{"id":1082250,"date":"2023-07-19T16:43:30","date_gmt":"2023-07-19T14:43:30","guid":{"rendered":"https:\/\/www.capgemini.com\/?p=938134"},"modified":"2025-03-21T12:24:41","modified_gmt":"2025-03-21T12:24:41","slug":"network-protection-is-key-to-successful-ethernet-deployments","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","title":{"rendered":"Network protection is key to successful ethernet deployments"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>Network protection is key to successful ethernet deployments<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Parthasarathy Varadharajan<\/h5><h5 class=\"blog-date\">19 July 2023<\/h5><\/div><\/div><div class=\"brand-image\"><img decoding=\"async\" loading=\"lazy\" src=\"\/wp-content\/themes\/capgemini2020\/assets\/images\/capgemini-engineering-white.svg\" alt=\"capgemini-engineering\"\/><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/insights\/expert-perspectives\/key-to-successful-ethernet-deployment\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/insights\/expert-perspectives\/key-to-successful-ethernet-deployment\/&amp;text=Network%20protection%20is%20key%20to%20successful%20Ethernet%20Deployments\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/insights\/expert-perspectives\/key-to-successful-ethernet-deployment\/&amp;text=Network%20protection%20is%20key%20to%20successful%20Ethernet%20Deployments\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<p>Ethernet networks are relied upon to transport real time data and critical business information. Such networks provide critical end-to-end services to subscribers and enterprise users. They must be reliable and resilient. As such, network designers must design their networks to be highly fault tolerant and capable of rapid recovery, to ensure near zero service downtime. The focus of this blog is to detail the various transport protocols implemented in routers\/switches used by service providers to achieve a high degree of network protection, and therefore service availability.<\/p>\n\n\n\n<p>Protection broadly involves three phases. These are i) service establishment along with the establishment of alternate\/backup services ii) failure detection, and iii) a repair and recovery process. A failure event in a network can occur due to link flapping, a node failure, or a path failure. The protocols required for protection, monitoring and repair vary, depending on the transport mechanism used (i.e. Ethernet vs IP).<\/p>\n\n\n\n<p>Protection techniques must also ensure that service restoration happens within 50 milliseconds, which has become the de-facto industry standard. To meet such stringent performance requirements, software implementations should take advantage of hardware assist techniques supported by silicon vendors.<\/p>\n\n\n\n<p>One such hardware assist technique is \u2018offloading\u2019. Offloading involves packet generation and processing of the received packets used for monitoring at a very high frequency. Errors are reported by the hardware offloading mechanism back to the software, in the event of non-reception of packets, which then leads to switching to protected paths. To achieve protection, resources must be provisioned such that when the protected resource becomes unavailable, the backup resource takes over. The backup resource(s) can be placed in standby mode or can actively transport traffic in a load-balanced fashion. Standby mode is easier to implement but consumes more resources. The backup resources are used only when the primary goes down. Active mode is difficult to implement but conserves resources since sharing happens on the protection path.<\/p>\n\n\n\n<p>Given this background, let us examine the plethora of protocols available for protection, starting with Layer2 Ethernet traffic, IP traffic and MPLS transport.<\/p>\n\n\n\n<p>Ethernet links transporting Layer2 traffic can be connected in a mesh fashion to protect against failures. The usage of STP (Spanning Tree Protocol) blocks the redundant links from forwarding traffic. This protocol ensures that redundant links become available on primary link or node failures. Since STP does not meet the convergence time requirements, evolutions of STP, namely RSTP (Rapid Spanning Tree Protocol) and MSTP (Multiple Spanning Tree Protocol) &#8211; which guarantee faster convergence and load balancing &#8211; are deployed instead.<\/p>\n\n\n\n<p>To ensure predictable topology convergence, operators now use ring topologies instead of mesh networks. The elusive 50 ms convergence with load balancing finally was achieved with the advent of ERPS (Ethernet Ring Protocol Switching). ERPS uses ECFM (Ethernet Connectivity Fault Management) as the monitoring mechanism for faster failure detection. ECFM using hardware offloading support detects failures within ten 10 msec, providing ERPS a 40 msec window for switchover. Hardware-aided MAC flushing and hardware-assisted failover support ensures that 50 msec service protection via ERPS is a reality. Operators can also aggregate links using LACP (Link Aggregation Control Protocol) for higher bandwidth and availability. The usage of micro-BFD (Bidirectional Forwarding Detection) with LACP enables faster failure detection and the convergence of aggregated links.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/protection-mechanism.png\" alt=\"\" class=\"wp-image-938137\"\/><\/figure>\n\n\n\n<p>The routing technology used in IP networks inherently supports redundancy. The best path is used for packet forwarding and the alternate\/inferior path, though established, is used for forwarding only when the best path goes down. Since convergence time is high in the plain vanilla routing methodology, IP networks use BFD as a monitoring protocol, along with fast reroute support in routing protocols. This allows them to realize link and node protection and achieve faster convergence. BFD sessions are offloaded after the initial packet exchange and, just like ECFM, can detect failures within 10msec. BFD sessions associated with routing protocols assist in faster routing protocol convergence. To achieve the 50 msec industry benchmark, backup paths are computed using the LFA (Loop free alternate) mechanism and installed in the forwarding path beforehand. Protection techniques supported in the hardware ensure backup paths are installed on failover scenarios, providing service availability even in route-scaled deployments. IP networks also support ECMP (Equal Cost Multi-Path) which provides protection and load balancing. An alternate mechanism in IP networks for node redundancy is achieved via the usage of the VRRP (Virtual Router Redundancy Protocol) protocol along with BFD for monitoring.