A presentation given by RAD’s CTO, Dr. Yaakov Stein, at the 2012 MPLS and Ethernet World Congress. The presentation compares the two technologies in ten critical categories and grades them on suitability, coverage and maturity
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Overview of the MPLS backbone transmission technology.
MPLS (MultiProtocol Layer Switching) is a layer 2.5 technology that combines the virtues of IP routing and fast layer 2 packet switching.
IP packet forwarding is not suited for high-speed forwarding due to the need to evaluate multiple routes for each IP packet in order to find the optimal route, i.e. the route with the longest prefix match.
However, Internet Protocol routing provides global reachability through the IP address and through IP routing protocols like BGP or OSPF.
Layer 2 packet switching has complementary characteristics in that it does not provide global reachability through globally unique addresses but allows fast packet forwarding in hardware through the use of small and direct layer 2 lookup addresses.
MPLS combines IP routing and layer 2 switching by establishing layer 2 forwarding paths based on routes received through IP routing protocols like BGP or OSPF.
Thus the control plane of an MPLS capable device establishes layer 2 forwarding paths while the data plane then performs packet forwarding, often in hardware.
MPLS is not a layer 2 technology itself, i.e. it does not define a layer 2 protocol but rather makes use of existing layer 2 technologies like Ethernet, ATM or Frame Relay.
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
MPLS-TP is subset of MPLS. It uses the same data plane as used by MPLS (Defined in RFC 3031 and RFC 3032). MPLS-TP has four major areas:-
1. Data Plane
2. Control Plane
3. O&M
4. Survivability
MPLS-TP has no control plane, the reason for this was that the recovery. If the dynamic control plane is used, in that case the convergence would depend on the dynamic protocol and providers cannot leverage the <50 ms failover time in that case. It uses the same QoS diffserv model except uniform model as used in MPLS.
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
In the second of our two-part series on EVPN, Cumulus Networks Chief Scientist Dinesh Dutt dives into more technical details of network routing, EVPN use cases, and best practices for operationalizing EVPN in the data center.
To view the recording of this webinar, visit http://go.cumulusnetworks.com/l/32472/2017-09-23/95t7xh
this slide contains fundamental concept about VPLS protocol, according to the latest version of Cisco books and i taught it at IRAN TIC company.in the next slide, i upload attractive advanced feature about VPLS.
(Some of the pictures in this slide are borrowed from the wonderful site of my good friend Gokhan Kosem)
(www.ipcisco.com)
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
This presentation reviews the various tools that carrier-grade Ethernet offers to meet the performance required from the ICT network and discusses strategies for the transition to Smart Grid communications
As SDH/SONET networks are being phased out, power utilities are starting to migrate to future-proof packet networks. This presentation reviews and compares Carrier Ethernet, MPLS and MPLS-TP to help power utilities determine which alternative offers the best fit for the operational needs of their mission-critical applications.
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
MPLS-TP is subset of MPLS. It uses the same data plane as used by MPLS (Defined in RFC 3031 and RFC 3032). MPLS-TP has four major areas:-
1. Data Plane
2. Control Plane
3. O&M
4. Survivability
MPLS-TP has no control plane, the reason for this was that the recovery. If the dynamic control plane is used, in that case the convergence would depend on the dynamic protocol and providers cannot leverage the <50 ms failover time in that case. It uses the same QoS diffserv model except uniform model as used in MPLS.
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
In the second of our two-part series on EVPN, Cumulus Networks Chief Scientist Dinesh Dutt dives into more technical details of network routing, EVPN use cases, and best practices for operationalizing EVPN in the data center.
To view the recording of this webinar, visit http://go.cumulusnetworks.com/l/32472/2017-09-23/95t7xh
this slide contains fundamental concept about VPLS protocol, according to the latest version of Cisco books and i taught it at IRAN TIC company.in the next slide, i upload attractive advanced feature about VPLS.
(Some of the pictures in this slide are borrowed from the wonderful site of my good friend Gokhan Kosem)
(www.ipcisco.com)
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
This presentation reviews the various tools that carrier-grade Ethernet offers to meet the performance required from the ICT network and discusses strategies for the transition to Smart Grid communications
As SDH/SONET networks are being phased out, power utilities are starting to migrate to future-proof packet networks. This presentation reviews and compares Carrier Ethernet, MPLS and MPLS-TP to help power utilities determine which alternative offers the best fit for the operational needs of their mission-critical applications.
