The document proposes Ethernet VPN (E-VPN) as a solution to overcome scaling challenges with the existing Virtual Private LAN Service (VPLS) technology. E-VPN uses MPLS and BGP to transport layer 2 connectivity between data centers. It treats MAC addresses as routable addresses and uses MP-iBGP to distribute customer MAC addresses between edge routers. This allows for remote MAC learning and helps scale to thousands of MAC addresses. The document also describes how E-VPN uses Ethernet Segment IDs and split horizon labels to avoid layer 2 loops in multi-homing scenarios.
An overview of Ethernet WAN deployment and of the benefits to the Service Provider of Ethernet Demarcation Devices, for both 'wires only' Ethernet Access to IP VPNs and for native Ethernet WAN Services.
The document discusses Ethernet VPN (EVPN) use cases and applications. It provides background on EVPN, describing how it uses BGP to advertise MAC addresses and next hops. EVPN supports multi-homing and provides integrated Layer 2 and Layer 3 forwarding. The document outlines several use cases for EVPN including data center and data center interconnect, service chaining using policy-based routing to virtual network functions, Internet exchange points, and provider VPNs.
- MPLS stands for Multi-Protocol Label Switching and was originally introduced to improve router forwarding speeds and meet bandwidth management requirements in IP networks.
- MPLS uses labels to forward packets based on their destination rather than long IP addresses. Label Edge Routers assign labels and interface with external networks, while Label Switch Routers in the core switch packets based on their labels.
- MPLS establishes Label Switched Paths between ingress and egress routers to efficiently route packets through the network based on forwarding tables that map incoming to outgoing labels. This allows traffic engineering and quality of service control.
EVPN is a network virtualization technology that allows Ethernet services to be delivered across MPLS or IP networks. It uses BGP for the control plane to distribute MAC and IP addresses and can support both single-active and all-active multi-homing topologies. EVPN provides flexibility in service delivery and has been widely adopted by major service providers and cloud providers for a variety of use cases including data center interconnect and virtual machine mobility. Automation of EVPN configuration can simplify provisioning and management through the use of tools like NetBox, Python scripts, Ansible, and workflow managers.
Segment Routing Advanced Use Cases - Cisco Live 2016 USAJose Liste
The document discusses segment routing and its use for inter-domain connectivity at scale. Segment routing allows source routing by encoding a path as an ordered list of segments in packet headers. It can be used to interconnect massive-scale datacenters and networks with hundreds of thousands of nodes. Segment routing scales through the use of globally unique prefix segments, redistribution of routing information only from the core to edges, and segment routing path computation elements. The path computation elements use segment routing native algorithms to optimize paths while maintaining equal-cost multipath routing.
Alu xgpon solution for pt telkom akses 20130830+Wahyu Nasution
Alcatel-Lucent presented their XGPON solution for Telkom. They discussed their leadership in fiber access markets with over 20 years of innovation. Their 7360 ISAM FX platform supports current and next-generation PON technologies with high capacity and redundancy. They demonstrated their full portfolio of DSLAMs, ONTs, and customer premises equipment to accommodate any network deployment.
FabricPath is a Layer 2 technology from Cisco that provides multi-path Ethernet capabilities and eliminates the need for Spanning Tree Protocol. It combines the benefits of Layer 2 switching with greater scalability, availability, and loop prevention capabilities. FabricPath adds routing-like capabilities to Layer 2 switching such as all active links, fast convergence, and built-in loop avoidance mechanisms.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
An overview of Ethernet WAN deployment and of the benefits to the Service Provider of Ethernet Demarcation Devices, for both 'wires only' Ethernet Access to IP VPNs and for native Ethernet WAN Services.
The document discusses Ethernet VPN (EVPN) use cases and applications. It provides background on EVPN, describing how it uses BGP to advertise MAC addresses and next hops. EVPN supports multi-homing and provides integrated Layer 2 and Layer 3 forwarding. The document outlines several use cases for EVPN including data center and data center interconnect, service chaining using policy-based routing to virtual network functions, Internet exchange points, and provider VPNs.
