VPN Peer Model (MPLS)

 < Day Day Up > 



Because of the cost of ownership and complexity of implementation, many firms choose to trust their carrier with maintaining data integrity. These networks become known as 'trusted VPNs;' networks with encryption are known as 'secure VPNs.' In trusted VPNs, the sites are linked to the provider edge equipment (PE) via dedicated links or leased lines and tunnels are built from PE to PE (see Figure 7.15). The peer model is also called router adjacency.

click to expand
Figure 7.15: Peer Model

In the datacom marketplace, IP traffic is the primary network transport. Carriers wishing to provide IP VPNs offered Frame Relay (FR) and ATM. These solutions are good, but often are not scaleable or cost effective enough to provide viable solutions for many businesses.



 < Day Day Up > 



Rick Gallagher's MPLS Training Guide. Building Multi-Protocol Label Switching Networks
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks
ISBN: 1932266003
EAN: 2147483647
Year: 2003
Pages: 138

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net