2. Agenda
Overview of TEData’ s Global Data Services
TEData’ s Global MPLS Reach
Overview of MPLS Technology
MPLS Product Descriptions
2
3. After reading , readers can….
• Appreciate MPLS technology & features
• Understand the capabilities of TEData' s Global MPLS
services
• Identify key benefits of Global MPLS
3
4. Overview of GDS
• TE Data extends its national and regional network and service offerings over the
global footprint of international carriers to meet the needs of enterprise and
multinational customers.
• GDS can offer an end –to –end service (from In-country pop, to the carriers B-
end customer location) the service will be NNI (Network –to – Network
Interface) to UNI (User- To – Network Interface) based and will compliant with
adequate quality Standards
• One Stop -Shop Provider
G-MPLS L2&L3
G-IPLC
G-IP Transit
• Covering over 200 countries
Middle East , GCC &Africa 4
Europe , Asia, Americas & Latin of America
5. TEData can take you further…
to more places
Providing a robust MPLS network that is accessible in over 200 countries
trough cost-effective MPLS solutions for communication and collaboration
anytime and anywhere.
with skilled people
Providing future-proof technology expertise you need, and outstanding
customer support you deserve.
through optimal processes
Providing a robust MPLS solution that converges voice, data, video and
multimedia on a single network, and thereby deliver operational efficiencies
and in-region/local presence to efficiently work on your behalf
and industry-leading products
Providing a managed MPLS solution and experienced network professionals,
enabling you to focus on revenue-generating activities (e.g., product
development, lifecycle management)
to higher profit margins
Providing a cost-effective MPLS solution that improves network and 5
operational efficiencies, and thereby contribute to improved profit margins
7. Layer 3 VPN (MPLS)Coverage – EMEA
Summary and Lead Times
EMEA EMEA EMEA
Angola Hungary Qatar
Austria Ireland Romania
Azerbaijan Italy Russia
Bahrain Jordan Saudi Arabia
Belgium Kazakhstan Serbia
Botswana Kenya Slovakia
Benin*** Kuwait South Africa
Bulgaria Kyrgyzstan Spain
Cameroon Latvia Sudan
Cote D'Ivoire Lebanon Sweden
Croatia Lithuania Switzerland
Cyprus Luxembourg Tajikistan
Czech Rep Mauritius Tanzania
Denmark Mocambique Turkey
Djibouti*** Namibia Turkmenistan
Egypt Netherlands Uganda
Estonia Nigeria Ukraine
Ethiopia Norway United Arab
Finland Oman Emirates
France Pakistan United Kingdom
Germany Palestine
Ghana Poland
Greece Portugal
8. Layer 3 VPN (MPLS)
– Latam and Americas Summary and Lead Times
Latin/America Latin/America
Belize Argentina
Canada Brazil
Costa Rica Bolivia
Cayman Islands Chile
Dominican Rep Columbia
Guatemala Ecuador
Haiti El Salvador
Jamaica French Guiana
Puerto Rico Guyana
Suriname Honduras
Trinidad & Tobago Mexico
Turks & Caicos Nicaragua
USA Panama
Paraguay
Peru
Uruguay
Venezuela
8
9. Layer 3 VPN (MPLS) other countries
Americas Asia Europe Africa
Argentina Bangladesh* Austria Netherlands Kenya*
Brazil China Belgium Norway Morocco
Canada Hong Kong Bulgaria Poland Nigeria*
Chile India Czech Romania South Africa
Colombia Indonesia Republic Russia
Ecuador Japan Denmark Slovakia
Finland Australia/Oceania
Guatemala Korea Spain
Mexico Malaysia France Sweden
Panama Nepal* Germany Switzerland Australia
Peru Pakistan* Hungary* Turkey New Zealand*
Uruguay Philippines Ireland United
USA Singapore Italy Kingdom
Venezuela Sri Lanka Luxemburg Other Middle East
Taiwan Malta Countries
Upon Request Bahrain
Thailand Egypt
Vietnam* Jordan
Kuwait
Saudi Arabia
United Arab 9
Emirates
10. Layer 3 VPN (MPLS) Coverage
