SlideShare a Scribd company logo
Delivering Business and Technical Advantage to Service Providers Top 50 Companies to Watch
[object Object],[object Object],[object Object],[object Object]
Our Mission ,[object Object],TN250G – Core Service Switch
The Business Case for  Layer 2 MPLS VPNs ,[object Object],[object Object],PROFIT$ FOLLOW THE MONEY CUT COSTS SQUEEZE VALUE OUT OF INVESTMENTS
Plan of the Presentation ,[object Object],[object Object],[object Object],[object Object]
The VPN Landscape ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN overview virtual  (vûrch-l) adj.   Existing in the mind, especially as a product of the imagination ,[object Object],[object Object],[object Object],[object Object],[object Object],Sharing Cost
VPN: Overlay on shared infrastructure SERVICE PROVIDER NETWORK:  SHARED INFRASTRUCTURE Customer 1 Site 1 Customer 1 Site 2 Customer 1 Site 3 Customer 2 Site 1 Customer 2 Site 2 Customer 2 Site 3 Customer 3 Site 1 Customer 3 Site 2 Customer 3 Site 3
IP VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 2 VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 3 VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object]
MPLS VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 3 MPLS VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 2 MPLS VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Case for MPLS L2VPNs ,[object Object],[object Object],[object Object],[object Object]
L2VPNs - The Way to Go! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FR/ATM Dominates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],$  $
Ethernet - Looming in the Horizon ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Services - A Money Pit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 2 MPLS VPNs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why? ,[object Object],[object Object],[object Object],[object Object]
Who? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Architecture: Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
L2VPN Reference Model SERVICE PROVIDER NETWORK PE PE PE PE PE PE P SITE 1 SITE 2 SITE 3 CE 1 CE 2 CE 3 Pseudowire1-3 Attachment circuits Attachment circuits Attachment circuits Pseudowire1-2 Pseudowire2-3
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],L2VPN Architecture: Functions
Configuration: Martini Approach interface sonet 3/1 encap frame-relay frame-relay interface dlci 43 mpls l2transport route 16.22.22.222 100 43 mtu 1500 ...   DLCI VC ID PE2 IP address DLCI  43 SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 DLCI  44 interface sonet 5/2 encap frame-relay frame-relay interface dlci 44 mpls l2transport route 16.22.22.221 100 44 mtu 1500 ...   PE1 IP address VC ID DLCI
Configuration: Kompella Approach ,[object Object],[object Object],[object Object],CE2  50 CE3  51 CE4  52 CE5  53 PE 1 CE 1 DLCIs CE1  60 CE3  61 CE4  62 CE5  63 PE 2 CE 2 DLCIs CE1  70 CE2  71 CE3  72 CE4  73 PE 3 CE 3 DLCIs CE1  80 CE2  81 CE3  82 CE5  83 PE 4 CE 4 DLCIs CE1  90 CE2  91 CE3  92 CE4  93 PE 5 CE 5 DLCIs Pre-provisioned DLCIs
Signaling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VC LABEL VC LABEL SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 DLCI  43 DLCI  44 93 85
Martini Signaling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Martini Virtual Circuit FEC VC Info Len   VC TLV C VC Type Group ID VC ID Interface parameters ... ... SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 Targeted LDP Session between PEs
Kompella Signaling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],BGP L2VPN NLRI Length (2) Route Distinguisher (8) CE ID (2) Label-block Offset (2) Label Base (3) Variable TLVs (0..N) Ext. Community Type (2) Encaps Type (1) Cntrl Flags (1) Layer-2 MTU  (2) Reserved  (2) L2Info Ext Community draft-kompella-ppvpn-l2vpn-02.txt (Nov 2001) CE 4 PE 4 16.22.22.224 SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 PE 3 16.22.22.223 CE 3 IBGP MESH
Forwarding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CE PE Receive Layer 2 PDU on attachment circuit 1 Switch received PDU to proper pseudowire 2 Generate pseudowire encapsulation attach labels, and transmit on pseudowire 3 Receive encapsulated PDU  from pseudowire 4 Switch encapsulated PDU received from pseudowire  to proper  attachment circuit 5 Regenerate appropriate Layer 2 encapsulation and transmit on attachment circuit 6
Encapsulation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Martini Encapsulation  ,[object Object],[object Object],[object Object],[object Object],[object Object],VC LABEL CONTROL WORD L2 PAYLOAD + PADDING Martini Encapsulation for MPLS Generic Control Word Format Frame Relay Flags ATM AAL5 Payload Service Flags FLAGS (10) LEN(6) SEQ NUMBER (16) RESV(4) B RESV(2) D C F RESV(4) F RESV(2) C I E
Encapsulation Example PE 2 pseudowire DA SA 8847h Tunnel Label VC Label Control Word FR PAYLOAD RES F B D C RES LENGTH SEQUENCE NUMBER Martini Encapsulation FLAG FR HEADER FR PAYLOAD FCS DLCI C/R EA DLCI F B D EA PE 1 CE 1 DLCI
Martini Encapsulation Drafts draft-martini-l2circuit-encap-mpls-04.txt (November 2001) FR :  draft-martini-frame-encap-mpls-01.txt FR ATM :  draft-martini-atm-encap-mpls-01.txt ATM Ethernet :  draft-martini-ethernet-encap-mpls-01.txt Ethernet PPP/HDLC :  draft-martini-ppp-hdlc-encap-mpls-01.txt PPP/HDLC
Alternative Encapsulations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fischer Vs Brayley   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transport ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MPLS Transport ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layer 2 VPN Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Private Wire Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 DLCI  43 DLCI  44
Ethernet-based VPN Services “Never bet against Ethernet” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CE CE CE CE CE PE PE PE Ethernet Connected CE PE-IWF Frame Relay / ATM Network L2PE L2PE L2PE Frame ATM
Virtual Private LAN Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CE CE CE CE CE PE PE PE L2PE Ethernet Connected L2PE L2PE
IP over LAN Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IP CE IP CE IP CE IP CE IP CE PE PE PE Ethernet Connected Ethernet Switch Ethernet Rptr
Conclusion ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
Juniper L2 MPLS VPN
Juniper L2 MPLS VPNJuniper L2 MPLS VPN
Juniper L2 MPLS VPN
mehrdad1981
 
