SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
WHITE PAPER




                                                       Analyzing MPLS from an ROI Perspective


        Site Interconnection                           In most cases, a Virtual Private                                     functions of “connection-less”
                                                       Network (VPN) is considered a means                                  technology, including MPLS and IPSec.
                                                       of connecting various locations using                                However, Frame Relay, a “connection-
                                                       a public or private IP network.                                      oriented” technology, requires separate
                                                       Increasingly, businesses require a fully                             “permanent” virtual circuits to be
                                                       meshed network permitting “any to any”                               manually programmed, in order for
                                                       connectivity. It is important to determine                           each node to be meshed. Network
                                                       the need for a meshed network, as the                                expansions are time consuming and
                                                       resources and costs associated with                                  necessitate the need for accurate record
                                                       creating and maintaining a meshed                                    keeping and skilled IT resources.
                                                       network are directly impacted by the                                 The amount of resources required
                                                       specific VPN technology deployed.                                     increases exponentially as the number
                                                       This white paper discusses the most                                  of sites in the network increase.
                                                       common VPN technologies and
                                                       highlights hidden costs, which should
                                                       be considered when deploying a VPN.
                                                       Network meshing and the addition
                                                       of subsequent nodes are automatic



          Throughput Speed                             Throughput speed results from                                        with 768K of bandwidth, but a CIR
                                                       a combination of the connecting                                      with 128K of bandwidth. (CIR must
                                                       network circuits’ bandwidth and the                                  always be equal to or less than the port
                                                       effects of any congestion that may                                   bandwidth.) It is the CIR rate that will
                                                       exist within the network. It is therefore                            fundamentally affect the price being
                                                       important to understand the manner                                   charged for the Frame Relay circuit.
                                                       in which bandwidth is managed within
                                                       different network types.                                             Under normal circumstances, the full
                                                                                                                            768K of bandwidth may be available
                                                       In regards to Frame Relay, Permanent                                 for use. However, when congestion
                                                       Virtual Circuits (PVCs) are established                              occurs within the carrier’s network,
                                                       and maintained between sites.                                        data that exceeds the CIR would be
                                                       End-users subscribe to a minimum                                     deemed ‘discard eligible,’ because
                                                       bandwidth, Committed Information                                     the throughput of VPN circuits
                                                       Rates (CIRs), which is contained within                              under congestion is limited to the
                                                       the PVC. For example, over a Frame                                   CIR bandwidth.
                                                       Relay network, you could have a PVC

                                                                                                                                                                 © Windstream 2012




    DATE: 3.15.12 | REVISION: 6 | 009573_Analyzing_MPLS_ROI_Perspective | CREATIVE: MF | JOB#: 9573 - Analyzing MPLS from a ROI Perspective | COLOR: GS | TRIM: 8.5” x 11”
WHITE PAPER




         Throughput Speed     Under these conditions, data marked as discard eligible would need to be
                    (Cont.)   retransmitted, which is unacceptable for time sensitive or real-time applications.
                              Applications such as VoIP, which are latency sensitive, will experience static, crackling,
                              or will drop altogether. Since MPLS does not require PVCs with CIR, congestion is
                              handled more efficiently. The following diagram demonstrates how full port speed
                              would be available to overcome the congested conditions under MPLS or IPSec. With
                              Frame Relay, only the bandwidth of the associated CIR would be available; therefore,
                              congestion recovery would typically occur faster in a MPLS or IPSec VPN. It is
                              important to consider how end-user business could be affected by congestion.




                              Customers should select the type of            While an equivalent Frame Relay
                              VPN that best matches the applications         PVC may cost less than or equal to
                              being deployed. For example, if real-time      that of MPLS, an equivalent CIR will
                              transactions are being processed (i.e.         generally result in increased Frame
                              point of sale transactions), congestion        Relay circuit costs.
                              between nodes may be deemed
                              unacceptable. Any costs associated with
                              provisioning a higher capacity network
                              may be offset by the additional business
                              gained as a result.




                                                                                                      © Windstream 2012
WHITE PAPER




              Data Prioritization   The type of network being adopted            Although Frame Relay allows for data
                                    needs to match the application being         prioritization, ‘Priority PVCs,’ which are
                                    deployed. While Voice over IP                available from some vendors, add
                                    exemplifies the classic need for real-        substantial IT resources and associated
                                    time data prioritization, to avoid dropped   costs. Implementing ‘Priority PVCs’
                                    calls and transmission distortion, there     is not automatic; manual intervention
                                    are many scenarios in which data needs       is required in many cases at both the
                                    to be prioritized in order for businesses    customer level and at the carrier level. In
                                    to function efficiently. Internet surfing      an MPLS environment, data prioritization
                                    or e-mail should take lower priority in      is fundamental. Quality of Service (QoS)
                                    comparison to point of sale transactions,    facilitates packet prioritization, and with
                                    to ensure that a business is capable of      its relatively simple implementation, is
                                    generating maximum revenues.                 invariably a cheaper solution.