- MPLS stands for Multi-Protocol Label Switching and was originally introduced to improve router forwarding speeds and meet bandwidth management requirements in IP networks.
- MPLS uses labels to forward packets based on their destination rather than long IP addresses. Label Edge Routers assign labels and interface with external networks, while Label Switch Routers in the core switch packets based on their labels.
- MPLS establishes Label Switched Paths between ingress and egress routers to efficiently route packets through the network based on forwarding tables that map incoming to outgoing labels. This allows traffic engineering and quality of service control.
EVPN is a network virtualization technology that allows Ethernet services to be delivered across MPLS or IP networks. It uses BGP for the control plane to distribute MAC and IP addresses and can support both single-active and all-active multi-homing topologies. EVPN provides flexibility in service delivery and has been widely adopted by major service providers and cloud providers for a variety of use cases including data center interconnect and virtual machine mobility. Automation of EVPN configuration can simplify provisioning and management through the use of tools like NetBox, Python scripts, Ansible, and workflow managers.
Segment Routing Advanced Use Cases - Cisco Live 2016 USAJose Liste
The document discusses segment routing and its use for inter-domain connectivity at scale. Segment routing allows source routing by encoding a path as an ordered list of segments in packet headers. It can be used to interconnect massive-scale datacenters and networks with hundreds of thousands of nodes. Segment routing scales through the use of globally unique prefix segments, redistribution of routing information only from the core to edges, and segment routing path computation elements. The path computation elements use segment routing native algorithms to optimize paths while maintaining equal-cost multipath routing.
Alu xgpon solution for pt telkom akses 20130830+Wahyu Nasution
Alcatel-Lucent presented their XGPON solution for Telkom. They discussed their leadership in fiber access markets with over 20 years of innovation. Their 7360 ISAM FX platform supports current and next-generation PON technologies with high capacity and redundancy. They demonstrated their full portfolio of DSLAMs, ONTs, and customer premises equipment to accommodate any network deployment.
FabricPath is a Layer 2 technology from Cisco that provides multi-path Ethernet capabilities and eliminates the need for Spanning Tree Protocol. It combines the benefits of Layer 2 switching with greater scalability, availability, and loop prevention capabilities. FabricPath adds routing-like capabilities to Layer 2 switching such as all active links, fast convergence, and built-in loop avoidance mechanisms.
This document provides an overview and student guide for the "Implementing Cisco MPLS (MPLS) Version 2.2" course. It introduces basic MPLS concepts including the MPLS architecture, labels, label stacks, and applications such as MPLS VPNs and traffic engineering. It also covers frame-mode MPLS implementation on Cisco IOS platforms, including configuration, monitoring, and troubleshooting tasks. Finally, it discusses MPLS VPN technology in depth, including the MPLS VPN architecture, routing model, and packet forwarding mechanisms.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
MPLS provides mechanisms for traffic engineering by allowing routers to forward packets based on fixed-length labels rather than long variable length IP addresses. MPLS labels are assigned to packets at ingress routers and swapped or removed by transit and egress routers along the Label Switched Path (LSP). Routers can be configured with constraints and administrative groups to calculate optimal LSP paths using protocols like RSVP and LDP.
This document provides an introduction to segment routing. It discusses:
- The objective of segment routing is to enable source routing without requiring state in intermediate nodes.
- Segment routing allows encoding paths as sequences of topological sub-paths called segments. Segments can represent nodes, links, or services.