Mpls vpn toi
Mpls vpn toiMpls vpn toi
Mpls vpn toi
ARACELY ZAPATA
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
Matiullah Jamil
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentialsbeachghim
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
Sherif Hussein
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
APNIC
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
Johnson Liu
 
06 evpn use-case_reviewv1
06 evpn use-case_reviewv106 evpn use-case_reviewv1
06 evpn use-case_reviewv1ronsito
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
Jumaan Ally Mohamed
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian ‎
 
Branching out with SDN
Branching out with SDNBranching out with SDN
Branching out with SDN
APNIC
 

What's hot (20)

Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
Mpls te
Mpls teMpls te
Mpls te
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Juniper L2 MPLS VPN
Juniper L2 MPLS VPNJuniper L2 MPLS VPN
Juniper L2 MPLS VPN
 
Mpls vpn toi
Mpls vpn toiMpls vpn toi
Mpls vpn toi
 
Mpls concepts. Time to Certify
Mpls concepts. Time to CertifyMpls concepts. Time to Certify
Mpls concepts. Time to Certify
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Carrier ethernet essentials
Carrier ethernet essentialsCarrier ethernet essentials
Carrier ethernet essentials
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
 
Mpls101
Mpls101Mpls101
Mpls101
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
 
06 evpn use-case_reviewv1
06 evpn use-case_reviewv106 evpn use-case_reviewv1
06 evpn use-case_reviewv1
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
Switching systems lecture8 mpls
Switching  systems lecture8 mplsSwitching  systems lecture8 mpls
Switching systems lecture8 mpls
 
MPLS
MPLSMPLS
MPLS
 
MPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by KhatriMPLS-based Metro Ethernet Networks Tutorial by Khatri
MPLS-based Metro Ethernet Networks Tutorial by Khatri
 
802 1ad
802 1ad802 1ad
802 1ad
 
Branching out with SDN
Branching out with SDNBranching out with SDN
Branching out with SDN
 

Similar to IIR VPN London

mpls-lecture.pdf
mpls-lecture.pdfmpls-lecture.pdf
mpls-lecture.pdf
YagneshDodiya2
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
Reza Farahani
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PROIDEA
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
ThanhTrungBui5
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PROIDEA
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
Ahmad Atta
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
Vinod Kumar Balasubramanyam
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
Jeff Green
 
