SERVICE DESCRIPTION IP VPN - broadnet.no · 4 broadnet.no 1 IPVPN 1.1 Introduction IPVPN is a...
-
Upload
nguyenliem -
Category
Documents
-
view
216 -
download
0
Transcript of SERVICE DESCRIPTION IP VPN - broadnet.no · 4 broadnet.no 1 IPVPN 1.1 Introduction IPVPN is a...
2
broadnet.no
1 IPVPN 4
1.1 Introduction .......................................................................................................................................... 4
1.2 Functionality and customer advantages of IPVPN ................................................................................. 6
1.3 Functional differences between IPVPN Managed and IPVPN Unmanaged ............................................ 7
Functionality 7
IPVPN managed 7
IPVPN unmanaged 7
2 TECHNICAL FUNCTIONALITY 7
2.1 Scalability .............................................................................................................................................. 7
2.2 Access technology and capacity ............................................................................................................. 7
2.2.1 ADSL – Shared access 8
2.2.2 Interface 8
2.3 Customer Edge router/switch ................................................................................................................ 8
2.4 Network topology ................................................................................................................................. 9
2.5 Responsibility ........................................................................................................................................ 9
2.6 Technical terms and conditions ........................................................................................................... 10
2.6.1 Transmission quality 10
2.6.2 Network protocols 10
2.6.3 Packet sizes 10
2.6.4 DHCP (Dynamic IP allocation) 11
2.6.5 Networktopology 11
2.7 Quality of Service (QoS) ....................................................................................................................... 11
2.7.1 Quality of Service 11
2.7.2 Traffic flow not traffic chaos 11
2.8 Traffic prioritization and traffic classes ................................................................................................ 12
2.9 Traffic profiles ..................................................................................................................................... 13
2.9.1 Standard profiles 14
2.9.2 Extended profiles 14
2.9.3 Traffic profiles with the use of partners 15
2.9.4 Design of solution with traffic prioritization 15
2.9.5 Functionality of traffic classes 15
2.9.6 Implementation of traffic prioritization 17
2.9.7 Tagging of traffic 17
3
broadnet.no
3 ADD-ON SERVICES 18
3.1 Parallel networks (MultiVPN) .............................................................................................................. 18
3.1.1 Parallel networks and network topology 20
3.2 Redundancy ........................................................................................................................................ 20
3.2.1 IP VPN Line redundancy 21
3.2.2 IP VPN Mobile Backup 21
3.3 IPVPN OffNet – connection via Internet .............................................................................................. 22
4 SUPPLEMENTARY SERVICES 24
4.1 Internet access .................................................................................................................................... 24
4.1.1 Internet BreakOut 24
4.1.2 Net-centric Internet access - Secure Internet Gateway 24
4.2 Security and net-centric services ......................................................................................................... 26
4.2.1 Customer-adapted firewall 27
4.2.2 Connection of several VPN 27
4.2.3 Home offices and Mobile users 27
4.3 NETS/Payment access ......................................................................................................................... 27
4.3.1 Net-centric payment access 27
5 SLA SERVICE LEVEL AGREEMENT 28
5.1 Servicetime ......................................................................................................................................... 28
5.2 Quality Level ....................................................................................................................................... 28
6 PERFORMANCE MANAGEMENT 29
6.1 Background ......................................................................................................................................... 29
6.2 Performance monitoring - VPNview .................................................................................................... 29
6.3 IPVPN SLA Report ................................................................................................................................ 31
7 PRICE 32
7.1 Price structure ..................................................................................................................................... 32
8 FAULTPROCEDURE AND FAULTCORRECTION TIME 33
4
broadnet.no
1 IPVPN
1.1 Introduction IPVPN is a flexible data communication service, built for the professional market in Norway. IPVPN is carried
over Broadnet’s nationwide MPLS-based core network in Norway, Sweden and Denmark. Based on this,
Scandinavian as well as national MPLS-based network solutions can be supplied.
IPVPN is supplied in two different types:
IPVPN Managed is an end-to-end service in which Broadnet has the ownership and operational
responsibility of CE routers (Customer Edge) or switch at customer locations. Broadnet is
responsible for the end-to-end solution and monitors availability and quality up to the CE
routers/switch LAN interface at the customer. The solution is suitable for customers that wish to
hand over the entire WAN operation to their supplier.
Figure 2-1: Principle overview of a suggested solution using IPVPN Managed
5
broadnet.no
IPVPN Unmanaged is an operated service for which Broadnet is responsible for the solution up to
and including the access modem. The solution is suitable for distributors that wish to resell
IPVPN, or for customers that wish to own, implement and operate the CE router/switch
themselves.
Figur 1-2: Principle overview of a suggested solution using IPVPN Unmanaged
6
broadnet.no
1.2 Functionality and customer advantages of IPVPN Traffic priority ensures traffic flow, giving priority to critical traffic via various traffic classes with
the correct Quality of Service, QoS
Fully meshed topology, in which all locations can communicate directly to one another or to net-
centric services at Broadnet.
Star network (point-to-multipoint) for example connecting to the customer’s head office or data
center
Various access types; Fiber, SHDSL, VDSL, ADSL2+, digital leased lines and Ethernet for the best
possible adaptation to the customer location needs
Redundancy in the form of line diversity and Mobile backup
Parallel networks (MultiVPN) can be set up for branch networks, extranet and similar, and be
terminated as VLAN or on separate ports on the CE router
National coverage with the possibility of expanded connection of global locations
Flexible service arranged for simple up/downgrading of capacity and adding new, or removing
existing locations
Active notification of customers in fault situations, if so required. This can be by telephone or
text message, or by using Broadnet’s web/mail-based ticketing system.
Traffic statistics available via a web interface. Updated and historical data is available for the use
of bandwidth per location.
Additional services for Internet access, security, payment access services, solutions for home
offices and Mobile users
Access to qualified support personnel and error reporting 24/7, based on the selected coverage
period
Service Level Agreement/Service Quality which is adapted to customer location requirements, in
accordance with quality levels and cost optimization
7
broadnet.no
1.3 Functional differences between IPVPN Managed and IPVPN Unmanaged
Table 2-1 below shows an overview of the functional differences between the services IPVPN Managed and
IPVPN Unmanaged.
Functionality IPVPN managed IPVPN unmanaged
Fully meshed topology √ √
Star Network (point-to-multipoint) √ No
Parallel Network (MultiVPN) √ No 1
Quality of service (QoS) and traffic prioritization √ √
IP VPN o/Internet (for global coverage) √ No
Line redundancy √ √
Mobile backup √ No
Internet Break Out √ No
Encryption √ No
SLA 2 √ √
VPNview2.0 √ No
Active notification √ No
Coverage Global Scandinavia
Table 2-1: Functionality support IPVPN Managed vs. IPVPN Unmanaged
2 Technical functionality
2.1 Scalability With IPVPN Managed, the customer can easily add new locations to a WAN solution, move existing locations
or close down locations if this should be required. The customer can easily change the functionality at one or
several locations. Changes can, for example, include IP addresses or functionality such as traffic prioritization,
redundancy or several VPNs at a later time if this has not been originally installed.