- The IETF SPRING working group is standardizing segment routing to address issues with scalability of traffic engineering and fast reroute with protocols like RSVP-TE and LDP. Segment routing aims to provide these capabilities without per-flow state.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
Cisco Packet Transport Network – MPLS-TPCisco Canada
The document discusses Cisco's Packet Transport Network solution for MPLS-TP. It begins by outlining the challenges facing network operators as packet traffic grows. It then introduces the Packet Optical Transport System (P-OTS) and its keys, including determinism, resiliency, bandwidth efficiency, legacy support, and service scalability. The document goes on to describe how MPLS-TP addresses these challenges by converging data and transport networks and providing carrier-grade SLA, OAM, and resiliency capabilities comparable to SONET/SDH. It outlines MPLS-TP components, encapsulation, resiliency options, and OAM functionality including connectivity check, continuity verification, and fault detection.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
BFD is a protocol that can quickly detect failures in the forwarding path between two adjacent routers, including interfaces, data links, and forwarding planes. It operates in two modes: asynchronous mode where it periodically sends control packets, and demand mode where it only sends packets when needed. When a failure is detected, BFD triggers routing protocol actions to recalculate the routing table and reduce convergence time. It provides fast failure detection independently of media, encapsulation, topology, or routing protocol. Configuring BFD involves setting intervals at the interface level and enabling it for routing protocols.
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
Do you wish that you could provide more automatic methods to monitor your network? Have you ever wasted hours to capture evidence of a transient network issue? Do you know which part of your network is likely to fail next? And how to prevent it? Your Cisco IOS® Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This session uncovers embedded Network Automation capabilities you can use to interact with your network elements for the purpose of implementing network testing, verification and service assurance in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
Cisco asa firewall command line technical guideMDEMARCOCCIE
This document provides a summary of common commands used to manage Cisco ASA firewalls. It covers basic connectivity and routing protocols, security configurations, management access, NAT/PAT procedures, and troubleshooting. The commands are intended to streamline the most used operations for network security engineers when administering Cisco ASA firewalls.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
This document provides an overview of GPON (Gigabit-capable Passive Optical Network) technology. It discusses the basic concepts and working principles of PON networks, comparing GPON to other PON standards like EPON. The document also analyzes key GPON standards and specifications, describes the GPON network model reference, and reviews basic GPON performance parameters and network protection modes.
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationRihab Chebbah
cette présentation est faite pour ma soutenance du PFE . Le sujet traité est : implémentation de la QoS sur le réseau IP/MPLS avec une solution de secours ADSL Pro Data.. éspérons qu'elle vous aide et vous plait !! :)
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
The document discusses Ethernet VPN (EVPN) functionality on Juniper Networks devices. It provides an overview of EVPN concepts including single-homed and multi-homed EVPN configurations, the differences between EVPN and VPLS, Junos support for EVPN, EVPN terminology, types of BGP routes used in EVPN, MAC learning processes, and trace log examples.
EVPN in Service Provider network
- EVPN allows service providers to create new revenue streams through network fabric designs that provide Ethernet Layer 2 and Layer 3 services. It protects investments by unifying networks on a single overlay and simplifying protocols and operations. EVPN can be deployed easily through seamless integration with existing networks and provides the same operational experience as IP VPNs.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
MPLS provides mechanisms for traffic engineering by allowing routers to forward packets based on fixed-length labels rather than long variable length IP addresses. MPLS labels are assigned to packets at ingress routers and swapped or removed by transit and egress routers along the Label Switched Path (LSP). Routers can be configured with constraints and administrative groups to calculate optimal LSP paths using protocols like RSVP and LDP.
This document provides an introduction to segment routing. It discusses:
- The objective of segment routing is to enable source routing without requiring state in intermediate nodes.
- Segment routing allows encoding paths as sequences of topological sub-paths called segments. Segments can represent nodes, links, or services.
- The IETF SPRING working group is standardizing segment routing to address issues with scalability of traffic engineering and fast reroute with protocols like RSVP-TE and LDP. Segment routing aims to provide these capabilities without per-flow state.
This slide contains basic concept about MPLS and LDP protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
i will prepare MPLS_VPN and MPLS_QoS and MPLS_TE later.