As SDH/SONET networks are being phased out, power utilities are starting to migrate to future-proof packet networks. This presentation reviews and compares Carrier Ethernet, MPLS and MPLS-TP to help power utilities determine which alternative offers the best fit for the operational needs of their mission-critical applications.
MPLS-TP control plane is beneficial. It brings significant automation and reduced OPEX. Management is provisioned and control plane NEs will co-exist in many networks. Many vendors are building NEs with both management and control plane provisioning.
SDN programming and operations requires continuous monitoring of network and application state as well as consistent configuration and update of (forwarding) policies across heterogeneous devices. This is resulting in significant challenges.
Multiple open protocols such as OpenFlow, OF-CONFIG, OnePK , etc. are being adopted by different vendors causing an integration problem for developers.
Internet of Things applications are pushing the size and volume of data handled by SDN systems demanding more efficient and scalable protocols for information distribution and coordination of SDN devices.
This presentation will describe these and other SDN challenges and ways in which various open protocols, such as DDS, XMPP, AMQP, are being used to address them.
Robust Cyber Security for Power UtilitiesNir Cohen
The security of critical networks is at the center of attention of industry and government regulators alike. Check Point and RAD offer a joint end-to-end cyber security solution that protects any utility operational technology (OT) network by eliminating RTU and SCADA equipment vulnerabilities, as well as defends against cyber-attacks on the network’s control and data planes. This solution brief explains how the joint solution enables compliance with NERC-CIP directives, provides deep visibility and control of ICS/SCADA communications, and allows secure remote access into OT networks.
Replacing end-of-life PDH/SDH/SONET multiplexers in critical infrastructure communications. Learn how to deal with legacy equipment obsolescence and leased line service termination by Telcos, while preparing for smart applications and new packet services.
V cpe deployment-best-practices-presentationNir Cohen
A review of the various vCPE implementation options available for service providers and the factors that should be considered to avoid pitfalls and ensure optimal results.
NERC-CIP’s most recent release, version 5, focuses primarily on BES substations and their critical Cyber Assets (CA), by establishing an Electronic Security Perimeter (ESP) around the substation’s control system. RAD’s Megaplex, a major building block in RAD’s Service Assured Networking (SAN) solutions for power utilities, is strategically located to manage all electronic access to the substation and the cyber assets within it from external and internal attacks.
This paper reviews Megaplex’ 3-tier ESP protection and outlines how it helps power utilities boost their compliance with NERC CIP 005 and 007 requirements
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsNir Cohen
Dr. Yuri Gittik is taking a closer look at the different approaches to implement NFV solutions is carrier networks, the advantages and disadvantages of each approach and how these approaches are affecting the implementation costs.
Time distribution strategies in cellular networksNir Cohen
This paper reviews the various methodologies currently available for ensuring Time of Day (ToD) synchronization in cellular networks. It also introduces RAD’s revolutionary Distributed GMTM scheme, designed to deliver superb ToD accuracy at a lower cost in LTE and small cell networks, by bringing Grandmaster functionality closer to the base station in a small form factor device.
This paper presents a brief overview of today’s mobile backhaul market, outlines the unique challenges facing mobile operators and backhaul transport providers, and suggests strategies for improving network performance and coverage. Key emphasis is on the OAM, resiliency, Quality of Service (QoS) and timing technologies required for cost-efficient backhaul of 2G/3G/4G/LTE and small cells traffic.
Carrier grade ethernet for power utilities - solution paperNir Cohen
This paper reviews the various tools that carrier-grade Ethernet offers to meet the performance required from the ICT network and discusses strategies for the transition to Smart Grid communications
There is a pressing need to distribute accurate timing, i.e., frequency and/or Time of Day (ToD), across Packet Switched Networks (PSNs) for applications such as cellular backhaul. This paper reviews the main issues involved in timing over packet (ToP) demarcation and provides best practices for ToP demarcation and performance monitoring.