2.2 Access technology and capacity In principle, access is supplied from the customer location to Broadnet’s core network (connected to Provider
Edge PE router) on Broadnet’s self-owned infrastructure; however, if this is not possible, access provided by
third-party operators is used.
In principle, IPVPN Managed supports all access technologies, including fiber, Ethernet, digital leased lines,
SHDSL and ADSL. There may be differences in access technologies and capacities offered outside of Norway.
Table 2-1 below specifies access methods and capacity supplied for IPVPN Managed.
1 The exception is if the location is supplied with fiber access. In such case, parallel networks can be supplied for the specific location, on request case-by-case.
2 SLA may differ between the two services
8
broadnet.no
Access technology Access infrastructure Capacity
Fiber and Ethernet Broadnet self-owned 2 Mbps - 1 Gbps
Fiber and Ethernet Alternative supplier 10 Mbps - 1 Gbps
SHDSL (oa) Broadnet self-owned 1 – 8 Mbps
SHDSL (ws) Alternative infrastructure 1 – 8 Mbps
VDSL (oa) Broadnet self-owned 25 – 60 Mbps
VDSL (ws) Alternative supplier 25 – 40 Mbps
Leased line Alternative infrastructure 2 – 8 Mbps
ADSL (oa) Broadnet self-owned 1 – 20 Mbps
ADSL (ws) Alternative supplier 1 – 16 Mbps
Outside of Norway Alternative supplier On request
Table 2-1: Available access methods/capacity
For detailed information concerning alternative speeds, please see the recommended price list for IPVPN
Managed.
The access method/capacity ordered per location by the customer, is that which will be supplied if the desired
access form/capacity is available for the location.
2.2.1 ADSL – Shared access
The term shared access is used when the customer uses the IP VPN access (ADSL-based) which is to be used
for IP VPN Managed for telephony. The cost of copper line lease is shared in such case between the telephony
service and the IP VPN service.
If the customer does not have a telephone line at the relevant location, or the customer wishes to have IP VPN
Managed service supplied on a dedicated copper line, the IP VPN-access can be offered without telephony if a
line is available.
2.2.2 Interface
IPVPN Managed is supplied with the router/switch LAN interface, for example Ethernet, FE or GigE.
2.3 Customer Edge router/switch As part of IPVPN Managed, a router or switch is supplied - Customer Edge (CE) router/switch.
In principle, Broadnet will design the customer’s IP VPN solution with a suitable router, or in certain
circumstances a switch. The CE router/switch will be adapted to the capacity and functionality specified by the
customer per customer location.
Based on the router or switch model used, there may be limitations in the functionality that can be selected by
the customer. There may also be limitations in the type of functionality that can be added later, without
replacing CE equipment.
9
broadnet.no
2.4 Network topology IPVPN Managed can be run as a star network (point-to-multipoint), for example connected to the customer’s
head office or net-centric services at Broadnet, or by fully meshed topology in which all locations can
communicate directly to one another. If a star network is used, Broadnet, based on the customer’s
requirements, can determine to what degree indirect communication between locations shall be permitted.
2.5 Responsibility IPVPN Managed is supplied with a CE router/switch at each location owned and operated by Broadnet.
The interface between the customer and Broadnet is the CE router’s/switch LAN interface. Broadnet is
responsible for the supply and operation of the solution, including capacity in the core network, local access by
modem (normally) and CE router/switch. The customer is responsible for the local network and internal
cabling at each location, as well as the installation of the modem and CE router/switch.
Internal cabling at the customer's locations is not included in the IP VPN Managed service and any costs
related to fault situations/installation of internal cabling from the network terminal point (NTP) to the modem
is customer responsebility. In cases where the access provider does not own the internal cabling, local access
will be supplied to NTP according to the ”outside wall” principle.
Internal company networks from NTP to the installed RJ45 contact (or other) for connection of access
equipment, is also the responsibility of the customer; the same applies to costs of any new cabling and fault
correction in internal company networks.
Broadnet has the operational responsibility for the service, cf. arrow as in ”IPVPN Managed connection” in
Figure 2-1 on the next page.
Lokalaksess (xDSL,leid linje e.l.)
Ventelo Kjernenett
TegnforklaringDSLAM el. annet termineringsutstyr
Kundeutstyr
Nett Terminerings Punkt (NTP)
Modem
Ventelos ansvarKundeansvar Kundeansvar
Ventelo IP VPN Managed-forbindelse
”Customer Edge”
ruter/switch - eid og
driftet av Ventelo
CE Ruter
CE Ruter
Switch
Switch
Internkabling
Figure 2-1: Overview of areas of responsibility and demarcation point for IPVPN Managed
It is a condition that the terminal point for local access is placed in the immediate vicinity of the customer’s
LAN connection. This is normally resolved by internal cabling, installed by the installation company that
supplies the access connection. The customer is himself responsible for ordering and costs related to this.
Broadnet IPVPN Managed connection
Broadnet responsibility
«Customer Edge»
router/switch, owned
and operated by
Broadnet
Broadnet core network
10
broadnet.no
The customer can have access to SNMP read access to the CE router/switch, also access to ping for various
interfaces on the router/switch. With this service, in addition to Broadnet’s monitoring, the customer can also
use his own management systems with the solution.
Other access, such as telnet and ”SNMP write access”, to the CE router/switch will not be provided to the
customer. Among other things, this is to avoid any doubt regarding responsibility in the event of faults
occurring in the CE routers/switches.
2.6 Technical terms and conditions
2.6.1 Transmission quality
The values are mean values in normal situation, measured over a month from CE to CE. Quality parameters for
delay, packet loss and jitter does not apply when access lines when saturation above 75% utilization of
capacity, even for short time intervals.
* Accesses with asyncrone DSL technology is not included in the guarantees of transmission quality for Jitter and Packet
Table 3-4 Transmission quality
Measurment of packetloss: The percentage of data sent in the network, but not reaching the destination.
Data is collected from selected routers with an interval of five minutes. Monthly statistics on delay and
package deliveries calculated on the basis of the average of all samples from the previous month. Packet loss is
calculated using the formula below:
(Total data sent - total data received)*100
Total data received
Measurment of delay: Delay is the time it takes to send a data packet from sender to receiver (unidirectional
delay). Broadnet measures delay in terms of Round Trip Delay (RTD) corresponding delay from sender to
receiver and back to sender.
Measurment of jitter: Jitter is the variation in the time between packets
2.6.2 Network protocols
IPVPN is designed for the transport of IP, currently Ipv4. Routing between locations takes place based on IP. It
is a premise that the customer uses different IP subnets at each location. The customer may use both
unofficial IP addresses (RFC 1918) an official IP addresses in the network.
2.6.3 Packet sizes
MTU (Maximum Transmission Unit) specifies how many bytes can be transferred in an IP packet. MTU packet
size IPVPN is 1500 bytes. This is the same packet size as in most Ethernet-based LAN and is also standard,
among other things, in Microsoft Windows.