Cisco Packet Transport Network – MPLS-TPCisco Canada
The document discusses Cisco's Packet Transport Network solution for MPLS-TP. It begins by outlining the challenges facing network operators as packet traffic grows. It then introduces the Packet Optical Transport System (P-OTS) and its keys, including determinism, resiliency, bandwidth efficiency, legacy support, and service scalability. The document goes on to describe how MPLS-TP addresses these challenges by converging data and transport networks and providing carrier-grade SLA, OAM, and resiliency capabilities comparable to SONET/SDH. It outlines MPLS-TP components, encapsulation, resiliency options, and OAM functionality including connectivity check, continuity verification, and fault detection.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017Bruno Teixeira
This session provides an overview of the segment routing technology and its use cases. This new routing paradigm provides high operational simplicity and maximum network scalability and flexibility. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is required.
BFD is a protocol that can quickly detect failures in the forwarding path between two adjacent routers, including interfaces, data links, and forwarding planes. It operates in two modes: asynchronous mode where it periodically sends control packets, and demand mode where it only sends packets when needed. When a failure is detected, BFD triggers routing protocol actions to recalculate the routing table and reduce convergence time. It provides fast failure detection independently of media, encapsulation, topology, or routing protocol. Configuring BFD involves setting intervals at the interface level and enabling it for routing protocols.
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkCisco Canada
Do you wish that you could provide more automatic methods to monitor your network? Have you ever wasted hours to capture evidence of a transient network issue? Do you know which part of your network is likely to fail next? And how to prevent it? Your Cisco IOS® Network provides a wealth of advanced device manageability instrumentation (DMI) and Embedded Automation Systems (EASy) to design and implement your own Network Automations. Learn how Network Automation allows you to automate manual tasks, better operate existing network services and even enable new and innovative networking solutions. This session uncovers embedded Network Automation capabilities you can use to interact with your network elements for the purpose of implementing network testing, verification and service assurance in a more effective, efficient and robust way. Network Automation fundamentals as well as the choice and use of appropriate practices are illustrated through a combination of presentation and best practice examples. The topic is relevant for network planners and administrators, engineers and system integrators for both enterprises and service providers.
Cisco asa firewall command line technical guideMDEMARCOCCIE
This document provides a summary of common commands used to manage Cisco ASA firewalls. It covers basic connectivity and routing protocols, security configurations, management access, NAT/PAT procedures, and troubleshooting. The commands are intended to streamline the most used operations for network security engineers when administering Cisco ASA firewalls.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
This document provides an overview of GPON (Gigabit-capable Passive Optical Network) technology. It discusses the basic concepts and working principles of PON networks, comparing GPON to other PON standards like EPON. The document also analyzes key GPON standards and specifications, describes the GPON network model reference, and reviews basic GPON performance parameters and network protection modes.
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationRihab Chebbah
cette présentation est faite pour ma soutenance du PFE . Le sujet traité est : implémentation de la QoS sur le réseau IP/MPLS avec une solution de secours ADSL Pro Data.. éspérons qu'elle vous aide et vous plait !! :)
This document provides an overview of Multi-Protocol Label Switching (MPLS) technology. It discusses MPLS fundamentals, components, operations, applications for traffic engineering, virtual private networks, and any transport over MPLS. It also outlines topics like MPLS label distribution, virtual private network models, and future developments in MPLS. The document is intended to guide readers on key concepts in MPLS and provide background for further study.
The document discusses Ethernet VPN (EVPN) functionality on Juniper Networks devices. It provides an overview of EVPN concepts including single-homed and multi-homed EVPN configurations, the differences between EVPN and VPLS, Junos support for EVPN, EVPN terminology, types of BGP routes used in EVPN, MAC learning processes, and trace log examples.
EVPN in Service Provider network
- EVPN allows service providers to create new revenue streams through network fabric designs that provide Ethernet Layer 2 and Layer 3 services. It protects investments by unifying networks on a single overlay and simplifying protocols and operations. EVPN can be deployed easily through seamless integration with existing networks and provides the same operational experience as IP VPNs.