                        Security    MPLS and Frame Relay are equally             premium over MPLS and requires
                                    secure. Frame Relay utilizes Data Link       specific hardware configurations. After
                                    Circuit Identifiers (DLCIs) to address        studying various MPLS white papers
                                    traversing data packets, whereas             written by technology manufacturers
                                    MPLS uses tags or labels. IPSec is           and IT managers, many healthcare
                                    often adopted by organizations that are      organizations are becoming comfortable
                                    required to comply with HIPAA, since         claiming HIPPA compliance when
                                    IPSec relies on encrypted data transfers.    utilizing MPLS VPNs.
                                    However, IPSec tends to carry a price




                Remote Access       IPSec allows access to the customer’s        However, IPSec does not provide
                                    corporate VPN from remote locations.         data prioritization, because traversing
                                    This encryption method is seen within        packets are encrypted, and as such,
                                    the industry as the preferred method         is not generally suitable for real time
                                    of connection, ensuring data is not          applications.
                                    compromised prior to entering the VPN.




                                                                                                          © Windstream 2012
WHITE PAPER




              Disaster Recovery    MPLS resides on an IP over SONET             fails, the customer is faced with the
                & Reassignment     network and can automatically route          following question: should he invoke
                                   around points of failure to a disaster       circuit reassignment and incur the cost
                                   recovery location within the meshed          associated with it, or should he wait to
                                   network. However, with a Frame Relay         see if the failure could be quickly
                                   network, connection paths are pre-           rectified? Acting too soon could incur
                                   determined; PVCs need to be manually         unnecessary costs, but acting too late
                                   reassigned to the recovery site by the       could negatively affect business. In
                                   network provider and IT resources at         addition, once the problem is resolved,
                                   the end-user level. While providers may      it is likely that the network would have
                                   offer a ‘PVC Redirection Service,’ it is     to be reassigned back to its original
                                   essentially a manual reassignment. The       configuration, incurring additional costs.
                                   time to complete reassignment increases      Under an MPLS configuration, the
                                   exponentially as the number of nodes         situation would have been automatically
                                   in the network increases or the need to      resolved, since PVCs do not exist.
                                   mesh nodes increases.                        Network resilience is therefore greater
                                                                                with MPLS than Frame Relay.
                                   An intermittent failure within a Frame
                                   Relay network can leave a business in
                                   an undesirable predicament. If a circuit




              Strategic Planning   All market reports show that Frame           applications, such as point of sale
                                   Relay is an aging and declining              transactions, reservations, etc, take
                                   technology, unable to match the rich         priority over such items as Internet
                                   feature set that MPLS offers. MPLS is        browsing.
                                   the de-facto standard for future services
                                   and for applications requiring packet        MPLS also permits consolidation of
                                   prioritization. Packet prioritization is     Voice and Data services, thereby
                                   essential in the Voice over Internet         reducing communications overhead.
                                   Protocol domain, preventing clipping         Frame Relay is purely a data network,
                                   and distortion and ensuring prioritization   which was not designed for convergence.
                                   of data transfers. Regardless of VoIP’s
                                   presence, good business practice
                                   dictates that priority business




                                                                                                         © Windstream 2012
WHITE PAPER




                Conclusion   There are hard and soft costs associated   the highest level of efficiency and
                             with a VPN deployment. While hard          business continuity with minimal human
                             costs, such as circuits and CPE, are       intervention become an increasingly
                             easy to measure, soft costs, such as       desirable proposition. While other forms
                             IT resources and throughput, are           of VPN have desirable characteristics,
                             equally important.                         only MPLS provides the network
                                                                        intelligence businesses demand with
                             As technology progresses and               the reassurance of future capabilities.
                             businesses look towards technology         With its ability to reduce in-house IT
                             to keep them at the leading edge of        resources, coupled with its inherent
                             their field, the deployment of networks     resilience, MPLS provides the most cost
                             with embedded intelligence to enable       effective and beneficial VPN solution.