Traffic profile RT VOICE RT VIDEO BUSINESS LAN BULK STANDARD
DSCP value 46/EF 34/AF41 26/AF31 18/AF21 10/AF10 0/BE
Max packetloss 0,01 % 0,03 % 0,05 % 0,1 % 0,3 % 0,3 %
Max delay <1200km 43ms 45ms 47ms 51ms 55ms 55ms
Max delay >1200km 67ms 69ms 71ms 75ms 79ms 79ms
Max jitter* 15ms N/A
11
broadnet.no
The packet size may differentiate somewhat with the use of Mobile Backup and parallel networks.
2.6.4 DHCP (Dynamic IP allocation)
Individual CE routers can be set up with DHCP forwarding (also known as ”IP helper address”) for central DHCP
servers installed with the customer. Broadnet does not set up a DHCP service locally on individual CE routers,
since if this was the case we would have to be involved in the operation of the customer’s DHCP service.
2.6.5 Networktopology
IP VPN Managed include standard 'Fully meshed' VPN topology. As an option, the solution can be set up as a
star network (Hub & Spoke / point-to-multipoint).
When selecting HUB & Spoke, Broadnet may, based on customer requirement adapting to what extent indirect
communication between locations should be allowed.
Broadnet offers only one version of Hub & Spoke, where traffic on the HUB site will be separated logically on
ingoing- and outgoing-traffic. The service delivered to the customer LAN, either on a physical port, separated
on VLAN for inbound and outbound traffic, or on two physical ports.
2.7 Quality of Service (QoS)
2.7.1 Quality of Service
Quality of Service means in this context the quality that is defined for IP VPN Managed and/or the user’s
quality experience, taking into account the quality parameters of; jitter (variation in delay), delay, packet loss
and available bandwidth.
Different types of traffic/applications have different demands in regard to quality of service, and are of
different mission-critical importance for customers. This is resolved by prioritizing traffic in different traffic
classes with different levels of quality.
2.7.2 Traffic flow not traffic chaos
In a WAN solution, the customer will be able to run many different applications of varying importance for the
company's business and with different needs in regard to quality. It is important that all applications have
appropriate working conditions in order to function satisfactorily for users. Figure 2-1 below shows the
principal overview in which the users of the company's attempt to use a number of different applications at
the same time, such as IP telephony, ERP systems, video conferencing, Internet browsing and sending of e-
mail.
12
broadnet.no
Figure2-2: WAN- solution, in which users are attempting to run a number of different applications all at the
same time
The traffic begins to go slowly and applications do not function as intended; finally it is as good as impossible
to use IP telephony, videoconferencing or the order system.
Traffic flow
The solution here is to introduce a system based on IPVPN Managed with prioritization of the customers
various applications into different traffic classes with the appropriate quality. In this way, good flow is ensured
for all types of traffic. Prioritization of traffic by using different traffic classes with different qualities is often a
better solution than merely increasing bandwidth, as the working conditions for applications is also ensured.
However, it is important to note that the number of simultaneous video conferences and/or telephone calls
must be balanced against the available bandwidth.
2.8 Traffic prioritization and traffic classes In order to prioritize the customers various applications, it must be possible to divide these applications into
different traffic classes. Broadnet offers different traffic classes adapted to various applications’ characteristics
and identified (classified) applications are put into the desired/correct class.
Each traffic class has a set of quality parameters with certain values;
1) Jitter –variation in delay 2) RTD (Round Trip Delay) delay 3) Packet loss
13
broadnet.no
IP telephony is for example dependent on low packet loss and small variations in delay (jitter) in order to
function satisfactorily. Real-time video has the same requirements for limited jitter and packet loss, but has a
totally different traffic pattern, with variable packet sizes and an extremely dissimilar packet rate and should
therefore be in a separate traffic class than IP telephony. Terminal traffic (for example Citrix) is especially
affected by high delays through the network.
These application examples are thus dependent on continual bandwidth and correct quality and may be
negatively affected if the availability of bandwidth in periods is limited by other traffic and/or the quality in the
network depreciates. This can be counteracted by identifying critical traffic and giving this priority in front of
less critical traffic, such as for example e-mail replication and web traffic, and that the applications are sent in
traffic classes with a quality level adapted to the individual application’s characteristics.
IPVPN is designed to recognize and prioritize 6 traffic classes. Table 2-2 below shows which classes are defined
and examples of the type of application that can fit into each class.
Traffic class Application type Application example
Voice For typical real time applications that are sensitive to variations in delay, delay in general and packet loss
Telephony applications
Video Video conference real-time
Business Interactive traffic such as ERP applications and other applications that are sensitive to delay and packet loss
IFS, SAP, Citrix, Movex
LAN Interactive applications with small transfer amounts, or traffic that is to be prioritised after Business - less mission-critical
Payment transactions, measurement data
Bulk traffic ”Large data transfers” that are not sensitive to delays or packet loss
Backup/restore and replication of large amounts of data
Standard Robust and non mission-critical applications Internett browsing (ftp), e-post, backup, replication
Table 2-2: Defined traffic classes and examples of application types and/or applications
Traffic classes can be divided into two groups:
Voice and video classes are of the type “RealTime”
The remaining classes are known as “Data classes”
All traffic that is not specially classified, will be put in the data class ”Standard”. This will also apply to
customers that do not order the Traffic Prioritization product.
2.9 Traffic profiles A set of traffic profiles is designed based on the traffic classes that are defined for prioritization of different
applications. The profiles are composed of the different traffic classes, based on ”best practice” and
Broadnet’s experience.
The customer selects the profile that passes best per location, in relation to which applications are to be used
in the solution, based on application characteristics and commercial considerations.
The customer must decide himself which applications are to be prioritized and which traffic classes are to be
used. However, it is important that the solution is designed taking into account which locations are to
communicate with other locations, such that the prioritization mechanisms can be fully utilized. For example,
it is important that the profile with RealTime Voice is selected at all locations that use IP telephony, although it
is possible to use different profiles within a solution.
14
broadnet.no
In principle, the same profiles are used regardless of the access form. However, for xDSL accesses, the capacity
is ”shaped” down to the nearest full Mbps.
2.9.1 Standard profiles
See Figure 2-3 below for a visualization of available standard traffic profiles. The profiles are designed to offer
prioritization of up to 4 different traffic classes simultaneously, dependent on the selected profile.
Figure 2-3: Defined standard traffic profiles
2.9.2 Extended profiles
For customers with special requirements, there are two extended profiles, see Figure 2-4 below. These profiles
are only offered by request and require a special connection to Broadnet’s network.
“Extended profiles” offer the possibility to prioritize up to 5 or 6 different traffic classes simultaneously.
