In general, MPLS VPN is a service provider technology where the customer trusts the service provider to securely...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
handle and deliver the traffic between sites. Layer 2 and Layer 3 MPLS utilize the same basic principles for transporting traffic across the provider network, namely MPLS label switching, setting up Tunnel Label Switched Paths (LSPs). However, the difference is that L3 VPN MPLS uses IP Routing and L2 VPN MPLS uses a circuit switching approach, similar to how leased line services were provided via frame relay or ATM using PVCs. The MPLS VPN approach is more flexible for service providers as it allows them to utilize the same networking equipment for all operations. The customer data is encapsulated and carried across the provider network via MPLS, label switched.
ADSL is just a telco DSL type. It describes how the connection to the customer premise is accomplished. There are many different ways to do this. It used to be frame relay, which is losing ground to now DSL, Gigabit Ethernet, fiber and others. There are mainly three components in every connection scenario: the provider network, the customer network and the last mile that bridges the connection between customer and provider. Sometimes this last mile piece can get tricky for providers to deal with due to the telco rights-of-way.
For more information on of MPLS VPN types, check out this MPLS VPN fundamentals guide.
Email your VPN-related questions to firstname.lastname@example.org
Dig Deeper on WAN protocols
Related Q&A from Rainer Enders
Administrators don't have to worry about interoperability; integrated mobile application and device management is the best approach.continue reading
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.continue reading
To ensure mobile device security, VPN expert Rainer Enders explains that it is crucial to monitor changed states and block software modifications.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.