A review of current trends and challenges in the Carrier Ethernet services market, various deployment strategies adopted by service providers and their effects on network access planning
Teleprotection signals from protective relays are among the most critical data transmitted across utility networks, as they help manage the power grid load, as well as to protect equipment within the power network from severe damages resulting from faulty HV lines. By enabling load-sharing, grid adjustments and immediate fault clearance, Teleprotection has a decisive role in ensuring uninterrupted power supply and therefore requires special attention with regards to network performance and reliability. Specifically, protection commands must be assured immediate delivery when problems are detected, so that faulty equipment can be disconnected before causing a system-wide damage.
In this presentation, RAD’s Chief Scientist, Dr. Yaakov Stein, reviews the evolution of Ethernet OAM tools and practices and discusses the drivers for their developm
Ce the cio perspective part iii v2 1 9-6-11Nir Cohen
This is the third presentation out of 3 on Slideshare reviewing the enterprise needs, issues and considerations from WAN services from CIO point of view. This presentation series is for CIOs and the providers that offer such services. All you need to know about carrier Ethernet service levels and SLAs – what matters to the users and what a service provider should offer.
Part I – why chose carrier Ethernet WAN services
Part II – Service levels and SLA
Part III – Ethernet and IP VPNs – when to use each
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
This is the second presentation out of 3 on Slideshare reviewing the enterprise needs, issues and considerations from WAN services from CIO point of view. This presentation series is for CIOs and the providers that offer such services. All you need to know about carrier Ethernet service levels and SLAs – what matters to the users and what a service provider should offer.
Part I – why chose carrier Ethernet WAN services
Part II – Service levels and SLA
Part III – Ethernet and IP VPNs – when to use each
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Ethernet vs-mpls-tp-in-the-access-presentation
1. Ethernet vs. MPLS-TP
in Access Networks
Yaakov (J) Stein
CTO
RAD Data Communications
Ethernet vs. MPLS-TP in the Access Slide 1
2. Agenda
Is MPLS-TP ready to replace Ethernet as the packet technology
that dominates access networks?
• Brief review of access networks
• Characteristics of Ethernet and MPLS-TP
• Technical comparison: Ethernet vs. MPLS-TP
Ethernet vs. MPLS-TP in the Access Slide 2
4. Access Network Considerations
Residential
Customers
(IP)
Access Network: Core:
Q-in-Q Ethernet? MPLS or IP
Business Customers interface
(IP or Ethernet) MPLS-TP ? (and theoretically PBB)
Cell Sites
(IP and/or Ethernet
and/or TDM Other Data
Other Internet Centers
and Timing) customer
customer
sites
sites
Ethernet vs. MPLS-TP in the Access Slide 4
5. Why Ethernet and MPLS-TP ?
First Mile
Customer Core
Network: Access Network Network:
Ethernet MPLS
Last Mile
• Ethernet started in customer networks (LAN) and over the
years has moved into the access network (MEF)
• MPLS started in the core network and is now trying to
conquer the access network
Ethernet vs. MPLS-TP in the Access Slide 5
6. Access Network Segmentation
First/Last Mile Middle Mile
NTU/CLE Access
Node
+ Aggregation
Backhaul
Access Network
A recent trend is to segment the access network into:
• First/Last Mile
– Provides connectivity from customer site to first access node
– Leverages physical layer technologies such as DSL, active/passive fiber,
microwave, HSDPA+, LTE, …
• Middle Mile
– Collects and aggregates traffic from multiple access nodes
– Provides backhaul towards core
Ethernet vs. MPLS-TP in the Access Slide 6
7. Access / Core Differences (1)
Differences between core and access networks may translate to
protocol requirements differences:
Core Access Impact
No. of Few – routers, Many – CPEs, NTUs, • Strong pressure on
Network LSRs, switches DSLAMs, access NE price levels
Elements aggregators • Access needs to be
as “touchless” as
possible