The 3GPP evolution for the 3G mobile system created the new base station system, called Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and a new core network, called Evolved Packet Core (EPC) as a result of two standardisation projects: Long Term Evolution (LTE) and System Architecture Evolution (SAE). Under these specifications a mobile phone gets access to higher bandwidth with low latency in an improved and more efficient network architecture. The standards define an all-IP network as a base for the E-UTRAN/EPC. The E-UTRAN/EPC does not have a separate PS data traffic and CS voice network, both communicate over the same new Evolved Packet System (EPS) network. LTE/EPS Technology course is an intermediate technical course, which covers all aspects of architecture and functionality of the EPS.
The document discusses requirements for efficient mobile backhaul with carrier Ethernet to support LTE networks. It covers:
- LTE network architecture and how it impacts transport network requirements, including the need for multi-service capability, low cost per bit transport, and support for a transition to packet-based networks.
- Key transport network requirements created by LTE like powerful OAM, fast protection switching, strong QoS support, multicast/broadcast support, and interoperability with the packet core.
- How MPLS-TP can fulfill these requirements through features like VPN support, coordinated tunnel setup, comprehensive OAM tools, sub-50ms protection switching, and support for QoS, performance monitoring
The document discusses requirements for efficient mobile backhaul with carrier Ethernet to support LTE networks. It covers:
- LTE network architecture and how it impacts transport network requirements, including the need for multiservice capability, low cost per bit transport, and support for a transition to packet-based networks.
- Key transport network requirements created by LTE like powerful OAM, fast protection switching, strong QoS support, security, and interoperability with the packet core.
- How MPLS-TP can fulfill these requirements through features like VPN support, bearer provisioning across interfaces, coordinated tunnel setup, comprehensive OAM tools, and protection switching capabilities.
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPROIDEA
Ethernet VPN (EVPN) is a new standards-based protocol that interconnects Layer 2 domains over a shared IP/MPLS network. It improves on previous protocols like VPLS by supporting features like all-active multi-homing and control plane learning of MAC addresses. EVPN is ideally suited for datacenter interconnectivity but can also be used in other cases beyond just data centers. Major networking vendors support EVPN as shown by their participation in the relevant IETF working group.
The document discusses self-organizing networks (SON) and interference management techniques in SON. It explains that SON aims to reduce network deployment and maintenance costs through self-configuration, self-optimization, and self-healing. A key challenge is interference between indoor femtocells and outdoor macrocells. The document discusses how SON uses measurements from UEs and base stations to detect interference scenarios and optimize parameters like transmit power to mitigate interference.
VXLAN allows the creation of layer 2 networks over an existing layer 3 network by using an underlay network and overlay tunnels. VTEPs connect hosts to the overlay and tunnel layer 2 frames between each other after establishing IP reachability in the underlay. For communication between two hosts in the same VXLAN segment across the layer 3 network, the source VTEP will broadcast ARP requests to the multicast group to discover the destination host's MAC, and remote VTEPs will learn MAC to VNI mappings from each other via EVPN to support unknown unicast forwarding across the overlay without flooding.
E-VPN and PBB-EVPN are next generation MPLS-based L2VPN technologies that use BGP to distribute Ethernet segment and MAC address reachability information across the MPLS core. They provide all-active multi-homing and load balancing capabilities to maximize bandwidth utilization. PBB-EVPN encapsulates customer frames with backbone MAC addresses to enable split horizon filtering and optimize multicast forwarding.
This document discusses EVPN solutions and applications for data center (DC) and service provider (SP) segments. It provides an overview of EVPN, including its capabilities for multi-homing, fast convergence, and load balancing. The document outlines various IETF drafts related to EVPN for applications like DC fabrics, inter-route bridging (IRB), and inter-DC connectivity. It compares EVPN to other layer 2 VPN solutions and discusses uses of EVPN for VPWS, E-Tree, and in conjunction with Provider Backbone Bridging (PBB-EVPN).