Trafikkprofil 5
30%
RealTime
- Voice
Trafikkprofil 4
25%
Standard
Trafikkprofil 3
55%
Business
50%
Standard
50%
Business
Trafikkprofil 1
100%
Standard
Trafikkprofil 0Trafikkprofil 6
70%
RealTime
- Voice
25%
Standard
20% LAN
Trafikkprofil 2
30%
RealTime -
Voice
35%
Business
10% LAN
20%
RealTime
- Video
20%
Business
30%
Standard
5% RT Voice
35%
RealTime -
Video
35%
Business
25%
Standard
15
broadnet.no
Figure 2-4: Extended traffic profiles
2.9.3 Traffic profiles with the use of partners
If IPVPN is supplied outside of Norway, Broadnet uses partners to provide IP VPN-access for connection to
Broadnet’s network. It is necessary to take into account the type of traffic prioritization and QoS level that
these supply. Broadnet has, however, strived to design profiles that are as closely adapted as possible to the
profiles that are defined for supply in Norway.
2.9.4 Design of solution with traffic prioritization
Design and implementation of an MPLS-based WAN solution with traffic prioritization requires specialist
competence both in regard to how the QoS and traffic prioritization functions, also knowledge of the
customer’s network solution and applications. A solution designer at Broadnet will therefore be able to assist
in this process as part of the IPVPN Managed service. In consultation with the customer, identification will be
made of how the customer’s specific applications should be prioritized in order to effectively utilize the
individual traffic classes and to design an optimal network solution based on the customer's demands and
commercial requirements.
2.9.5 Functionality of traffic classes
Flexibility
Even though traffic prioritization for IPVPN Managed is based on pre-defined profiles, the service is highly
flexible. The customer does not need to use all of the traffic classes in a selected profile. This makes it possible
for the customer to adapt the service to his needs, and the bandwidth per location will be utilized optimally; at
the same time consideration is taken for that applications will function optimally in accordance with the stated
characteristics.
Trafikkprofil 11
30%
RealTime
- Voice
Trafikkprofil 10
20%
Business
30%
Standard
10% RealTime - Voice
10% RealTime - Video
20%
Business
30%
Standard
10% LAN
20% Bulk
10% RealTime - Video
10% LAN
16
broadnet.no
RealTime classes
Based on the characteristics of typical real-time applications, all traffic in real-time classes that runs outside of
the selected profile is designed to be rejected. This is done to ensure the required quality in order for these
types of application to function optimally.
The audio part of the video class will go in the voice class if this traffic is tagged as voice. Some video systems,
however, tag the voice part such that this will go in the video class.
If the need arises for more capacity for real-time applications, available bandwidth for the specific location
must be increased; the maximum number of telephony and/or video channels that can be set up at the same
time from/to the location must be reduced
Data classes
Traffic in the data classes can utilize available capacity, also outside of that which the profile is designed for.
If there is too much traffic in a data class, this is only rejected if the other classes are running at full capacity of
that for which they are designed. This is to ensure good traffic flow for all traffic also to ensure the correct
quality for the applications that are running.
The quality level for traffic that runs over another class than that which the application(s) is/are designed for,
cannot however be guaranteed. Therefore there may be a need to increase the available bandwidth in order
to achieve the correct effect in the traffic prioritization service.
An example of traffic flow
The customer selects Traffic Profile 3, 30% Real Time Voice, 35% Business, 10% LAN (Transaction) and 25%
Standard. This traffic profile is installed at the head office, with an IP VPN access of 20Mbps, and thus total
available bandwidth.
1. The customer sends 30% Voice, 10% LAN and 25% Standard traffic. In addition the customer sends more than 35% Business traffic, e.g. 50%. In this case 15% of Business traffic will be rejected. The traffic in the remaining classes will get their allocated bandwidth and quality. The customer in this example runs too much traffic in total and should upgrade his IP VPN access, i.e. increased the available bandwidth, if this is a normal situation.
2. If the customer however does not utilize the remaining traffic classes in full, may be thus: the customer continues to send 30% Voice, but no traffic in the LAN class and only 205 in the Standard class and can thereby send 50% Business traffic and still not exceed the available 20 Mbps. 30% that is the guaranteed bandwidth, in addition to 15% that is ”loaned” from the other data classes that are defined for Profile 3. The correct quality level is only guaranteed however for the traffic that falls within 30%.
3. The customer tries to set up several simultaneous telephone calls than that which the 30% Voice capacity That Profile 3 allows for, i.e. he wishes to run Voice traffic over 30%. All Voice traffic that exceeds 30% (of 20 Mbps), will be rejected.
17
broadnet.no
2.9.6 Implementation of traffic prioritization
Traffic prioritization is implemented over the IP VPN access. Traffic is prioritized both in from the CE router
(customer side) and out from the PE router (network side).
The customer's applications are placed in the correct traffic class and are prioritized and transported based on
the quality parameters as defined for the given traffic class.
1. The traffic is classified on the CE router’s LAN port (customer side)
2. The traffic is prioritized on the CE router’s WEAN port and is ”shaped” in accordance with the capacity of the IP VPN access (customer side).
3. The traffic retains the information on classification and prioritization through the core network.
4. The traffic is prioritized out from the PE router (network side) and is ”shaped” in accordance with the capacity of the IP VPN access
2.9.7 Tagging of traffic
In order to send out different traffic types (applications) in the correct class, the traffic must be tagged. The
applications will either be tagged in the CE router by Broadnet, or the customer will tag the traffic himself -
also including when tagging is complete in the application.
It is possible to combine the two methods of classifying traffic; Broadnet-classified and customer-classified
tagging.
All traffic that is not specially tagged, will be put in the data class ”Standard”.
Broadnet classification of traffic
If Broadnet is to tag the traffic this is done based on the customer specifications, and/or based on an already
defined setup based on known ports, see Appendix A below. Traffic in the Business class is tagged when using
the standard setup.
Applications that are run in the network, for example IP telephony and various ERP applications, identified by a
Broadnet operated CE router based on the specifications given by the customer.
Classification of traffic can be based on known ports, customer specific TCP/UDP ports, (sub) interface or
source and/or destination IP addresses. It is also possible for Broadnet to re-tag based on the customer's own
tagging.
CE-ruter PE-ruter PE-ruter CE-ruter
Lo
ka
lne
ttL
ok
aln
ettIP VPN-
aksess
2
Ventelos kjernenett
1 2 3 4
18
broadnet.no
Customer classification of traffic
If the customer himself chooses to tag the traffic this must be carried out in accordance with DSCP values as
specified in Table 2-3 below. The applications are placed in the different traffic classes based on this
identification.
Traffic classes Values Description (dscp phb)
RealTime Voice 46 EF Expedited Forwarding
RealTime Video 34 AF41 Assured Forwarding
Business 26 AF31 Assured Forwarding
LAN (Transaction) 18 AF21 Assured Forwarding
Bulk traffic 10 AF11 Assured Forwarding
Standard 0 BE Best Effort
Table 2-3: DHCP- values defined for the different traffic classes
If the CE router (operated by Broadnet) handles the identification, the customer does not need to adhere to
these DSCP values.
3 Add-on Services
3.1 Parallel networks (MultiVPN) A network solution based on IPVPN Managed can be designed to contain several separate networks/VPN in
parallel, MultiVPN. Units on each of the separate networks can communicate with each other over the IP VPN
solution. At the same time, IP VPN Managed does not allow traffic between different separate VPN.