Data Rates Higher Lower • Core may guarantee
QoS by resource
over-provisioning
• Access needs QoS
mechanisms
Ethernet vs. MPLS-TP in the Access Slide 7
8. Access / Core Differences (2)
Core Access Impact
Topology Richly connected Simple – typically • Fault in access network
trees or rings affects fewer people, but
fewer bypass options
• Core can get away with
fast rerouting
• Access network requires
OAM and planned APS
Security “Walled garden”: Easily accessible • Customer networks also
• Strong security considered walled gardens
to and from • Impractical to protect the
the outside entire access network
world
• Loose security
on the inside
Ethernet vs. MPLS-TP in the Access Slide 8
10. Ethernet / MPLS-TP Differences (1)
While both Ethernet and MPLS are commonly used to carry IP,
there are some fundamental protocol differences:
Ethernet MPLS-TP
OSI Layer L0-L2 Requires a server layer to
(but may run over MPLS) transport it (which may be
Ethernet)
Packet Frames are inherently No PID
Identification self-describing
Scope Destination address: Only locally-meaningful labels
Global, not aggregated
Source Unique source address No source identifier
Identifier
Clients IP and other IP and other
Transport Over SDH/SONET, OTN Over SDH/SONET, OTN
Ethernet vs. MPLS-TP in the Access Slide 10
11. Ethernet / MPLS-TP Differences (2)
Ethernet MPLS-TP
OAM and • Fault Management • Fault Management
Protection • Performance Monitoring • Performance Monitoring
• APS • APS
IP Protocols • No routing protocol Leverages the entire IP suite
defined of protocols
• A number of L2CPs
Loop No Can tolerate transient loops
Tolerance (has TTL field)
Priority • 3-bit (e.g., DiffServ) 3-bit (DiffServ)
Marking • “Drop Eligibility”
Additional • Bandwidth Profiles None have been defined
Dedicated • Timing over Packet
Tools • Security (MACSec)
Developed By • IEEE • IETF
• Multiple competing SDOs • Multiple competing SDOs
Ethernet vs. MPLS-TP in the Access Slide 11
13. Comparison Criteria
1. Fault Management Functionality
2. Performance Management
Functionality
3. Automatic Protection Switching
Mechanisms
4. Quality of Service Mechanisms Each will be scored for:
5. Traffic – Handling Diverse Client Types Suitability: 2 points
6. Timing – High Accuracy Time and Coverage: 4 points
Frequency Distribution Maturity: 4 points
7. Integration with Surrounding
Networks
8. CapEx
9. OpEx
10. Security
Ethernet vs. MPLS-TP in the Access Slide 13
14. Fault Management Functionality:
The Arguments
The Need: Access networks require strong FM capabilities to minimize down-time
Ethernet
• Two OAM mechanisms (Y.1731/CFM and EFM)
• Unique source address, particularly amenable to trace-back functionality
• Q-in-Q is not true client-server, but this is covered up by MEL
• Y.1731 is full-featured – comprehensive set of FM TLVs
• EFM is more limited, but adds dying gasp critical for CPEs
• Interop issues of both OAMs have finally been resolved; remaining details
are resolved via implementation agreements (e.g., MEF-30)
MPLS-TP
• Had basic heartbeats (BFD) and diagnostics (LSP-ping)
• The IETF designed MPLS-TP FM based on the Generic Access Channel and:
• BFD for CC
• LSP-ping for on-demand diagnostics
• New frame formats to fulfill specific requirements
Ethernet vs. MPLS-TP in the Access Slide 14
15. Fault Management Functionality:
The Verdict
Ethernet MPLS-TP
No true address, requires
Highly suited (SA)
Suitability extra work
2 Points 1 Point
Y.1731 is full featured, EFM MPLS-TP FM similar to CFM
Coverage fulfills its requirements but missing dying gasp
4 Points 3 Points
Y.1731 and EFM are Some MPLS-TP features are
interoperable and widely seeing initial trials
Maturity deployed
4 Points 1 Point
Total 10 Points 5 Points
Ethernet vs. MPLS-TP in the Access Slide 15
16. Performance Management Functionality:
The Arguments
The Need: Useful tool for maintenance and diagnostics of the access network
Ethernet
• The ITU Y.1731 supports PM (loss, delay, PDV, …) using a request-response
model; IEEE 802.1ag does not
• Y.1731 is used as the basis for commissioning procedures (Y.1564)
• Widespread vendor interoperability has been demonstrated
MPLS-TP
• RFCs 6374, 6375 define a set of PM functions based on the GA Channel