This document provides an overview of LTE including:
1) What LTE is and why it was needed to replace 3G networks
2) The Evolved Packet System (EPS) architecture consisting of the Evolved UTRAN and Evolved Packet Core
3) Key components of the Evolved Packet Core including the MME, SGW, and PDN-GW and their functions
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...Daniele Gianni
Conference Presentation at the SESP Workshop (Simulation and EGSE for European Space Applications), September, 2009
Please visit
https://sites.google.com/site/simulationarchitecture/
for further information
The document summarizes the future of optical networking. It predicts modest post-bubble growth driven by revenue, with most spending still on SONET/SDH rather than WDM. It outlines the adoption of multi-service provisioning platforms, multi-service switching platforms, and multi-service transport platforms over time. Finally, it describes how MSPPs, MSSPs, and MSTPs fit into access/collector, intra-metro/regional, and inter-office networks.
Migrating from dynamic multipoint vpn phase 2 to phase 3vijayd2015
This document discusses migrating from Dynamic Multipoint VPN (DMVPN) Phase 2 to Phase 3. Phase 3 provides benefits like reduced latency during spoke-to-spoke tunnel setup, improved resilience to hub failures, and allows for hierarchical hub designs. It also provides more flexibility in network topology and routing protocols. The document recommends migrating Phase 2 networks to take advantage of these Phase 3 enhancements.
The document proposes a solution for scaling LDP-based pseudowire (PW) services across multiple regions. It uses LDP signaling for setting up intra-region PWs and BGP for inter-region stitching and routing. The solution allows PW services to extend across autonomous systems and areas without requiring protocols like BGP on terminating provider edges (T-PEs). Provisioning and signaling are simplified through the use of attachment identifiers and route targets. Existing T-PE capabilities are largely reused through minor extensions to FEC-128/129 signaling over LDP. BGP routing between switching provider edges (S-PEs) avoids a full mesh of LDP sessions to improve scaling as the number of T-
Evaluation of scalability and bandwidthIJCNCJournal
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.
The document provides an introduction to MPLS (Multi Protocol Label Switching) including:
- MPLS uses labels attached to packets and a label forwarding table to make packet forwarding decisions instead of using IP headers and routing tables.
- MPLS labels are assigned and distributed by the Label Distribution Protocol (LDP).
- MPLS enables traffic engineering by allowing traffic to be shifted onto less utilized links and tunnels to be used to guarantee bandwidth between points.
- RouterOS supports MPLS features including static label binding, LDP, VPLS, RSVP TE tunnels, and can be used to transition from an EoIP solution to a VPLS.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
The document discusses the evolution of mobile data service architectures from 2G/3G/4G to a next-generation architecture. It proposes a new architecture with a flattened network structure and optimized, integrated system design. The new architecture features an open management interface, separated control and data planes, and extensibility to support future transactions per second needs. It aims to provide a multi-service environment with in-line services, subscriber management, and flexible virtualization capabilities.
This document summarizes a presentation on analyzing the scalability of a Media Aware Network Element (MANE). The MANE acts as an edge router to identify media traffic and enforce service level agreements. It was implemented using Click modular router on Linux with minimal overhead. Experiments showed forwarding performance was similar to standard Linux while supporting quality of service policies. Future work includes improving classification and multicast support to further optimize scalability.
Similar to Ethernet VPN - Layer 2 Scalability (20)
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Introduction
MPLS (Multi-Protocol Label Switching) is matured technology & has widely been opted by most of the
service providers across the globe. Initially it has been deployed for fast switching but due to its
scalability, resiliency & protocol agnostic nature made it more successful across the network. MPLS not
only provides the wan connectivity but also acts as a platform for service providers to offer different
kind of services which can further be used for monetization purpose.
