SlideShare uma empresa Scribd logo
1 de 6
Carrier Ethernet – The CIO PerspectivePart III: Ethernet and IP VPNs, When to Use Which? RAD Data CommunicationsJune 2011
Ethernet and IP VPNs: When to Use Which? Layer 2 (L2) Ethernet and Layer 3 (L3) IP/MPLS VPNs offer different benefits for different needs:
L2, L3 Key Decision Factors:Cost, Scalability, Control Low price per Mbps: Ethernet VPNs are ideal for high throughput typically required at large branches or data centers IP/MPLS VPNs:  Fit highly distributed installations, a very large number of sites Low to medium bandwidth rates Ideal for remote access Control:  Enterprises comfortable with self managing their IP address space and routing tables prefer Layer 2 Ethernet VPNs Businesses without in-house knowledge of IP switching fundamentals, prefer turnkey VPNs
L2 & L3 Service Combination Example (Retail industry): ,[object Object]
Meet bandwidth, delay and control requirements for high volume content delivery, storage and disaster recovery
L3 VPN for branch connectivity:

Mais conteúdo relacionado

Mais procurados

Network Critical
Network CriticalNetwork Critical
Network Criticalgigamon
 
Can’t Wait for 2020: Future-Proof Your Grid Today
Can’t Wait for 2020: Future-Proof Your Grid TodayCan’t Wait for 2020: Future-Proof Your Grid Today
Can’t Wait for 2020: Future-Proof Your Grid TodayEchelon Corporation
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for constructionUmesh Raghavan
 
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora,  NodeJS and IoT CloudAsset Monitoring with Beacons, Lora,  NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora, NodeJS and IoT CloudRobert van Mölken
 
Data Acquisition and Control
Data Acquisition and Control Data Acquisition and Control
Data Acquisition and Control ICP DAS USA, Inc.
 
Iot and mulesoft nagarjuna reddy
Iot and mulesoft nagarjuna reddyIot and mulesoft nagarjuna reddy
Iot and mulesoft nagarjuna reddyNagarjuna reddy
 
The Premise Platform.pdf
The Premise Platform.pdfThe Premise Platform.pdf
The Premise Platform.pdfKishor Kelkar
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADAPratik Aggarwal
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell youIT Tech
 
Broad Sky Networks - 2019 October Webinar 3G is Sunsetting (3) final
Broad Sky Networks - 2019 October Webinar   3G is Sunsetting (3) finalBroad Sky Networks - 2019 October Webinar   3G is Sunsetting (3) final
Broad Sky Networks - 2019 October Webinar 3G is Sunsetting (3) finalMaureen Donovan
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 

Mais procurados (20)

Network Critical
Network CriticalNetwork Critical
Network Critical
 
5G testing Solution Brief
5G testing Solution Brief5G testing Solution Brief
5G testing Solution Brief
 
Can’t Wait for 2020: Future-Proof Your Grid Today
Can’t Wait for 2020: Future-Proof Your Grid TodayCan’t Wait for 2020: Future-Proof Your Grid Today
Can’t Wait for 2020: Future-Proof Your Grid Today
 
Anura
AnuraAnura
Anura
 
Kira128i
Kira128iKira128i
Kira128i
 
Asset tracking solution for construction
Asset tracking solution for constructionAsset tracking solution for construction
Asset tracking solution for construction
 
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora,  NodeJS and IoT CloudAsset Monitoring with Beacons, Lora,  NodeJS and IoT Cloud
Asset Monitoring with Beacons, Lora, NodeJS and IoT Cloud
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
Data Acquisition and Control
Data Acquisition and Control Data Acquisition and Control
Data Acquisition and Control
 
Network management with Aruba AirWave
Network management with Aruba AirWaveNetwork management with Aruba AirWave
Network management with Aruba AirWave
 
Iot and mulesoft nagarjuna reddy
Iot and mulesoft nagarjuna reddyIot and mulesoft nagarjuna reddy
Iot and mulesoft nagarjuna reddy
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
The Premise Platform.pdf
The Premise Platform.pdfThe Premise Platform.pdf
The Premise Platform.pdf
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
CISCO: Click to Deploy
CISCO: Click to DeployCISCO: Click to Deploy
CISCO: Click to Deploy
 
Fog computing
Fog computingFog computing
Fog computing
 
Broad Sky Networks - 2019 October Webinar 3G is Sunsetting (3) final
Broad Sky Networks - 2019 October Webinar   3G is Sunsetting (3) finalBroad Sky Networks - 2019 October Webinar   3G is Sunsetting (3) final
Broad Sky Networks - 2019 October Webinar 3G is Sunsetting (3) final
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 

Semelhante a Ce the cio perspective part iii v2 1 9-6-11

Fixed Access_SAGNIK MUKHERJEE_001210701013_ppt
Fixed Access_SAGNIK MUKHERJEE_001210701013_pptFixed Access_SAGNIK MUKHERJEE_001210701013_ppt
Fixed Access_SAGNIK MUKHERJEE_001210701013_pptSagnik Mukherjee
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetvnandlall
 