• These functions were designed to be HW friendly, yet flexible
- Support byte or packet counters
- 1588 or NTP-style timestamps
- Traffic-counters or synthetic loss
• Implementations have yet to be announced
Ethernet vs. MPLS-TP in the Access Slide 16
17. Performance Management Functionality:
The Verdict
Ethernet MPLS-TP
Neither protocol has an inherent advantage or disadvantage
Suitability
2 Points 2 Points
Supports all features (may
Supports all features
Coverage be more flexible)
4 Points 4 Points
MPLS PM is not (widely)
Y.1731 is finally interoperable
Maturity implemented
4 Points 0 Points
Total 10 Points 6 Points
Ethernet vs. MPLS-TP in the Access Slide 17
18. Automatic Protection Switching:
The Arguments
The Need: APS is a complex subject, requiring careful protocol work and proper
configuration. Solutions required for both linear and ring protection
Ethernet
• Ethernet has a particular problem with rings
• There are many open loop ring protection (e.g., G.8032) but these are not
compatible with QoS mechanisms
MPLS-TP
• MPLS in the core exploits Fast ReRoute (RFC 4090) instead of APS
• But FRR requires rich interconnection and so is usually not applicable
to access networks
• The IETF has standardized RFC 6378 for MPLS-TP linear protection
• There are also proposals for ring protection
Ethernet vs. MPLS-TP in the Access Slide 18
19. Automatic Protection Switching:
The Verdict
Ethernet MPLS-TP
No particular strengths or
Not suitable for ring protection
Suitability weaknesses
0 Points 2 Points
G.8031/G.8032 fulfill current RFC 6378 (linear protection);
Coverage requirements no ring protection RFC yet
3 Points 2 Points
G.8031/G.8032 have been MPLS-TP only partially
extensively debugged and finalized and not yet
Maturity updated deployed
4 Points 1 Point
Total 7 Points 6 Points
Ethernet vs. MPLS-TP in the Access Slide 19
20. Quality of Service:
The Arguments
Two types of QoS need to be considered to manipulate traffic:
1. Hard QoS (engineering): Connection Admission Control, Resource Reservation
2. Soft QoS (conditioning): Priority marking, discard eligibility, queuing, bucketing
Ethernet
• PBB-TE (PBT) defines hard QoS, but is not widely implemented
• P-bits for prioritization marking; discard eligibility marking in S-VLANs
• MEF’s BW profile defines a bucketing algorithm
• Ethernet headers are self-describing – support Traffic Awareness
MPLS-TP
• MPLS-TE supports resource reservation but traffic engineering may not
be relevant for access networks
• Traffic Class (and L-LSPs) support DiffServ prioritization application
awareness – MPLS packets are not self-describing
• DPI is required for Traffic Awareness
Ethernet vs. MPLS-TP in the Access Slide 20
21. Quality of Service:
The Verdict
Ethernet MPLS-TP
Does not define for (bucket-
Supports all QoS types
Suitability based) traffic conditioning
2 Points 1 Point
MEF standards have been Without bucketing,
Coverage proven MPLS is at a disadvantage
4 Points 3 Points
BW profiles are standardized;
MPLS-TP – nothing special
Maturity certification programs
4 Points 0 Points
Total 10 Points 4 Points
Ethernet vs. MPLS-TP in the Access Slide 21
22. Traffic types:
The Arguments
The Need: No transport protocol is useful if it can’t transport the required client
traffic
Ethernet
• Differentiates traffic via Ethertype marking or LLC
• Can directly carry IPv4, IPv6, MPLS, Ethernet, fiber channel, and low-
rate TDM (MEF-8)
• Does not directly carry other legacy traffic types (e.g., ATM, frame relay)
• Can be carried indirectly via PHP’ed MPLS PWs
MPLS-TP
• Can carry IPv4, IPv6, MPLS, and PWs (and through which Ethernet, Fiber
Channel and all legacy types)
• Defining a new PW type requires IETF consensus but the new packet-PW
provides more freedom
Neither is universal but existing mechanisms can be extended to cover
new cases
Ethernet vs. MPLS-TP in the Access Slide 22
23. Traffic types:
The Verdict
Ethernet MPLS-TP
Supports arbitrary clients via Supports arbitrary clients via
Suitability Ethertypes PWs
2 Points 2 Points
Does not support all legacy Supports most traffic types
Coverage traffic types (ATM, FR) via PWs
2 Points 3 Points
Ethertypes have been widely PWs have been widely