VPLS (Virtual Private LAN Services) is one of the service offering in MPLS which helps to provide the
extension of broadcast domain from one to multiple sites over the wan. VPLS became more popular
after the outburst of data center interconnects. The utmost reason for the extension of layer 2 domains
is workload mobility (Migration of Virtual machines from one data center to another), high availability
clusters, and geographical redundancy.
Current Challenges with VPLS
1. Scaling of thousands of MAC addresses (Single VM requires single mac address):- Virtualization
applications are fueling the need of the mac-address in the network. A single server which can
host hundreds of virtual machines and every machine consume one mac address which clearly
justifies the scaling requirement of mac-address tables.
2. Optimal forwarding of multicast:- Multicast LSP can be formed in conjunction with VPLS but
limited to point to multipoint which consumes more network resources as there is no defined
set of parameters in VPLS to create multipoint to multipoint multicast LSPs.
3. MultiHoming:- VPLS supports Active/standby BGP multi homing model. MultiHoming with all
active attached circuits is not possible. In contract, customer can utilize only 50% of the links in
lieu of 100% payment.
4. C-Mac (Customer Mac) Transparency:- Current VPLS solution doesn’t support the transparency
of customer mac address.
5. Fast Convergence for C-Mac Flushing:- In case of failure of virtual machines or physical servers,
network re-convergence will occur which may lead to the mac flushing problems.
Shivlu Jain www.mplsvpn.info
3. Proposed Solution
Ethernet Virtual Private Network (E-VPN) is the proposed solution to overcome the issues highlighted by
VPLS. E-VPN uses the existing MPLS/IP backbone to transport the layer 2 connectivity among the various
data centers which are part of same VPN. Being layer-2 extension, the solution treats the mac addresses
as routable addresses and uses the existing MP-iBGP protocol to carry the customer mac addresses. In E-
VPN, mac learning at the edge routers doesn’t occur in data plane but in the control plane consequences
more control could be applied in terms of the learning mechanism. The process is similar to the IPVPN as
mentioned in RFC 4364. The policy attributes specified in E-VPN are almost similar in MPLS VPN. RD and
RT remains the same, but instead of virtual routing forwarding instance we have now Ethernet VPN
Instance. The information about Ethernet TAG of EVI is advertised by the new BGP NLRI which is E-VPN.
P2 P1
MES2 100
MES2 MES2 100 22
MES1
Destination EVPN Destination EVPN IGP Label
MES2 100 20
MPLS
CLOUD Destination EVPN IGP Label
MES2 100 PHP MES2 100 21
Destination EVPN Destination EVPN IGP Label
H2,M2 H1,M1
Source Destination
Data Center P3 Data Center
Cloud Cloud
H1,M1
Traffic Forwarding From Host(H2,M2) To Host(H1,M1)
Figure 1
In EVPN, the mac learning could be of two types:-
1. Local Mac Learning
2. Remote Mac Learning
In local mac learning process, MPLS Edge Switch (MES) must support the local mac learning process
through standard protocols. Once the local learning process gets complete, MES can advertise the
locally learn mac address to remote MES nodes via MP-iBGP. This process of receiving the remote mac
addresses of attached customer via MP-iBGP is known as remote mac learning process.
Shivlu Jain www.mplsvpn.info
4. Solution for MultiHoming and Avoiding Layer 2 Loops in EVPN
Ethernet Segment ID (ESI) is used when Customer Edge device is multi homed to different MPLS Edge
Switches as shown in Figure 2. It has new MPLS BGP Label Extended community which is used for split
horizon procedures in multi homing scenarios. As depicted in figure 2, host H1 has mac address of M1. It
sends the broadcast request to MES-1 and MES2. MES-1 and MES-2 identified that the request is coming
from Extended Segment ID-1, so before replicating the frames both MESs will append a split horizon
label on the frames. Once it will be done, frames get exchanged among the MESs. All MESs check the SH
label and if found the same ESI-1 is directly attached, the traffic is silently dropped because a frame
originated by a segment must not be received by the same segment. This technique helps to avoid
loops in multi homing scenarios.