19
broadnet.no
The principle can be explained in a simple manner with an example:
Figure 3-1 Example of the use of IP VPN with parallel networks
Figure 3-1 above shows a potential solution for a company that has both PCs used by employees and PCs used
by guests. As visitors are not granted access to the company's internal systems, there is a need to separate the
networks. However, as both employees and guests are to have access to the Internet and central systems
installed at the head office, both of these separate networks are transported between the company’s
departments. In addition, IT system operations personnel at the head office must be able to remotely control
switches at several of the company’s department offices, without the company's other employees having
access to these.
This means that there is a need for transport of 3 networks in parallel; for IT operations, employees and
customers. Each CE router has only physical or logical LAN interfaces for the networks that are represented in
the departments in which they are located. Departments 1 and 5 in the example only have PCs for employees
and no switches that require remote control. Therefore, they only have the network for employees
represented. Departments 2, 3 and 4 have PCs both for guests and for employees, and have networks of both
customers and employees represented. Departments 2 and 3, in addition, have switches that are controlled
centrally from the IT department, and therefore have the IT operations network represented.
CE routers can either supply each separate VPN on a separate physical interface or in one interface separated
at VLAN at a switch. In Figure 3-1 this is exemplified with several physical interfaces in Department 4 and VLAN
at the head office, also Departments 2 and 3.
20
broadnet.no
The CE routers and IP VPN solution as a whole keeps the different networks totally separate. Security in regard
to joint resources and the Internet is safeguarded by firewalls at the head office, which the company itself
manages. Security between the separate networks is in this way completely and fully under the company's
control.
3.1.1 Parallel networks and network topology
IPVPN Managed can be supplied both as a star network and with fully meshed topology, see chapter 2.4
above.
When parallel networks are supplied, there may be limitations in relation to how many of these networks can
be supplied as fully meshed networks. Any limitations may mean that only one VPN can be supplied as fully
meshed and the others must be implemented as star networks. For the star networks it is the choice of the
customer, per VPN, whether communication between the individual locations is to be allowed.
3.2 Redundancy For customer locations with extra demands in regard to service reliability, for example the head office or a
data center in which applications are centralized, we offer several variations for redundancy. Depending on
the type of redundancy selected, this will significantly reduce the chance of downtime.
Figure 3-2: IPVPN Managed solution with line redundancy at a central location and GPRS/ISDN backup at two
branch offices
Figure 3-2 above illustrates the different grades of redundancy offered and how these can be combined in a
single solution.
21
broadnet.no
The following service types are offered:
IP VPN Line redundancy
IP VPN Mobile Backup
The following sections describe the different services in further detail.
3.2.1 IP VPN Line redundancy
For locations with especially stringent demands in regard to service reliability, such as for example a data
center, line redundancy is a good alternative.
At the customer location, two CE routers are installed, each with their own IPVPN access. It is a requirement
that the primary and secondary access is supplied via independent separate data lines. The transfer from
primary to secondary CE router and access takes place automatically using HSRP (Hot Standby Routing
Protocol).
IP VPN Line redundancy can also be used to build in redundancy for geographically separated units, for
example primary and secondary data centers. This requires that the customer has a connection between the
two locations outside of the WAN.
Primary access in a redundant solution is supplied as fiber/leased line, whilst the secondary access is supplied
as xDSL or as fiber/leased line. An evaluation of the physical circumstances will be required at a location before
IP VPN Line redundancy can be offered.
Locations with IP VPN Line redundancy will qualify for a quality level of 99.9% availability. One individual fault
will in principle not lead to downtime for a location with line redundancy.
3.2.2 IP VPN Mobile Backup
With Mobile Backup a location will still be able to communicate if a fault should arise in a modem, IP VPN-
access or PE router. This is done by the CE router automatically switching over to a GSM/3G network to
continue to send data traffic in a fault situation. Transfer to the backup solution may take 3-4 minutes.
Mobile Backup is installed per customer location that requires a backup solution. If the customer has
implemented several VPN, it must be specified which VPN backup is required for.
In order to ensure that the customer’s most critical traffic/applications get through in a backup situation,
access lists can be set up in the controlling CE router. An individual access list is defined per VPN, and this must
be the same for all locations with Mobile Backup for the given VPNet.
Mobile Backup is currently available for locations in Norway.
The service includes a GSM subscription and the cost of data traffic in a fault situation. However, if a fault in a
location leads to more than 5GB of traffic over a backup solution in the course of a month, traffic over 5GB will
be invoiced based on the amount of data.
The effectiveness of the MOBILE Backup service will depend on the distance from the customer location to the
base station(s) and the strength of the signal/interference.
Locations with Broadnet MOBILE Backup will qualify for 99.7% for the quality parameter availability, based on
the premise that the location has coverage in a fault situation.
22
broadnet.no
Capacity and stability
It is not possible for Broadnet to guarantee the capacity of a backup connection in a fault situation, nor to
guarantee any coverage at the location in a fault situation.
Table 3-1 below shows typical values for capacity and an indication of the delay that may occur using various
technologies for MOBILE Backup.
Technology/service Uplink Downlink Delay (1-way)
EDGE 80 Kbps 140 Kbps 250-300 ms
UMTS 250 Kbps 400 Kbps 150-200 ms
HSDPA 300 Kbps 700 Kbps 100-125 ms
Table 3-1: Typical capacity and delay
The speeds listed above are average speeds observed over multiple carrier networks at different times of the
day. Actual speeds will vary depending on the number of users, distance to base stations and signal
strength/interference.
The CE router’s standard configuration is such that the router selects the radio band in auto mode. In auto
mode the router selects 3G (HSDPA [UMTS+], UMTS) if the signal is better than -100dBM; if not the router falls
back on 2G (EDGE *MOBILE++, MOBILE). Within 3G and 2G, ”enhanced” is selected if this is available - HSDPA in
preference to UMTS and EDGE in preference to MOBILE.
For a stable connection, RSSI > 90dBm is required. A connection with RSSI = -125dBm means that there is no
signal.
For locations with variable coverage on 3G, in certain cases it can be best to configure the CE router to ”GSM-
all-bands” to achieve a more stable line, instead of the highest possible speed. This can, for example, be used
where stability is more important than speed. This can be a good solution if the connection is only to be used
for backup of smaller transactions, e.g. payment transactions.
3.3 IPVPN OffNet – connection via Internet The primary coverage area of IPVPN is Scandinavia; Norway, Sweden, Denmark and Finland. However, several
customers have one or several locations outside of this area. These locations can be included in the customer’s
WAN solution by using the service IPVPN OffNet.
IPVPN OffNet is run over an encrypted connection over the Internet.
For these locations, Broadnet will supply an IPSec-based VPN terminated net-centrically in Broadnet’s core
network via a firewall and will be made accessible for the rest of the customer’s IP VPN Managed solution. A
CE router is installed that handles 3DES encryption (or DES if 3DES is prohibited by local authorities) into
Broadnet’s core network.
23
broadnet.no
Figure 3-3 below shows an overview of a solution that includes two OFFNet locations.
