice, Data, and Video Solution with
Class of Service Routing
XO MPLS provides performance and flexibility with Class of Service routing and traffic
prioritization, ensuring that critical applications get the quality of service they need.
16
Solutions you want. Support you need.
17. XO Communications
APPENDIX B: XO MPLS IP-VPN Secure, Scalable, Redundant Solution
for Multi-site Networks
XO-managed MPLS supports financial services company with robust disaster recovery,
redundancy, scalable access speeds (from DS-1 to Gigabit Ethernet), and XO-managed
solutions without requiring major capital outlay for a new network.
17
18. A Business Guide to MPLS IP-VPN Migration: Five Critical Factors
APPENDIX C: XO MPLS IP-VPN Supports a Wide Range of Integrated VoIP
Service Offerings
Fig. C: From legacy key systems to IP PBX systems, XO can design a flexible, fully
managed solution to meet your network migration needs.
EXAMPLES PRESENTED FOR DEMONSTRATION PURPOSES
18
Solutions you want. Support you need.