– Asia Summary and Lead Times
Asia
Australia
China
Fiji
Hong Kong
India
Indonesia
Japan
Macau
Malaysia
Nepal
New Caledonia
New Zealand
Papua New Guinea
Philippines
Samoa Islands
Singapore
Solomon Islands
South Korea
Sri Lanka
Taiwan 10
Thailand
Vietnam
11. Layer 2 VPN (MPLS) Ethernet Country Summary
Asia EMEA Americas
(14 countries) (41 countries) (15 countries)
China Austria Hungary Romania Canada*** Argentina
Hong Kong Bahrain Nigeria Russia USA Brazil
Macau Belgium Norway Saudi Arabia Chile
Japan Bulgaria Italy Serbia Columbia
South Korea Cameroon*** Jordan Slovakia Ecuador
Taiwan Cote D’Ivoire *** Kenya Spain El Salvador
Australia Cyprus Kuwait South Africa Guatemala
India Czech Latvia Sudan Honduras
Indonesia Denmark Lithuania Sweden Mexico
Malaysia Egypt Mocambique*** Switzerland Nicaragua
Philippines Estonia Netherlands Tanzania*** Panama
Singapore Ethiopia Oman Turkey Peru
Thailand Finland Pakistan Ukraine Uruguay
Vietnam France Poland United Arab Venezuela
Germany Qatar Emirates
Ghana*** United Kingdom
Greece
11
16. MPLS Theories
What is MPLS?
• Stands for Multi-Protocol Label Switching
• An IP standard originated from CISCO’s tag switching
• MPLS-enabled routers assign IP packets a “label with service class”,
then forward them along a “label switched path” based on the label
contents defining the IP packet priority
• Supports multiple network applications / services with different
network characteristics over a single IP infrastructure
16
17. What is MPLS VPN?
• General description
• Provides customers private connections among different locations
over IP backbone
• Support multiple services over a single network interface
Shared IP
Customer B
Backbone
(M PLS Transport)
Customer A Customer A
17
Customer B
18. MPLS –“Building Blocks”
CE : Customer Edge Router
(Standard CPE device)
Corp A PE : Provider Edge Router
Site 2 (Router or Switch with MPLS-VPN functionality)
Any Access
Speed/Technology Inter-Provider*
(NNI)
MPLS-VPN
Partner
Corp A
Site 1 P : Provider Core Router
(Router or Switch with MPLS functionality)
Corp A
Site 3
18
20. Service Components of MPLS VPN
Site A
• MPLS service consists of 3 components:
CE Router
• MPLS PE router port (different bandwidth)
• CE router (installed in customer site)
Local Loop
• Local loop between PE port and CE router
PE
Router
• Two options for CE routers:
• Wireline service (customers provide their CE) MPLS
Core
• Managed service (CE provided by TEData)
PE
Router
Local Loop
20
CE Router
Site B
21. MPLS Components
CE – customer edge router
• Access to PE via Local Loop (fiber, cooper, Metro Label
Ethernet) From A
From A
To B
To B
PE – provider edge router
Data
Data
• Attach and remove label
From A
• Assign packet to a path (FEC) CE - A To B
• Adapts native protocols to MPLS
• VPN definitions P
P Data
PE PE
P – provider router MPLS
• Forward packet based on label Core
• Swaps label (label-in, label-out)
P
Label switched path P CE - B
• Label distribution protocol
• Defined hop-by-hop
• Path between ingress and egress PE Label Switched Path
21
21
22. MPLS analogy – Postal Office’s EMS service
MPLS Network Express Post Network Int’l EMS
“Label”
LSR
LSR
LSR
Post
Receiver’s Office
Post Office
LSR
IP Packet
LER
Post
Office
LER Sender’s
Post Office
Post
MPLS Office Post
IP Packet
Label Office
LSP
Parcel
Receiver Parcel
Sender
MPLS MPLS
Sender Receiver
Analog: 22
Legend: Customer ID: MPLS’s VRF or EMS’ tracking number
LER – Label Edge Router Transmission path: MPLS’s LSP or EMS’ express path
LSR – Label Switch Router Handling nodes: MPLS’s PE / P routers or EMS’ post offices
LSP – Label Switched Path Class of Services: MPLS’s Gold or EMS’ next day guarantee