”Customer Edge” Ruter -Ruter eid og driftet av Ventelo
Lokalaksess
Ventelo Kjernenett
Tegnforklaring
Kundens VPN
CE Ruter
Internett
Internettaksess, Kundens ansvar
Nettsentrisk Brannmur, eid og driftet av Ventelo
Brannmur
Hovedkontor
Avdelinger CE Ruter
CE Ruter
CE Ruter
Ventelo IP VPN OffNet
CE Ruter
CE Ruter
klynge
Brannmur
Salgskontor el.- Singapore
CE RuterSalgskontor el.- Malaysia
CE Ruter
Figure 3-3: Principle sketch for the use of IPVPN OffNet in Malaysia and Singapore
IPVPN OffNet locations can be members of several parallel networks, if several VPN tunnels are set up. Traffic
prioritization is however not available for IPVPN OffNet locations. The customer himself must install or use an
existing Internet access as local access to the CE router. It is a condition that the Internet access has a fixed,
official IP address.
Beyond the stipulations listed above, Broadnet does not decide which Internet service provider is to be used
by the customer or the specific quality required by the access. However, Broadnet will not have any
operational responsibility for the Internet access. This also means that Broadnet’s quality guarantees do not
apply where IPVPN OffNet is used.
Despite the above stated reservations, the use of IPVPN OffNet will provide customers with a complete
network also outside of Norway.
Broadnet core network
Broadnet IPVPN Off-net
Nett centric firewall, owned
and operated by Broadnet
«Customer Edge» router, owned and
operated by Broadnet
24
broadnet.no
4 Supplementary services
4.1 Internet access Internet access can be supplied along with IPVPN Managed in several ways:
Figure 4-1: Example of an IPVPN Managed based solution with Internet access, dedicated or net-centric.
4.1.1 Internet BreakOut
Internet Breakout can be configured per customer location, but advised delivered at a central punk ten
Customer networks. The service provides direct access to the Internet without any kind of security. Customer
safeguards assertiveness against Internet in their own firewall.
If Internet Breakout is delivered at a central location, for example on the customer's headquarters or data
center, can other sites use Internet via the customer's central location. This solution transport Internet traffic
over the same local access as all other traffic in the customer network. Traffic Prioritization can however be
implemented to ensure priority of another type of business-critical traffic.
4.1.2 Net-centric Internet access - Secure Internet Gateway
The service Secure Internet Gateway offers customers secure access to the Internet via a net-centric firewall in
Broadnet’s core network. All locations can thereby communicate securely with the Internet without going via
the customer’s head office, data center or similar, and this limits the capacity required at the central location,
and at the same time security is safeguarded by firewall functionality.
«Customer Edge» router, owned and
operated by Broadnet
Broadnet core
network
Firewall, owned
and operated by
Broadnet Broadnet Internet
25
broadnet.no
The network capacity per location is utilized optimally by combining intranet and Internet traffic in the same
access. Traffic prioritization can be implemented to ensure prioritization of mission-critical traffic.
Firewall functionality supported by Secure Internet Gateway
An official IP address per VPN for outgoing traffic (NAT = Network Address Translation)
All outgoing traffic from VPN is permitted. This traffic has NAT applied.
One customer specified IP address on the inside of VPNet can be made available for access from
the Internet with the following services: SMTP (e-mail), HTTP/HTTPS (web), RDP, POP3, IMAP.
This is done via NAT on the central firewall.
Weekly reporting (log analysis)
Limitations
On the inside of the IPVPN network, it is not possible to change the following services: SMTP (e-
mail), HTTP/HTTPS (web), RDP, POP3 or IMAP, including the selection of ports, restrictions on
addresses on the outside that shall have access to these, or to spread the services over several
machines.
Reports (log analysis)
A weekly report (log analysis) is available as an option for Secure Internet Gateway.
26
broadnet.no
4.2 Security and net-centric services In addition to the IPVPN service enabling communication between the customer’s locations, the service can
also be used for access to net-centric services central in Broadnet’s network.
Figure 4-2: Example of net-centric services for an IPVPN Managed solution
27
broadnet.no
4.2.1 Customer-adapted firewall
Broadnet has extensive experience and competence in the supply and operation of network security services.
Broadnet’s solutions include among other things the service ‘Customer-Adapted Firewall’.
Examples of functionality in Customer Adapted Firewall
URL (Web) filtering
Virus scanning (also for e-mail if the customer has an e-mail service supplied by Broadnet)
DMZ (via own VPN)
Weekly reporting (log analysis)
Reports (log analysis)
A weekly report (log analysis) is available as an option for Customer Adapted Firewall. For more information
see chapter 5.3.4 below. Customers that have installed Secure Internet Gateway and wish to have a more
advanced security solution, can migrate to Broadnet Customer Adapted Firewall.
4.2.2 Connection of several VPN
With IPVPN net solutions can be established in which several VPNs are connected together via a net-centric
firewall functionality in Broadnet’s core network.
The customer can for example have a need for communication with a partner’s IPVPN solution, or wish to
separate home office users in a separate VPN.
4.2.3 Home offices and Mobile users
Access for home offices and Mobile users can be made available via VPN clients, IPSec VPN, or SSL VPN on the
user's PC, which communicates with the firewall at Broadnet. For users that do not already have an Internet
access they wish to use, Broadnet can supply Internet access based on various access types and adapted
capacity.
4.3 NETS/Payment access
4.3.1 Net-centric payment access
Net-Centric Payment Access offers customers secure access to payment services via a net-centric firewall
localized in Broadnet’s core network.
Net-Centric Payment Access is suitable for customers with integrated back-office/terminals and/or customers
with a relatively large number of locations that run payment transactions.
All locations can communicate with the payment service provider without going via the customer's head office
or data center, whilst at the same time security is safeguarded in the firewall.
Access capacity per location is utilized optimally by combining Internet traffic and payment transactions in the
same access. Traffic prioritization can be implemented in order to ensure prioritization of mission-critical
applications.
Net-Centric Payment Access follows the IP VPN Managed solution’s design and offers the same level of
redundancy built into this solution.
28
broadnet.no
5 SLA Service Level Agreement Included as part of the IPVPN Managed service is a defined service quality - also known as Service Level
Agreement (SLA). The SLA specifies the quality agreed between the customer and Broadnet for the IPVPN
Managed service.
Broadnet’s Service Level Agreement (SLA) for IPVPN Managed is designed such that the quality level of service
can be adapted to the customer's requirements and/or cost/benefit analysis per location. This, along with the
reporting possibilities available, offers customers a predictable network and an excellent opportunity to follow
up the solution’s quality level.
Each quality parameter has a predefined quality level which indicates whether the IPVPN Managed service lies
within the agreed quality.
Please note that at this current time there may be variations in the agreed quality level for customer locations
outside of Norway. For these locations, technical personnel at Broadnet, on request, will assess which agreed
quality level Broadnet can offer per quality parameter based on the location’s geographical area and
requirements.
