Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
MPLS VPN.
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Identifying MPLS Applications
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Deployment of MPLS VPN in Large ISP Networks
MPLS in the Data Center Achieve “Carrier-class” Network Dependability and Reliability for Business Critical Services.
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Leading Edge Routing MPLS Enhancements to Support Layer 2 Transport Services Jeremy Brayley
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Multi Protocol Label Switching Allot and MPLS Multi Protocol Label Switching MPLS Smart, fast routing mechanism to solve routing table scalability issues.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 © 2003 Cisco Systems, Inc. All rights reserved Next Generation Services Redefining Interpersonal Communication Robert Lloyd President, EMEA Operations.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 Why Carriers Like Pseudowires… Payload (IP, L2 data, voice) PseudoWires Layer-2 (Ethernet, ATM…) Physical (Optical, Wireless) User Applications Payload.
5: DataLink Layer5-1 Cerf & Kahn’s Internetwork Architecture What is virtualized? r two layers of addressing: internetwork and local network r new layer.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
M P L S. MPLS Overview MPLS or Multiprotocol label switching is a new network protocol that defined a mechanism for packet forwarding in network router.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Connect. Communicate. Collaborate VPNs in GÉANT2 Otto Kreiter, DANTE UKERNA Networkshop 34 4th - 6th April 2006.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
1 UHG MPLS Experience June 14, 2005 Sorell Slaymaker Director Network Architecture & Technologies
Virtual Private Networks Warren Toomey. Available WAN Links.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Ten Internetworking.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
K. Salah1 Security Protocols in the Internet IPSec.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Advanced Computer Networks
NET 3710 WAN Data Networks.
Chapter 1: WAN Concepts Connecting Networks
The Business Value of MPLS VPNs
Virtual Private Network
Kireeti Kompella Juniper Networks
Chapter 8 – Data switching and routing
Presentation transcript:

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt Kolon

2 Copyright © 2005 Juniper Networks, Inc. NGN Challenges Essential Application and service support New and legacy requirements Quality Ensure appropriate QoS and reliability Convergence with Virtualization Lower capex and opex by network optimization MPLS addresses all three of these challenges! Opportunities for network infrastructure savings

3 Copyright © 2005 Juniper Networks, Inc. MPLS Addresses Enterprise Challenges In three critical NGN areas, MPLS helps: Connectivity: Policy: Services: Collapse traffic onto a single infrastructure, but maintain separation, privacy, policy Each stream, group, service or application gets the required QoS, availability, etc. Next-generation and legacy interfaces, services, apps supported without changes

4 Copyright © 2005 Juniper Networks, Inc. Connectivity: Convergence with Virtualization  More services on fewer networks saves money Convergence requires QoS, VPNs, traffic engineering, L1 and 2 support, etc.  Services never want to be converged Differences in QoS requirements, routing, availability, privacy, regulatory needs Each service should experience its network as custom-built for it  How can we help customers converge, but not seem to from a service point of view?

5 Copyright © 2005 Juniper Networks, Inc. Many uses for MPLS in the Enterprise PE-CE IPsec CE-CE IPsec Inter-AS MPLS CoC MPLS MPLS VPNs Simple ATM or Frame VPN replacement Outsourced IP VPN Internet access links Point-to-point TDM replacement circuits Hierarchical VPN carriage or peering Layered security element Hybrid carrier/enterprise network

6 Copyright © 2005 Juniper Networks, Inc. Different Networks for Different Apps Internet PSTN / TDM ATM Sales Mktg Acctg Ops Sales Mktg Acctg Ops

7 Copyright © 2005 Juniper Networks, Inc. MPLS supports virtualized convergence Sales Mktg Acctg Ops Sales Mktg Acctg Ops IP / MPLS Internet ATM VPNs TDM Not really a “cloud” any more, is it?

8 Copyright © 2005 Juniper Networks, Inc. Service Quality through Policy  Essential applications require highly available service, usually with good QoS  Virtualization ensures separation of services, yet each service needs its own treatment: Traditional QoS (delay, bandwidth, loss, etc) Availability (network resilience) Security (privacy, separation)  MPLS supports both standards-based and unique solutions in these three critical areas  Without attention to service quality, no converged network can meet business goals Service Quality through Policy

9 Copyright © 2005 Juniper Networks, Inc. Service Quality Mechanisms QoS Diffserv Multifield Classification Filter-based Forwarding Availability Secondary Paths Fast Reroute Fast IGPs BFD Determinism / Planning Traffic Engineering DS-TE Security Policing Firewalls Monitoring Policy Application Deterministic Routing Separate MPLS paths or VPNs

10 Copyright © 2005 Juniper Networks, Inc.  Native service environments preserve investments  Enterprise networks are always in flux Old applications and services phasing out, new ones phasing in  Any convergence solutions must flexibly support this condition of continual change  Support must sometimes be generic (e.g. Internet, IP) and sometimes specific (e.g. ATM CES, TDM)  MPLS supports specific applications with standards- based, partner, and proprietary solutions Application and Service Support

11 Copyright © 2005 Juniper Networks, Inc. Native Service Environments Interfaces ATM Frame Ethernet Serial Any speed Next Gen Services IP Routing L3VPNs Transparent LANs P2P Ethernet Legacy Services TDM DLSW PWE3 Solutions Frame / ATM VPNs Capable of low-cost and flexible reconfiguration and migration

12 Copyright © 2005 Juniper Networks, Inc. MPLS Paths and VPNs  MPLS labels are assigned to identify a path, location, or both  Locations and paths together create VPNs Acctg Sales Ops Acctg Ops  Enterprises can use VPNs to subdivide networks in whatever way works best for them: By application By service By user group By security level

13 Copyright © 2005 Juniper Networks, Inc. Hybrid Enterprise / Provider MPLS  MPLS VPNs have been a very successful service for many providers  Enterprises who build their own MPLS VPNs can link them with providers’, thus creating a hybrid  Enterprises use these services when they are more cost-effective than building their own VPNs  Remote workers and non- MPLS offices may access the combined MPLS network via encrypted tunnels ipsec pptp

14 Copyright © 2005 Juniper Networks, Inc. Carrier of Carrier MPLS  Geographically distributed enterprises often have “islands” of network services requiring interconnection  MPLS interconnection exists for services at layers 1, 2, and 3 (e.g. pseudowires, Ethernet, ATM, IP, etc.)  Providers offer “carrier-of- carrier” services to their MPLS customers, both carriers and enterprises  MPLS networks may also be linked by dark fiber, private lines, or other “non-MPLS” methods

15 Copyright © 2005 Juniper Networks, Inc. Summary: Benefits of MPLS in the NGN  All business applications are supported Legacy or NextGen, critical to best-effort  Each application is assured the experience (security, availability, performance) it requires  Converged networks that “seem” separate One bill for one network infrastructure from your provider, yet many services / apps One network to manage, control, secure, maintain, and regulate

Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 16 Thanks! Matt Kolon

17 Copyright © 2005 Juniper Networks, Inc. MPLS Technology 101  MPLS uses small labels (placed after the L2 header) to switch traffic along a path  These paths co-exist with and depend on IP, and are set up and maintained by RSVP and LDP  IP routing and forwarding proceeds as normal using standard protocols and procedures  Multiple tags can be used to tunnel paths inside each other, or to identify endpoints  That’s it! Routers use this infrastructure to build MPLS-based services like VPNs