009356 | 3/12                                                                                   © Windstream 2012

Mais conteúdo relacionado

Mais procurados

Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video trafficprasanna9
 
Videoconferencing Technical Considerations for IT Professionals
Videoconferencing Technical Considerations for IT ProfessionalsVideoconferencing Technical Considerations for IT Professionals
Videoconferencing Technical Considerations for IT ProfessionalsClarkPowell
 
Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Simon Harrison
 
3com H3 C Solutions
3com H3 C  Solutions3com H3 C  Solutions
3com H3 C Solutionsthouchin
 
MeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product OverviewMeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product OverviewMeshDynamics
 
MeshDynamics Mesh Network Layout Design (Examples)
MeshDynamics Mesh Network Layout Design (Examples)MeshDynamics Mesh Network Layout Design (Examples)
MeshDynamics Mesh Network Layout Design (Examples)MeshDynamics
 
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberSpan Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberRoderick Dottin
 
Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSEddie Kempe
 
Ngn and application in bangladesh
Ngn and application in bangladeshNgn and application in bangladesh
Ngn and application in bangladeshshahriar19
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)Rashid Khan
 

Mais procurados (18)

IEEE 2012 ns2_2012-13_titles.doc
IEEE 2012 ns2_2012-13_titles.docIEEE 2012 ns2_2012-13_titles.doc
IEEE 2012 ns2_2012-13_titles.doc
 
Vectra
Vectra Vectra
Vectra
 
Atomf ov
Atomf ovAtomf ov
Atomf ov
 
Dwdm12
Dwdm12Dwdm12
Dwdm12
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
Congestion detection for video traffic
Congestion detection for video trafficCongestion detection for video traffic
Congestion detection for video traffic
 
Videoconferencing Technical Considerations for IT Professionals
Videoconferencing Technical Considerations for IT ProfessionalsVideoconferencing Technical Considerations for IT Professionals
Videoconferencing Technical Considerations for IT Professionals
 
Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010Smart Meter Architectures and Interfaces - Dec 2010
Smart Meter Architectures and Interfaces - Dec 2010
 
3com H3 C Solutions
3com H3 C  Solutions3com H3 C  Solutions
3com H3 C Solutions
 
Sdn03
Sdn03Sdn03
Sdn03
 
MeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product OverviewMeshDynamics MD4000 Product Overview
MeshDynamics MD4000 Product Overview
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
MeshDynamics Mesh Network Layout Design (Examples)
MeshDynamics Mesh Network Layout Design (Examples)MeshDynamics Mesh Network Layout Design (Examples)
MeshDynamics Mesh Network Layout Design (Examples)
 
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 FiberSpan Design considerations in TAT-14 US Backhaul across G.652 Fiber
Span Design considerations in TAT-14 US Backhaul across G.652 Fiber
 
Wan and VPN Solutions
Wan and VPN SolutionsWan and VPN Solutions
Wan and VPN Solutions
 
Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoS
 
Ngn and application in bangladesh
Ngn and application in bangladeshNgn and application in bangladesh
Ngn and application in bangladesh
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)
 

Semelhante a White Paper: Analyzing MPLS from an ROI Perspective

Sparton Corp WAN Analysis
Sparton Corp WAN AnalysisSparton Corp WAN Analysis
Sparton Corp WAN Analysistcollins3413
 
Defining characteristics of qfabric
Defining characteristics of qfabricDefining characteristics of qfabric
Defining characteristics of qfabricNam Nguyen
 
Defining Characteristics of QFabric
Defining Characteristics of QFabricDefining Characteristics of QFabric
Defining Characteristics of QFabricJuniper Networks
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network servicesBootcamp SCL
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...ieeepondy
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...IDES Editor
 
LTE: The Vision Beyond 3G
LTE: The Vision Beyond 3GLTE: The Vision Beyond 3G
LTE: The Vision Beyond 3GGoing LTE
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivityIT Brand Pulse
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureHiroshi Ono
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksMyNOG
 

Semelhante a White Paper: Analyzing MPLS from an ROI Perspective (20)

Sparton Corp WAN Analysis
Sparton Corp WAN AnalysisSparton Corp WAN Analysis
Sparton Corp WAN Analysis
 
Defining characteristics of qfabric
Defining characteristics of qfabricDefining characteristics of qfabric
Defining characteristics of qfabric
 
Defining Characteristics of QFabric
Defining Characteristics of QFabricDefining Characteristics of QFabric
Defining Characteristics of QFabric
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network services
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
VPN
VPN VPN
VPN
 
Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
LTE: The Vision Beyond 3G
LTE: The Vision Beyond 3GLTE: The Vision Beyond 3G
LTE: The Vision Beyond 3G
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivity
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network Architecture
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 

Mais de Windstream Enterprise

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Enterprise
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Enterprise
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Enterprise
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Enterprise
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWindstream Enterprise
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...Windstream Enterprise
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWindstream Enterprise
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWindstream Enterprise
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelWindstream Enterprise
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingWindstream Enterprise
 

Mais de Windstream Enterprise (16)

Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...Windstream Webinar: Making Your Business More Productive With MPLS Networking...
Windstream Webinar: Making Your Business More Productive With MPLS Networking...
 
Windstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for BusinessWindstream Webinar: Demystifying VoIP for Business
Windstream Webinar: Demystifying VoIP for Business
 
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
Windstream Webinar: The Latest Trends in Virtualization: Is the cloud right f...
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester ResearchWindstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
Windstream Webinar: “Data Centers: Outsource or Own?” with Forrester Research
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
White Paper: Windstream Leveraging Funding for EHR While Meeting HIPAA Requir...
 
Product Information: Cloud Services
Product Information: Cloud ServicesProduct Information: Cloud Services
Product Information: Cloud Services
 
White Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security ComplianceWhite Paper: Windstream's Position on Security Compliance
White Paper: Windstream's Position on Security Compliance
 
White Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHRWhite Paper: Leveraging Funding for EHR
White Paper: Leveraging Funding for EHR
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Case Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. MichaelCase Study: Windstream Healthcare Christus St. Michael
Case Study: Windstream Healthcare Christus St. Michael
 
Case Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol BroadcastingCase Study: Windstream Capitol Broadcasting
Case Study: Windstream Capitol Broadcasting
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

White Paper: Analyzing MPLS from an ROI Perspective

  • 1. WHITE PAPER Analyzing MPLS from an ROI Perspective Site Interconnection In most cases, a Virtual Private functions of “connection-less” Network (VPN) is considered a means technology, including MPLS and IPSec. of connecting various locations using However, Frame Relay, a “connection- a public or private IP network. oriented” technology, requires separate Increasingly, businesses require a fully “permanent” virtual circuits to be meshed network permitting “any to any” manually programmed, in order for connectivity. It is important to determine each node to be meshed. Network the need for a meshed network, as the expansions are time consuming and resources and costs associated with necessitate the need for accurate record creating and maintaining a meshed keeping and skilled IT resources. network are directly impacted by the The amount of resources required specific VPN technology deployed. increases exponentially as the number This white paper discusses the most of sites in the network increase. common VPN technologies and highlights hidden costs, which should be considered when deploying a VPN. Network meshing and the addition of subsequent nodes are automatic Throughput Speed Throughput speed results from with 768K of bandwidth, but a CIR a combination of the connecting with 128K of bandwidth. (CIR must network circuits’ bandwidth and the always be equal to or less than the port effects of any congestion that may bandwidth.) It is the CIR rate that will exist within the network. It is therefore fundamentally affect the price being important to understand the manner charged for the Frame Relay circuit. in which bandwidth is managed within different network types. Under normal circumstances, the full 768K of bandwidth may be available In regards to Frame Relay, Permanent for use. However, when congestion Virtual Circuits (PVCs) are established occurs within the carrier’s network, and maintained between sites. data that exceeds the CIR would be End-users subscribe to a minimum deemed ‘discard eligible,’ because bandwidth, Committed Information the throughput of VPN circuits Rates (CIRs), which is contained within under congestion is limited to the the PVC. For example, over a Frame CIR bandwidth. Relay network, you could have a PVC © Windstream 2012 DATE: 3.15.12 | REVISION: 6 | 009573_Analyzing_MPLS_ROI_Perspective | CREATIVE: MF | JOB#: 9573 - Analyzing MPLS from a ROI Perspective | COLOR: GS | TRIM: 8.5” x 11”
  • 2. WHITE PAPER Throughput Speed Under these conditions, data marked as discard eligible would need to be (Cont.) retransmitted, which is unacceptable for time sensitive or real-time applications. Applications such as VoIP, which are latency sensitive, will experience static, crackling, or will drop altogether. Since MPLS does not require PVCs with CIR, congestion is handled more efficiently. The following diagram demonstrates how full port speed would be available to overcome the congested conditions under MPLS or IPSec. With Frame Relay, only the bandwidth of the associated CIR would be available; therefore, congestion recovery would typically occur faster in a MPLS or IPSec VPN. It is important to consider how end-user business could be affected by congestion. Customers should select the type of While an equivalent Frame Relay VPN that best matches the applications PVC may cost less than or equal to being deployed. For example, if real-time that of MPLS, an equivalent CIR will transactions are being processed (i.e. generally result in increased Frame point of sale transactions), congestion Relay circuit costs. between nodes may be deemed unacceptable. Any costs associated with provisioning a higher capacity network may be offset by the additional business gained as a result. © Windstream 2012