5.1 Servicetime Service time specifies the time period Broadnet performs error correction on the service. The customer can
choose Basic, Extended or Continuous service time. If desired debugging beyond the agreed service time must
be requested in each case with an associated cost for emergency and work. Broadnet can not guarantee that
such extra error correction can be performed.
5.2 Quality Level Broadnets redundant Core is designed for high service availability. The following Quality level can be selected
for the service:
Parameter Level 1 Level 2 Level 3
Availability pr Quarter 99,60% 99,75% 99,99%
Physical fault correction < 8 hours < 5 hours < 3 hours
Terminalbaset fauilt correction < 4 hours < 3 hours < 10 minutes
Access realisation Single Redundant Redundant with fys.
diveristy
Responstime < 1 hours < 30 minutes Instant
Feedback < 2 hours < 30 minutes < 10 minutes
29
broadnet.no
6 Performance Management
6.1 Background Today, more than ever, the performance of the customer's network reflects the business results. All
organizations are dependent on a costeffective IT infrastructure to remain competitive and grow. As networks
become more critical; it also becomes more complex in - scope, geographic reach, number of applications,
technologies and access methods must support.
Broadnets solution "Performance Management" in combination with appropriate traffic prioritization in the
network, will ensure customer communications solution.
6.2 Performance monitoring - VPNview Customer will have web access to a version of Performance Monitoring system vpnview.broadnet.no.
Figur2-1 below shows a limited choise of functionality available online in a web basted monitorering system.
Figur2-1 - VPNview – Broadnets Performance Monitoring system
30
broadnet.no
In summary, the system will provide the following functionality for the customer:
Graphical representation of bandwidth consumption at each location, distributed on physical
interfaces, networks (eg. Guest network or internal network) or quality grade. An example of the
latter is shown top right of Figur2-1 and will be available as soon as the configuration of traffic
prioritization in the routers is updated to support this
When selecting desired data, graphs for the last day, week, month and year are shown. Customer can
however customize these graphs further, with regard to measuring period, the size of the graph and
for several of the data, also which data should be displayed. (For traffic across physical ports or VPN,
Customer instance choose peak bits per second, packets per second, bytes per packet or error /
packet drop in addition to the default view for bits per second.)
Packet loss and delay per QoS calss as well as jitter and MOS (Mean Opinion Score) for voice traffic.
Here can the Customer in real time verify whether their traffic to the individual location and the
individual quality class is according to agreed values. MOS value of voice traffic is a measurement for
perceived speech quality in IP telephony solutions, and can thus be used to assess the extent to which
quality in the network affects the quality of IP telephony transported over the network. Bandwidth
graphs are also displayed basically for the last day, week, month and year, with the possibility to
customize both measuring period and size of the graph
In a "Hotspot" view, shown bottom left in Figure 2-1, the Customer may extract "top n" reports of
parameters in the network, eg. the 5 locations with the highest percentage of bandwidth utilization.
Customer elects number locations to be listed, which parameters desired report and, if desired, a list
of graphs or only numeric values
An overview of technical availability, shown bottom right of Figur2-1, Customer see technical
availability for the individual lines in IPVPN solution. Displays total availability over each connection,
both pirmær and backup communications through redundant locations, regardless of cause
downtime. This may therefore not directly correlate to agreed uptime guarantees such reports are
described in section 5.2, but can show real-time availability "unfiltered" so that all downtime for
whatever reason is visible
A "Ping" button in the web interface for the individual location, enable the Customer to verify
whether there is contact over the individual lines 'right now'
The Customer has acces through VPNview to traffic both IPVPN network and central Internet access.
31
broadnet.no
6.3 IPVPN SLA Report The report provides an overview and detailed information on the availability for the customer solution that
has been achieved through a measuring period. Measurements are made according to agreed quality level for
availability as stated in the customer's SLA (Service Level Agreement). In addition the report contains a table of
major error situations if reported.
The report is based on data from Broadnet Ticketing System separating downtime due to faults outside
Servicetime, wich is not included in the availability calculation. The report is very suitable also for bigger
solutions when it summarizes overall data for the solution as a whole, in addition to containing tables with
detailed information about downtime per location. The reports are electronically available to the customer in
pdf format.
Figur 6-1 under shows an example of a SLA and Fault Analysis report
Figur 6-1: Example of a SLA and Fault Analysis-report
The report first page shows the current up-time SLA and a list of the locations with the most downtime last period according agreed service time, with any SLA overruns clearly marked in red. First page also shows a list of the locations that have had the most downtime last year, which can be useful to reveal locations with recurring problems. A pie chart shows the percentage of locations that have had outages of varying duration
The customer gets a quick glance at the report's first page and very good idea about operational
stability in IPVPN network and possibly central Internet access
The second page shows a list of major common error (if any), which Customer locations that have
been affected, as well as a brief description of common error. Farther down the page has the
personnel of Broadnet prepared a summary of important operating related incidents last period
Subsequent pages of the report includes a calendar with an overview of downtime for each location,
specified in hours and minutes for those days there has been downtime, and accumulated downtime
period and percentage uptime for each location. Also here highlighted any SLA violations in red
The reports are based on data from the Vendor ticketing system. In this system any errors due to
circumstances at the Customer (as power outages) site , announced planned work in the service window and
any delays in debugging due Customer registered.
32
broadnet.no
7 Price
7.1 Price structure
The service is priced with a start up price and a monthly price. Start up prices of the service depends on the
agreement length and the service type. Additional prices, i.e internal cabling, relocation and other work in the
customer premesis, is not included in start up price.
33
broadnet.no
8 Faultprocedure and Faultcorrection time Broadnet monitors the service 24/7, throughout the year. Broadnets Network Operations Center will discover
many types of errors, and will then notify about this within AST (Agreed Service Time). In those cases the
Customer detects errors on the service that the Customer has been notified, this must be notified to Broadnet
as quickly as possible. Before customer reports errors to Broadnet it is important that own equipment is
checked. If a customer reportes errors wich are in the Customer Equipment, Broadnet will charge for
troubleshooting, outside responsibility.
If an error or a problem occurs, the necessary investigations and corrective actions must be initiated under
Broadnets specifications for error handling. Errors may be reported per. Telephone or email. Broadnets
Customer needs the following information:
Circuit number
Decription of the fault
Modem status (if possible) and a confimration that own customer equpiment has been checked
Telefonnumber, telefax number og e-mail to customer contact person for testing and access
Time of insindent
Address (where feasable)
Other relevant information
Fault reports and confirmations are reported to Customer pr. phone or email in an approved manner.
VDSL, ADSL and SHDSL accesses has a standard no guarantees fault rectification. For an additional price it is possible to order an upgrade with a guarantee of fault rectification for the access.
34
broadnet.no
Appendix A Standard classification setup If the customer wishes, Broadnet can classify the traffic according to a standard setup such as specified in
Table 6-1 below:
It is traffic in Business class that is tagged when using the standard setup.