23. Why customers use MPLS?
Reasons to use MPLS:
• Integrate multi-services, multi-networking requirements into a
single IP infrastructure
• Simplify network management by reducing number of devices
• Minimize operating costs for customers
• Support future growth by introducing new IP based services
without major network upgrade
• Combine the best capabilities of layer 2 and layer 3 networking
23
24. Target market segments
Multi-national corporations (MNCs)
MNCs with offices located in different countries
Medium sized companies with multi-locations
Service providers
Global carriers requiring MPLS coverage expansion by using ICI
(inter-carrier interconnect)
Domestic service providers in other countries who need to expand
MPLS business globally
Resellers (e.g. SI or equipment suppliers) with their customers
requiring MPLS service
24
26. Fully Resilient MPLS Network
Robust network design
Equipment diversity
Each MPLS PoP has at least 2 PE routers
Cable diversity
Cable systems are either fully protected by itself (e.g. RNAL from HK to
Taiwan) or with diversity (e.g. Flag and SMW4 between Egypt& London)
In case of cable outage, MPLS traffic is rerouted via other paths to maintain
service automatically
On-Net PoP diversity
In key countries and areas more than one PoP are set up
Extended-Net ICI diversity
For key countries with ICI partners (e.g. London), multiple ICI links in 26
different locations are built
30. MPLS Security of TEData
Provisioning
Each L3VPN has an internal VPN forwarding table (VRF) that is unique to each and
every customer
Each L2PW has a unique VC ID that is unique to each and every customer
Traffic of one VPN will not overlap with another one
Dedicated MPLS Equipment
MPLS services are terminated on dedicated devices that do not carry any public IP
traffic
Controlled Human Access to MPLS Equipment
Only authorized personnel is allowed to access the core MPLS network (with password
control)
Controlled Traffic to MPLS Network
Access control list is applied in all MPLS routers: only specific IP address range can pass
through 30
30
32. CoS characteristics & applications
CoS Characteristics Applications
High output priority traffic with Delay sensitive applications:
Gold minimal delay, packet loss and > voice / video conference
jitter
High priority traffic with low Mission critical applications:
packet loss but can tolerate larger > video streaming / signalling
Silver Plus
delay and jitter
Medium priority traffic that still Business critical applications:
requires bandwidth during > SAP, SNA, Oracle, Telnet
Silver
congestion
Lowest priority traffic without any Best effort traffic:
Bronze guarantee on delay, packet loss > Email, FTP, intranet
and jitter 32
32
34. Service Level Commitment
Service Availability
99.5% (target performance PoP to PoP – on net)
Latency
Determined By cities within and across zones
Packet Delivery
Up to 99.9%, depending on CoS
Jitter
20 ms (for gold class only)
34
36. IPSec Remote Site Access
Product Summary
A cost effective and secured way to allow small remote locations to connect to
MPLS VPN using Internet access
Internet access is based on xDSL (ADSL, SDSL, HDSL, VDSL), dedicated circuit,
wireless, or satellite technologies
A suite of protocols known as IPSec (with 3DES encryption & MD5 authentication)
is used to encrypt and securely transmit the data from the remote office to the
MPLS VPN
Encrypted traffic is tunnelled to one of Five TEData's G-Partners IPSec gateways
located in strategic PoPs throughout the world
36
37. IPSec Remote Site Access Example
CE
Router Customer
PE Network
Router
Remote Remote CE
Traffic Router
Encrypted CE
Traffic Router Customer
E
TEDATA Network
Internet MPLS VPN
ISP Router IPSec Gateway PE
PE Router Router
PE Customer
Router Network
E Ethernet Interface
CE
GRE Tunnel over IPSec
Router 37
37
38. Thank You! 38
Hisham Mostafa
Global Data Service Unit Manager
hesham@tedata.net
gds@tedata.net