Maturity deployed deployed
4 Points 4 Points
Total 8 Points 9 Points
Ethernet vs. MPLS-TP in the Access Slide 23
24. Timing:
The Arguments
The Need: Distribution of highly accurate timing (frequency and Time of Day)
is crucial for some access network applications, notably cellular backhaul
Ethernet
Two protocols have become standard for this purpose:
1. Synchronous Ethernet (SyncE) is Ethernet-specific
2. IEEE 1588-2008 (defined for Ethernet and UDP/IP) for Timing over
Packet; on-path support elements (Boundary Clocks or Transparent
Clocks) have only been defined for Ethernet
MPLS-TP
• MPLS does not define a physical layer
• The IETF TICTOC WG is presently working on 1588oMPLS
Ethernet vs. MPLS-TP in the Access Slide 24
25. Timing:
The Verdict
Ethernet MPLS-TP
May be able to support
Supports ToP and defines a
1588 but there can be no
Suitability physical layer to support SyncE
SyncMPLS
2 Points 1 Point
Meets all requirements with 1588oMPLS to support ToP
Coverage SyncE, 1588, BC, TC may be coming
4 Points 1 Point
ITU-T has defined profile(s) for MPLS presently has no
Maturity 1588 use timing support
4 Points 0 Points
Total 10 Points 2 Points
Ethernet vs. MPLS-TP in the Access Slide 25
26. Integration:
The Arguments
The access network needs to integrate with the core and customer networks.
Cost and complexity will be minimized by a smooth hand-off, i.e., access
protocol compatibility with other network protocols
• Customer networks may have Ethernet or TDM interfaces (IP over Ethernet,
Ethernet over TDM, Ethernet over SDH)
• Core networks are usually MPLS (IP over MPLS, MPLS over Ethernet, MPLS
over SDH)
Ethernet
• Ethernet in the access is a perfect match for customer networks
• Can not seamlessly interface with MPLS core
MPLS-TP
• A reasonable match for customer network protocols since they can be
tunneled over MPLS
• Reuses existing MPLS standards thus maximizing compatibility
Ethernet vs. MPLS-TP in the Access Slide 26
27. Integration:
The Verdict
Ethernet MPLS-TP
Best match for core
Perfect match for customer
network, but not for
Suitability network, but not for core
customer
1 Point 1 Point
Does not require GW for
Ethernet Q-in-Q and MAC-in-
forwarding to core, but
MAC perfect customer hand-
Coverage control protocols may not
off
interconnect
3 Points 2 Points
Ethernet Q-in-Q presently Seamless MPLS still in its
Maturity widely deployed infancy
4 Points 1 Point
Total 8 Points 4 Points
Ethernet vs. MPLS-TP in the Access Slide 27
28. CapEx:
The Arguments
The Need: Access network providers need to keep their costs down; due to the
large number of Network Elements, access networks are CapEx-sensitive
Ethernet
• Ethernet switching fabrics are inherently non-scalable (long global
addresses can’t be aggregated)
• Due to popularity, Ethernet switches are inexpensive (high volumes, large
R&D investment in cost reduction)
• However, carrier-grade Ethernet switches need extra functionality
• Ethernet supports CapEx-saving architectures (e.g., EPON)
MPLS-TP
• LSRs are complex and expensive – reducing the price of NEs (MPLS switch
instead of MPLS router) was the unstated motivation for MPLS-TP
• Pure MPLS NEs have simple forwarding engines and thus should be less
expensive than Ethernet switches, but still require Ethernet or SDH or
OTN interfaces
Ethernet vs. MPLS-TP in the Access Slide 28
29. CapEx:
The Verdict
Ethernet MPLS-TP
Inexpensive, but can not scale Allows for significant cost
Suitability forever reduction vs. full LSR
1 Point 2 Points
R&D and volumes have driven MPLS-TP-specific devices
Coverage down Ethernet CapEx can be low cost
4 Points 4 Points
Many trials are using LSRs;
MEF certification programs for
chip sets are starting to
Maturity carrier-grade Ethernet switches
come out to address
4 Points 2 Points
Total 9 Points 8 Points
Ethernet vs. MPLS-TP in the Access Slide 29
30. OpEx:
The Arguments
• OpEx considerations that are taken into account:
- Direct operations cost
- Staffing
- Minimizing “unchargeable” overhead
• Reduction of direct operations costs for networks with large number of NEs :
- Equipment must work reliably and be interoperate
- Minimum touch (auto-discovery, zero-touch configuration., etc.)