APPLICATION TRANSPORT
PROTOCOL
PORT NO. PORT RANGE
Citrix TCP/UDP 1494, 1604, 2598
SAP TCP/UDP 3200 3399
RDP Remote Desktop Protocol TCP 3389
TELNET TCP 23
SQL TCP 1433
DISPLAY SYSTEMS PROTOCOL TCP/UDP 246
Table 6-1: Broadnet classified traffic, standard setup for prioritization in Business class
35
broadnet.no
Appendix B Abbreviations and definitions
Abbreviation/Definition Explanation
(Broadnet) IP VPN-access (Broadnet) IP VPN-access
Comprised of components: local access and VPN connection via Broadnet’s core
network
3DES Triple Data Encryption Standard
Encryption algorithm for secure encryption of data. A further development of
DES, that in certain countries is still the only permitted encryption algorithm.
ADSL
Asymmetric Digital Subscriber Line
An existing telephone line at the customer is used to transport data to the
supplier’s network. In Norway all ADSL providers use the telephone line that
was originally established by that which is now Telenor. At the customer, the
ADSL access terminates in a modem or a router/switch. In the telephone
exchange, the access is connected to the relevant ADSL supplier’s equipment.
ADSL is asymmetrical, which means that the customer has a higher capacity
bandwidth in (downloading) than out (uploading).
Access or local access Access or local access
The connection that connects the customer's location to Broadnet’s core
network - from the modem to PE router.
Alternative infrastructure Alternative infrastructure
Infrastructure for the supply of accesses when Broadnet cannot supply within
its own infrastructure. Access from a third party operator
BBS Bankenes Betalings Sentral
See Nets.
CE-router/switch Customer Edge router/switch
A router/switch placed at a customer location; can either be operated by
Broadnet, a distributor/service provider or by the customer himself.
DHCP Dynamic Host Configuration Protocol
Automatic allocation of IP addresses and other IP configuration to PCs and
other network units.
DSL Digital Subscriber Line
Common term for ADSL and SDSL/SHDSL. See definition of ADSL, SDSL and
SHDSL for further specification.
Completion notification Completion notification
A completion notification is sent to the customer after the ordered
service/amendment has been supplied. It contains the date of the start of
36
broadnet.no
Abbreviation/Definition Explanation
invoicing for the service.
Final check Final check
Broadnet’s supply control to ensure that the service has been supplied in
accordance with the specified functionality.
HSRP
Hot Standby Router Protocol
Technology that means that a secondary router (”hot standby router”)
automatically takes over the IP address of the primary router if this router loses
contact with the network becomes unavailable.
Information message
Information message
Notification of any exceptions in the supply process that need addressing.
Contains a description of the exception and information concerning possible
action to be taken.
IP Internet Protocol
Network protocol developed for what is now the Internet (hence the name),
but is now the most frequently used protocol for routed networks.
IP VPN
IP Virtual Private Network
IP-based Virtual Private Network. Common term for several technologies used
for WAN - wide area networks. Networks are implemented as virtual separate
networks across the service providers, network and are based on the transport
of IP.
ISP Internet Service Provider
Company selling and providing Internet services
Jitter Jitter
Variation in delay between a given point A and another point B.
Customer Customer
Contract holder with Broadnet and/or customer of distributor or reseller that
distributes the IPVPN services.
Quality parameters
Quality parameters
Term used to describe the various parameters that can be used to measure
quality against the agreed Service Level Agreement/service quality for IPVPN.
Examples of quality parameters are; availability, jitter, RTD and normal repair
times.
LAN Local Area Network
Often referred to as local network A LAN is a network that connects units within
a geographically limited area, often within same building.
37
broadnet.no
Abbreviation/Definition Explanation
One often refers to several separate local networks in which there are
limitations in the communication between the networks as separate LANs.
Supply date Supply date
The day that an ordered service/amendment is available for use by the
customer.
Delivery time Delivery time
The time from when Broadnet receives a correct order until the supply date.
MPLS
Multi Protocol Label Switching
Network protocol that permits the transport of several separate networks over
the same line and network components. The separation can be compared to
VLAN; however MPLS offers among other things are better possibility of routing
traffic over redundant connections.
Broadnet uses MPLS in its core network to combine separation of individual
customer’s networks and two at the same time safeguard redundancy.
Nets
Nets
Company that handles electronic IS and payment transactions.
Formally BBS (Norway) and PBS (Denmark).
NTP Net Terminal Point
Termination point for the access line
Packet loss Packet loss
A percentage of packets from a given point A that do not reach another given
point B.
PE-router Provider Edge router
Router in Broadnet’s MPLS-based core network for connection of customer
locations.
QoS
Quality of Service
This definition is used often in several contexts. In connection with IPVPN, it is
the quality defined for the service and/or experienced by the customer (or by
traffic class), that is referred to as QoS.
RTD
Round Trip Delay
The time it takes traffic to reach from a given point A to a given point B and
back again. This is for example the value presented as ”round trip delay” when
sending the ping command from one location to another.
SDSL Symmetric Digital Subscriber Line
An existing telephone line at the customer is used for the transport of data to
38
broadnet.no
Abbreviation/Definition Explanation
the supplier’s network. In Norway all SDSL providers use the telephone line that
was originally established by the company that is now Telenor. At the customer
the SDSL access terminates in a modem or a router/switch. In the exchange the
access is connected to the relevant SDSL provider’s equipment.
SDSL, in contrast to ADSL, this symmetrical, which means that the customer
gets the same bandwidth in (downloading) as out (uploading).
SHDSL Symmetric High-Speed Digital Subscriber Line
In general, SHDSL is the same as SDSL. In connection with IPVPN the term SHDSL
is used. See also SDSL.
SLA Service Level Agreement
Contract between Broadnet and the customer pertaining to service levels. Also
referred to as ”service quality”.
SNMP Simple Network Management Protocol
Protocol used for obtaining technical operational information from units in the
network.
Service quality Service quality
Contract between Broadnet and the customer pertaining to service levels. Also
referred to as ”SLA”.
Traffic classes
Traffic classes
Service classes with various defined quality adapted to different applications
characteristics and for prioritization of these. Defined traffic classes; RealTime,
Business, LAN and Standard.
Third-party operator Third-party operator
Operator providing alternative access, where Broadnet cannot supply within its
own infrastructure.
Broadnet core network Broadnet core network
Broadnet’s MPLS-based trunk network. Scandinavian coverage.
Business days Business days
Working days Monday to Friday with the exception of public holidays.
VLAN Virtual LAN (Local Area Network)
Several LAN (see separate description) are transported over the same line, cables
or switches without the possibility of internal communication.
VPN Virtual Private Network
Term used to describe data technology used to create ”point-to-point”
connections, so-called ”tunnels” through another data network, such as Internet
39
broadnet.no
Abbreviation/Definition Explanation
or an operator's private network.
It is possible to have encrypted VPN, for example based on IPSec, SSL or L2TP or
so-called ”trusted VPN” which for example can be based on MPLS (Multi Protocol
Label Switching).
VRF
Virtual Routing and Forwarding
Makes possible several separate routing tables on one and the same router. This
means that, among other things, in practical terms it is possible to use the same
router to transport several networks that cannot inter-communicate.
WAN Wide Area Network
A network that connects units within a wide geographical area.