Rgc.Deck.02.06.09
Rgc.Deck.02.06.09Rgc.Deck.02.06.09
Rgc.Deck.02.06.09kenmorimoto
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperNir Cohen
 
Ranks ITT Profile Presentation
Ranks ITT Profile PresentationRanks ITT Profile Presentation
Ranks ITT Profile PresentationRubaiath Rahman
 
LTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilitiesLTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilitiesYaroslav Domaratsky
 
廣義隱函數口試ppt
廣義隱函數口試ppt廣義隱函數口試ppt
廣義隱函數口試pptfebull
 
Integra Telecom's Ethernet Solutions Presentation
Integra Telecom's Ethernet Solutions PresentationIntegra Telecom's Ethernet Solutions Presentation
Integra Telecom's Ethernet Solutions PresentationBrian Wade
 
Evolucion redes troncales_convergentes
Evolucion redes troncales_convergentesEvolucion redes troncales_convergentes
Evolucion redes troncales_convergentesTELECOM I+D
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the HomeCaroleHackenberg
 
2002023
20020232002023
2002023pglehn
 
Vpls%20backgrounder
Vpls%20backgrounderVpls%20backgrounder
Vpls%20backgrounderPHIL110
 

Semelhante a Ce the cio perspective part iii v2 1 9-6-11 (20)

Mpls vpn1
Mpls vpn1Mpls vpn1
Mpls vpn1
 
Fixed Access_SAGNIK MUKHERJEE_001210701013_ppt
Fixed Access_SAGNIK MUKHERJEE_001210701013_pptFixed Access_SAGNIK MUKHERJEE_001210701013_ppt
Fixed Access_SAGNIK MUKHERJEE_001210701013_ppt
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Mpls vpn
Mpls vpnMpls vpn
Mpls vpn
 
Rgc.Deck.02.06.09
Rgc.Deck.02.06.09Rgc.Deck.02.06.09
Rgc.Deck.02.06.09
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
 
Ranks ITT Profile Presentation
Ranks ITT Profile PresentationRanks ITT Profile Presentation
Ranks ITT Profile Presentation
 
5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications5 Factors for MPLS Migration - XO Communications
5 Factors for MPLS Migration - XO Communications
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
LTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilitiesLTE Advanced Pro and M2M software development capabilities
LTE Advanced Pro and M2M software development capabilities
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
廣義隱函數口試ppt
廣義隱函數口試ppt廣義隱函數口試ppt
廣義隱函數口試ppt
 
Integra Telecom's Ethernet Solutions Presentation
Integra Telecom's Ethernet Solutions PresentationIntegra Telecom's Ethernet Solutions Presentation
Integra Telecom's Ethernet Solutions Presentation
 
Business Applications of Wide Area Ethernet
Business Applications of Wide Area EthernetBusiness Applications of Wide Area Ethernet
Business Applications of Wide Area Ethernet
 
Evolucion redes troncales_convergentes
Evolucion redes troncales_convergentesEvolucion redes troncales_convergentes
Evolucion redes troncales_convergentes
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the Home
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
2002023
20020232002023
2002023
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
Vpls%20backgrounder
Vpls%20backgrounderVpls%20backgrounder
Vpls%20backgrounder
 

Mais de Nir Cohen

Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration SolutionsNir Cohen
 
What is-twamp
What is-twampWhat is-twamp
What is-twampNir Cohen
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deploymentsNir Cohen
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationNir Cohen
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-complianceNir Cohen
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsNir Cohen
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsNir Cohen
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networksNir Cohen
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guideNir Cohen
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationNir Cohen
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationNir Cohen
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcationNir Cohen
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challengesNir Cohen
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Nir Cohen
 
Ethernet OAM evolution
Ethernet OAM evolutionEthernet OAM evolution
Ethernet OAM evolutionNir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 

Mais de Nir Cohen (18)

Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
 
What is-twamp
What is-twampWhat is-twamp
What is-twamp
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentation
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networks
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guide
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
 
Ethernet OAM evolution
Ethernet OAM evolutionEthernet OAM evolution
Ethernet OAM evolution
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Ce the cio perspective part iii v2 1 9-6-11

  • 1. Carrier Ethernet – The CIO PerspectivePart III: Ethernet and IP VPNs, When to Use Which? RAD Data CommunicationsJune 2011
  • 2. Ethernet and IP VPNs: When to Use Which? Layer 2 (L2) Ethernet and Layer 3 (L3) IP/MPLS VPNs offer different benefits for different needs:
  • 3. L2, L3 Key Decision Factors:Cost, Scalability, Control Low price per Mbps: Ethernet VPNs are ideal for high throughput typically required at large branches or data centers IP/MPLS VPNs: Fit highly distributed installations, a very large number of sites Low to medium bandwidth rates Ideal for remote access Control: Enterprises comfortable with self managing their IP address space and routing tables prefer Layer 2 Ethernet VPNs Businesses without in-house knowledge of IP switching fundamentals, prefer turnkey VPNs
  • 4.
  • 5. Meet bandwidth, delay and control requirements for high volume content delivery, storage and disaster recovery
  • 6. L3 VPN for branch connectivity:
  • 7.