  • 3. WHITE PAPER Data Prioritization The type of network being adopted Although Frame Relay allows for data needs to match the application being prioritization, ‘Priority PVCs,’ which are deployed. While Voice over IP available from some vendors, add exemplifies the classic need for real- substantial IT resources and associated time data prioritization, to avoid dropped costs. Implementing ‘Priority PVCs’ calls and transmission distortion, there is not automatic; manual intervention are many scenarios in which data needs is required in many cases at both the to be prioritized in order for businesses customer level and at the carrier level. In to function efficiently. Internet surfing an MPLS environment, data prioritization or e-mail should take lower priority in is fundamental. Quality of Service (QoS) comparison to point of sale transactions, facilitates packet prioritization, and with to ensure that a business is capable of its relatively simple implementation, is generating maximum revenues. invariably a cheaper solution. Security MPLS and Frame Relay are equally premium over MPLS and requires secure. Frame Relay utilizes Data Link specific hardware configurations. After Circuit Identifiers (DLCIs) to address studying various MPLS white papers traversing data packets, whereas written by technology manufacturers MPLS uses tags or labels. IPSec is and IT managers, many healthcare often adopted by organizations that are organizations are becoming comfortable required to comply with HIPAA, since claiming HIPPA compliance when IPSec relies on encrypted data transfers. utilizing MPLS VPNs. However, IPSec tends to carry a price Remote Access IPSec allows access to the customer’s However, IPSec does not provide corporate VPN from remote locations. data prioritization, because traversing This encryption method is seen within packets are encrypted, and as such, the industry as the preferred method is not generally suitable for real time of connection, ensuring data is not applications. compromised prior to entering the VPN. © Windstream 2012
  • 4. WHITE PAPER Disaster Recovery MPLS resides on an IP over SONET fails, the customer is faced with the & Reassignment network and can automatically route following question: should he invoke around points of failure to a disaster circuit reassignment and incur the cost recovery location within the meshed associated with it, or should he wait to network. However, with a Frame Relay see if the failure could be quickly network, connection paths are pre- rectified? Acting too soon could incur determined; PVCs need to be manually unnecessary costs, but acting too late reassigned to the recovery site by the could negatively affect business. In network provider and IT resources at addition, once the problem is resolved, the end-user level. While providers may it is likely that the network would have offer a ‘PVC Redirection Service,’ it is to be reassigned back to its original essentially a manual reassignment. The configuration, incurring additional costs. time to complete reassignment increases Under an MPLS configuration, the exponentially as the number of nodes situation would have been automatically in the network increases or the need to resolved, since PVCs do not exist. mesh nodes increases. Network resilience is therefore greater with MPLS than Frame Relay. An intermittent failure within a Frame Relay network can leave a business in an undesirable predicament. If a circuit Strategic Planning All market reports show that Frame applications, such as point of sale Relay is an aging and declining transactions, reservations, etc, take technology, unable to match the rich priority over such items as Internet feature set that MPLS offers. MPLS is browsing. the de-facto standard for future services and for applications requiring packet MPLS also permits consolidation of prioritization. Packet prioritization is Voice and Data services, thereby essential in the Voice over Internet reducing communications overhead. Protocol domain, preventing clipping Frame Relay is purely a data network, and distortion and ensuring prioritization which was not designed for convergence. of data transfers. Regardless of VoIP’s presence, good business practice dictates that priority business © Windstream 2012
  • 5. WHITE PAPER Conclusion There are hard and soft costs associated the highest level of efficiency and with a VPN deployment. While hard business continuity with minimal human costs, such as circuits and CPE, are intervention become an increasingly easy to measure, soft costs, such as desirable proposition. While other forms IT resources and throughput, are of VPN have desirable characteristics, equally important. only MPLS provides the network intelligence businesses demand with As technology progresses and the reassurance of future capabilities. businesses look towards technology With its ability to reduce in-house IT to keep them at the leading edge of resources, coupled with its inherent their field, the deployment of networks resilience, MPLS provides the most cost with embedded intelligence to enable effective and beneficial VPN solution. 009356 | 3/12 © Windstream 2012