Step-2
MES-1 will append split
horizon(SH) label for
multi destination and
distributes over MP- Step-3
iBGP. MES-2,MES-3 and MES-3 will install that
MES-4will use SH label route as nexy hop MES-
Step-1 1 and MES-2
to perform split horizon
H1,M1 sends broadcast
filtering for frames
request as source mac
destines to ESI-1.
M1 and destination as
Broadcast
MES-1 MES-3
ESI-1
Data Center Data Center
Cloud/Enterprise MP-iBGP
Full Mesh Cloud/Enterprise
H1,M1
H2,M2
MES-2 MES-4
Step-1
H1,M1 sends broadcast
request as source mac Step-2
M1 and destination as MES-2 will append split
Step-3
Broadcast horizon(SH) label for
MES-4 will install that
multi destination and
route as next hop MES-
distributes over MP-
1 and MES-2
iBGP. MES-2,MES-3 and
MES-4will use SH label
to perform split horizon
filtering for frames
destines to ESI-1.
Figure 2
Shivlu Jain www.mplsvpn.info
5. Note:- Split horizon label is only used for unknown unicast, multicast and broadcast
Role of Designated Forwarder
As per figure 2, MES-3 and MES-4 will receive the multi destination frames via MP-iBGP for particular
segment. How will it be decided which MES has to forward the frames to downstream segment? Only
Designated Forwarder will forward the frames to particular segment and Designated forwarder election
is performed by each PE advertising the ESI in BGP route. All the non-Designated Forwarder MES will
block their respective port for that segment as shown in Figure 3.
MES-3 is elected as
Designated
Forwarder(Highest IP
Address) for ESI-2
segment.
MES-1 MES-3
ESI-1
Data Center Data Center
MP-iBGP ESI-2
Cloud/Enterprise Cloud/Enterprise
Full Mesh
H1,M1
X H2,M2
MES-2 MES-4
MES-4 is elected as
non-Designated
Designated Forwarder Election
Forwarder for ESI-2
segment. So MES-4 port
towards ESI-2 Segment
will remain in blocking
state
Figure 3
Load Balancing
As per figure 3, MES-3 & MES-4 is receiving the update of host H1 with Mac M1 from MES-1 and MES-2
with Ethernet segment of ESI-1. So MES-3 and MES-4 install the two routes in the Forwarding
Information Base. Once the traffic of M1 destination is received both the routers will do the load
balancing during forwarding. The core will forward the traffic on the basics of next hop information for
M1 which is MES-1 and MES-2.
Shivlu Jain www.mplsvpn.info
6. Scaling by using Provider Backbone Bridge (PBB)
The EVPN scalability is achieved by using the existing technique of Provider Backbone Bridge aka PBB.
Below are the advantages while using PBB in EVPN:-
1. Subnetting of C-MAC addresses is not possible. But by using PBB, B-MAC addresses can be
subnetted easily which leads to mac address scalability.
2. In case of shifting of VM or local customer networks from one DC to another requires lot of mac
flushing. But by using B-MAC that C-MAC flushing will become transparent which leads to fast
convergence.
3. Per Site Policy Support by using B-MAC
4. Device MultiHoming
5. Network MultiHoming
6. C-MAC addresses need to be distributed in BGP but by using PBB-EVPN C-MAC advertisement
could be limited by assigning multiple C-MAC addresses to single B-MAC address.
References
EVPN requirement
http://tools.ietf.org/html/draft-sajassi-raggarwa-l2vpn-evpn-req-00
BGP/MPLS IP VPN
http://tools.ietf.org/html/rfc4364
PBB-EVPN
http://tools.ietf.org/html/draft-ietf-l2vpn-pbb-evpn-03
VPLS
http://tools.ietf.org/html/rfc4762
EVP
http://tools.ietf.org/html/draft-ietf-l2vpn-evpn-00
Shivlu Jain www.mplsvpn.info