Colt sdn-and-nfv-experience-lernings-and-future-plans
Colt sdn-and-nfv-experience-lernings-and-future-plansColt sdn-and-nfv-experience-lernings-and-future-plans
Colt sdn-and-nfv-experience-lernings-and-future-plans
Javier Benitez
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlace
jonatanmedeirosgomes1
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
ethersteve
 

Similar to IIR VPN London (20)

Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
Mpls vpn1
Mpls vpn1Mpls vpn1
Mpls vpn1
 
mpls-lecture.pdf
mpls-lecture.pdfmpls-lecture.pdf
mpls-lecture.pdf
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
 
Atomf ov
Atomf ovAtomf ov
Atomf ov
 
Vpn1
Vpn1Vpn1
Vpn1
 
Vpn1
Vpn1Vpn1
Vpn1
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 
Colt sdn-and-nfv-experience-lernings-and-future-plans
Colt sdn-and-nfv-experience-lernings-and-future-plansColt sdn-and-nfv-experience-lernings-and-future-plans
Colt sdn-and-nfv-experience-lernings-and-future-plans
 
10209
1020910209
10209
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlace
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
 

More from Krishnamoorthy Arvind

Network Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LINetwork Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LIKrishnamoorthy Arvind
 
IIR London
IIR LondonIIR London

More from Krishnamoorthy Arvind (6)

Network Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LINetwork Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LI
 
Git - An Introduction
Git - An IntroductionGit - An Introduction
Git - An Introduction
 
MIB Test Environment
MIB Test EnvironmentMIB Test Environment
MIB Test Environment
 
IIR Geneva 2001 Final
IIR Geneva 2001 FinalIIR Geneva 2001 Final
IIR Geneva 2001 Final
 
ODSI Talk
ODSI TalkODSI Talk
ODSI Talk
 
IIR London
IIR LondonIIR London
IIR London
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

IIR VPN London

  • 1. Delivering Business and Technical Advantage to Service Providers Top 50 Companies to Watch
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. VPN: Overlay on shared infrastructure SERVICE PROVIDER NETWORK: SHARED INFRASTRUCTURE Customer 1 Site 1 Customer 1 Site 2 Customer 1 Site 3 Customer 2 Site 1 Customer 2 Site 2 Customer 2 Site 3 Customer 3 Site 1 Customer 3 Site 2 Customer 3 Site 3
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. L2VPN Reference Model SERVICE PROVIDER NETWORK PE PE PE PE PE PE P SITE 1 SITE 2 SITE 3 CE 1 CE 2 CE 3 Pseudowire1-3 Attachment circuits Attachment circuits Attachment circuits Pseudowire1-2 Pseudowire2-3
  • 26.
  • 27. Configuration: Martini Approach interface sonet 3/1 encap frame-relay frame-relay interface dlci 43 mpls l2transport route 16.22.22.222 100 43 mtu 1500 ... DLCI VC ID PE2 IP address DLCI 43 SERVICE PROVIDER NETWORK CE 1 PE 1 16.22.22.221 PE 2 16.22.22.222 CE 2 DLCI 44 interface sonet 5/2 encap frame-relay frame-relay interface dlci 44 mpls l2transport route 16.22.22.221 100 44 mtu 1500 ... PE1 IP address VC ID DLCI
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Encapsulation Example PE 2 pseudowire DA SA 8847h Tunnel Label VC Label Control Word FR PAYLOAD RES F B D C RES LENGTH SEQUENCE NUMBER Martini Encapsulation FLAG FR HEADER FR PAYLOAD FCS DLCI C/R EA DLCI F B D EA PE 1 CE 1 DLCI
  • 36. Martini Encapsulation Drafts draft-martini-l2circuit-encap-mpls-04.txt (November 2001) FR : draft-martini-frame-encap-mpls-01.txt FR ATM : draft-martini-atm-encap-mpls-01.txt ATM Ethernet : draft-martini-ethernet-encap-mpls-01.txt Ethernet PPP/HDLC : draft-martini-ppp-hdlc-encap-mpls-01.txt PPP/HDLC
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.