Today, Ethernet is already broadly accepted in MAN, WAN and SAN environments. Approx. 85% of all network communication uses this technology. The benefits are obvious: Ethernet is easily implementable and scalable from 10 to 10,000 mbps, depending on bandwidth need. Ethernet will continue to be the main network protocol considering its advantages and the increasing need for simple, fast and secure data transmission.
Ethernet Point-to-Multipoint and Multipoint-to-Multipoint Network
The graphics below show InfoGuard Ethernet Layer 2 Encryption’s various application scenarios:
EPL – Ethernet Private Line
Ethernet Private Line is a point-to-point architecture with one physical service access point (SAP). An encryption unit is connected at each SAP. In other words, this scenario calls for one pair of devices for each connection.
EVPL – Ethernet Virtual Private Line
Ethernet Virtual Private Line is a point-to-point topology. Unlike EPL, it accommodates the termination of multiple Ethernet Virtual Channels (EVCs) at each physical SAP utilising VLAN IDs. This approach reduces the number of physical SAPs and encryption units while increasing overall flexibility.
EPLAN – Ethernet Private LAN
Ethernet Private LAN is often referred to as a fully meshed architecture and allows a direct connection to each connected service access point. This topology is unique in its simplicity and performance because all branches can communicate directly with the corresponding destination host. A further advantage of this architecture is that it is suitable for multicast and broadcast applications.
EVPLAN – Ethernet Virtual Private LAN
Unlike EPLAN, Ethernet Virtual Private LAN allows organisations to monitor the branches that can communicate directly with each other. This task is performed with VLAN IDs. EVPLAN is particularly well-suited for architectures with centralised structures, where the network traffic is to be routed through headquarters or backup headquarters. Companies that consolidate their computing centres and services or companies who want large-scale monitoring of network traffic often prefer this topology.
Ethernet Point-to-Point Networks
The graphics below show
InfoGuard Ethernet Layer 2 Link Encryption’s and InfoGuard Ethernet Layer 2 Encryption’s
various application scenarios:
Application scenario Dark Fibre
To interlink their branches, more and more companies choose fiber optic links, over a Dark Fiber, for instance. In this type of link, the two encryption devices are just switched on. This application is very common, and it is irrelevant whether it is used within a com-pany’s own network or within a line leased or purchased from a service provider.
Application scenario DWDM
EtherGuard is perfectly suited for use in DWDM networks, bridging distances of up to several hundred kilometers, or in city networks using DWDM. Interlinking company branches directly using Gigabit Ethernet over DWDM is highly advanta-geous for a company’s network, as the company can “plug” its Ethernet infrastructure right into the city network. All applications of the local network will work regardless of site.
Application scenario CWDM
In this application scenario, a CWDM infrastructure forms the transport network. The CWDM process increases the performance of existing infrastructures by distributing the data across different wavelengths for subsequent transfer over the same optical cable. In addition, Etherguard, thanks to the flexibility of its transceivers, supports passive multiplexing, helping users reduce overall cost even further.
Application scenario SAN extension
SAN Extension means linking two SAN islands over a transport network. A common transmission technology is IP (Storage over IP). EtherGuard is easily integrated in such topologies and secures confidential data during its transfer.