Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1
Provider Opportunities for Enterprise MPLS
APRICOT 2006, Perth
Matt Kolon
2Copyright © 2005 Juniper Networks, Inc. www.juniper.net
NGN Challenges
• Essential Application and service support
• New and legacy requirements
• Quality
• Ensure appropriate QoS and reliability
• Convergence with Virtualization
• Lower capex and opex by network optimization
MPLS addresses all three of these challenges!
Opportunities for network infrastructure savings
3Copyright © 2005 Juniper Networks, Inc. www.juniper.net
MPLS Addresses Enterprise Challenges
In three critical NGN areas, MPLS helps:
Connectivity:
Policy:
Services:
Collapse traffic onto a single infrastructure, but maintain separation, privacy, policy
Each stream, group, service or application gets the required QoS, availability, etc.
Next-generation and legacy interfaces, services, apps supported without changes
4Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Connectivity: Convergence with Virtualization
More services on fewer networks saves money• Convergence requires QoS, VPNs, traffic
engineering, L1 and 2 support, etc. Services never want to be converged
• Differences in QoS requirements, routing, availability, privacy, regulatory needs
• Each service should experience its network as custom-built for it
How can we help customers converge, but not seem to from a service point of view?
5Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Many uses for MPLS in the Enterprise
PE-CE IPsec
CE-CE IPsec
Inter-AS MPLS
CoC MPLS
CoC MPLS
MPLS VPNs
•Simple ATM or Frame VPN replacement•Outsourced IP VPN•Internet access links•Point-to-point TDM replacement circuits•Hierarchical VPN carriage or peering•Layered security element•Hybrid carrier/enterprise network
6Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Different Networks for Different Apps
Internet
PSTN / TDM
ATMSales
Mktg
AcctgOps
Sales
Sales
Mktg
Acctg
Ops
Ops
7Copyright © 2005 Juniper Networks, Inc. www.juniper.net
MPLS supports virtualized convergence
Sales
Mktg
AcctgOps
Sales
Sales
Mktg
Acctg
Ops
Ops
IP / MPLS
Internet
ATM
VPNs
TDM
Not really a “cloud” any more, is it?
8Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Service Quality through Policy
Essential applications require highly available service, usually with good QoS
Virtualization ensures separation of services, yet each service needs its own treatment:• Traditional QoS (delay, bandwidth, loss,
etc)• Availability (network resilience)• Security (privacy, separation)
MPLS supports both standards-based and unique solutions in these three critical areas
Without attention to service quality, no converged network can meet business goals
Service Quality through Policy
9Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Service Quality Mechanisms
QoSDiffservMultifield ClassificationFilter-based Forwarding
AvailabilitySecondary Paths
Fast RerouteFast IGPs
BFD
Determinism / PlanningTraffic EngineeringDS-TE
SecurityPolicing
FirewallsMonitoring
Policy ApplicationDeterministic Routing
Separate MPLS paths or VPNs
10Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Native service environments preserve investments Enterprise networks are always in flux
• Old applications and services phasing out, new ones phasing in
Any convergence solutions must flexibly support this condition of continual change
Support must sometimes be generic (e.g. Internet, IP) and sometimes specific (e.g. ATM CES, TDM)
MPLS supports specific applications with standards-based, partner, and proprietary solutions
Application and Service Support
11Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Native Service Environments
InterfacesATMFrameEthernetSerialAny speed
Next Gen ServicesIP RoutingL3VPNsTransparent LANsP2P Ethernet
Legacy ServicesTDMDLSWPWE3 SolutionsFrame / ATM VPNs
Capable of low-cost and flexible reconfiguration and migration
12Copyright © 2005 Juniper Networks, Inc. www.juniper.net
MPLS Paths and VPNs
MPLS labels are assigned to identify a path, location, or both Locations and paths together create VPNs
Acctg
Sales
Sales
Ops
Acctg Ops
Enterprises can use VPNs to subdivide networks in whatever way works best for them:
• By application
• By service
• By user group
• By security level
13Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Hybrid Enterprise / Provider MPLS
MPLS VPNs have been a very successful service for many providers
Enterprises who build their own MPLS VPNs can link them with providers’, thus creating a hybrid
Enterprises use these services when they are more cost-effective than building their own VPNs
Remote workers and non-MPLS offices may access the combined MPLS network via encrypted tunnels
ipsec
pptp
14Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Carrier of Carrier MPLS
Geographically distributed enterprises often have “islands” of network services requiring interconnection
MPLS interconnection exists for services at layers 1, 2, and 3 (e.g. pseudowires, Ethernet, ATM, IP, etc.)
Providers offer “carrier-of-carrier” services to their MPLS customers, both carriers and enterprises
MPLS networks may also be linked by dark fiber, private lines, or other “non-MPLS” methods
15Copyright © 2005 Juniper Networks, Inc. www.juniper.net
Summary: Benefits of MPLS in the NGN
All business applications are supported
• Legacy or NextGen, critical to best-effort
Each application is assured the experience (security, availability, performance) it requires
Converged networks that “seem” separate
• One bill for one network infrastructure from your provider, yet many services / apps
• One network to manage, control, secure, maintain, and regulate
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16
Thanks!
Matt Kolon
17Copyright © 2005 Juniper Networks, Inc. www.juniper.net
MPLS Technology 101
MPLS uses small labels (placed after the L2 header) to switch traffic along a path
These paths co-exist with and depend on IP, and are set up and maintained by RSVP and LDP
IP routing and forwarding proceeds as normal using standard protocols and procedures
Multiple tags can be used to tunnel paths inside each other, or to identify endpoints
That’s it! Routers use this infrastructure to build MPLS-based services like VPNs