- Use of FM, Control Plane or Management Plane protocols
• Maintaining competent staff requires:
- Availability
- Training
- Employee retention
• Overhead minimization applies to:
- Per packet overhead
- OAM, CP/MP packets
Ethernet vs. MPLS-TP in the Access Slide 30
31. OpEx:
The Arguments (Cont’)
Ethernet
• Basic Ethernet is zero-touch by design but carrier-grade may add many
configuration parameters
• A large number of useful L2CPs (STP, ELMI, GVRP) but no universal CP
protocol
• In addition to equipment certification, MEF has initiated certification for
carrier Ethernet engineers
• Main Ethernet overhead is large, but tags add only a small delta
MPLS-TP
• Basic MPLS relies on IP routing protocols but TP is designed to be able to
function w/o CP
• GMPLS CP has been defined as an option
• Can operate without IP forwarding (eliminating IP logistics); CP and MP
can be carried in GACh (although not yet developed)
• Specific vendors have expert certifications but none specific to MPLS-TP
• Same look and feel as other transport networks to minimize retraining
• May leverage extensions to existing OSS
Ethernet vs. MPLS-TP in the Access Slide 31
32. OpEx:
The Verdict
Ethernet MPLS-TP
Metro Ethernets have been Designed to be
Suitability shown to be low OpEx inexpensively maintainable
2 Points 2 Points
Inelegant CP, available staff, Learned from previous
Coverage medium overhead efforts
4 Points 4 Points
Extensive operational
Extensive experience and
experience only partially
Maturity certification programs
applicable
4 Points 2 Points
Total 10 Points 8 Points
Ethernet vs. MPLS-TP in the Access Slide 32
33. Security:
The Arguments
The Need: Security is perhaps the most important telecomm issue today
• OAM, APS, QoS mechanisms are powerless to cope with Denial of Service
attacks
• Access network NEs are frequently physically unprotected, so:
1. Ports must be protected
2. Packets must be authenticated and integrity checked
3. Confidentiality mechanisms may be needed
4. MPs and CPs must be hard-state
Ethernet vs. MPLS-TP in the Access Slide 33
34. Security:
The Arguments (Cont’)
Ethernet
• Ethernet packets carry unique authenticatable source addresses
• MACsec and its 802.1X extensions define mechanisms that can be used to
protect carrier networks (although hop-by-hop security model may not
always be ideal)
MPLS-TP
• MPLS was designed for core networks (walled gardens) with the
assumption that there are no inside attacks
• Forwarding plane attacks based on lack of authentication/integrity
• Control plane attacks based on soft state of protocols
Ethernet vs. MPLS-TP in the Access Slide 34
35. Security:
The Verdict
Ethernet MPLS-TP
Has an authenticatable unique Has no source identifier and
Suitability SA uses soft-state CPs
2 Points 0 Points
MACsec and 802.1X, but may Little positive support (but it
Coverage need more does support attacks …)
3 Points 1 Point
MPLS community is not
MACsec is starting to appear in
addressing the TP security
Maturity standard chipsets
problem
2 Points 0 Points
Total 7 Points 1 Points
Ethernet vs. MPLS-TP in the Access Slide 35
36. Summary: Final Score
Suitability Coverage Maturity Total
Ethernet 16/20 35/40 38/40 89
MPLS-TP 14/20 27/40 11/40 52
Note: MPLS-TP lost
• 29 points due to lack of maturity
• 9 points due to lack of security
Caveats:
• Deployments have particular (non)requirements, but all 10
considerations were given equal weight
• Some coverage and all maturity scores will change over time
Ethernet vs. MPLS-TP in the Access Slide 36
37. For information about RAD’s
Ethernet Access solutions,
visit www.ethernetaccess.com
www.rad.com
Ethernet vs. MPLS-TP in the Access Slide 37