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/re-route-protection.png?w=960\" alt=\"\" class=\"wp-image-938139\"\/><\/figure>\n\n\n\n<p>IP MPLS networks support a wide variety of protection schemes, with BFD again acting as the monitoring mechanism. RSVP-TE (Resource Reservation Protocol \u2013 Traffic Engineering) inherently contains FRR (Fast Re-route) support and further supports the provision of backup tunnels to protect traffic-engineered tunnels. LDP (Label Distribution Protocol) supports FRR techniques, including LFA and RLFA (remote LFA) for protection. Segment routed LSPs (Label Switched Path) not only support LFA and RLFA, but also TI-LFA (Topology Independent LFA) for complete protection coverage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n\n\n\n<p>Service providers design the edge and core of their networks with service protection and high availability as one of their key objectives. Redundancy at every level, including link, node and path, is the cornerstone of such networks. The transport protocols and network topology vary, depending on the services and applications supported. Capgemini\u2019s ISS switching solution supports a rich set of protocols with full support for redundancy, allowing equipment manufacturers to build devices for high service scale and availability.<\/p>\n\n\n\n<p><a id=\"_msocom_1\"><\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h3 data-maxlength=\"34\">Author<\/h3><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\n\n<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":71,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"988ab062-4d24-45b7-8245-c791d2bebd19\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"168","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[168],"service":[],"industry":[],"partners":[],"blog-topic":[389],"content-group":[],"class_list":["post-1082250","post","type-post","status-publish","format-standard","hentry","category-uncategorized","brand-capgemini-engineering","blog-topic-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network protection is key to successful ethernet deployments - Capgemini India<\/title>\n<meta name=\"description\" content=\"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network protection is key to successful ethernet deployments\" \/>\n<meta property=\"og:description\" content=\"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini India\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T14:43:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T12:24:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10\" \/>\n<meta name=\"author\" content=\"Parthasarathy Varadharajan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@automator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jayantapakrashi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\",\"url\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\",\"name\":\"Network protection is key to successful ethernet deployments - Capgemini India\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/in-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10\",\"datePublished\":\"2023-07-19T14:43:30+00:00\",\"dateModified\":\"2025-03-21T12:24:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/f67362fd1f88a3ac254aba53057e8dc7\"},\"description\":\"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#breadcrumb\"},\"inLanguage\":\"en-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-IN\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10\",\"contentUrl\":\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/in-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network protection is key to successful ethernet deployments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/in-en\/\",\"name\":\"Capgemini India\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/in-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-IN\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/f67362fd1f88a3ac254aba53057e8dc7\",\"name\":\"jayantapakrashi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-IN\",\"@id\":\"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65314389de3e25810a2ffbac62a2300ed864f7c4572fe13773b1789782be15bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65314389de3e25810a2ffbac62a2300ed864f7c4572fe13773b1789782be15bc?s=96&d=mm&r=g\",\"caption\":\"jayantapakrashi\"},\"sameAs\":[\"https:\/\/x.com\/automator\",\"automator\"],\"url\":\"https:\/\/www.capgemini.com\/in-en\/author\/jayantapakrashi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Network protection is key to successful ethernet deployments - Capgemini India","description":"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","og_locale":"en_US","og_type":"article","og_title":"Network protection is key to successful ethernet deployments","og_description":"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied","og_url":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","og_site_name":"Capgemini India","article_published_time":"2023-07-19T14:43:30+00:00","article_modified_time":"2025-03-21T12:24:41+00:00","og_image":[{"url":"https:\/\/prod.ucwe.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10"}],"author":"Parthasarathy Varadharajan","twitter_card":"summary_large_image","twitter_creator":"@automator","twitter_misc":{"Written by":"jayantapakrashi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","url":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","name":"Network protection is key to successful ethernet deployments - Capgemini India","isPartOf":{"@id":"https:\/\/www.capgemini.com\/in-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10","datePublished":"2023-07-19T14:43:30+00:00","dateModified":"2025-03-21T12:24:41+00:00","author":{"@id":"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/f67362fd1f88a3ac254aba53057e8dc7"},"description":"Network protection is key to successful ethernet deploymentsParthasarathy Varadharajan19 July 2023 FacebookTwitterLinkedin Ethernet networks are relied","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#breadcrumb"},"inLanguage":"en-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/"]}]},{"@type":"ImageObject","inLanguage":"en-IN","@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#primaryimage","url":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10","contentUrl":"https:\/\/www.capgemini.com\/wp-content\/uploads\/2023\/07\/Parthasarathy-1-rotated.jpg?w=200&amp;quality=10"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/in-en\/"},{"@type":"ListItem","position":2,"name":"Network protection is key to successful ethernet deployments"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/in-en\/#website","url":"https:\/\/www.capgemini.com\/in-en\/","name":"Capgemini India","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/in-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-IN"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/f67362fd1f88a3ac254aba53057e8dc7","name":"jayantapakrashi","image":{"@type":"ImageObject","inLanguage":"en-IN","@id":"https:\/\/www.capgemini.com\/in-en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65314389de3e25810a2ffbac62a2300ed864f7c4572fe13773b1789782be15bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65314389de3e25810a2ffbac62a2300ed864f7c4572fe13773b1789782be15bc?s=96&d=mm&r=g","caption":"jayantapakrashi"},"sameAs":["https:\/\/x.com\/automator","automator"],"url":"https:\/\/www.capgemini.com\/in-en\/author\/jayantapakrashi\/"}]}},"blog_topic_info":[{"id":389,"name":"Technology"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"brand":[{"id":168,"name":"Capgemini Engineering","slug":"capgemini-engineering"}],"blog-topic":[{"id":389,"name":"Technology","slug":"technology"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Network protection is key to successful ethernet deployments","url":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini India","logo":""},"keywords":[],"dateCreated":"2023-07-19T14:43:30Z","datePublished":"2023-07-19T14:43:30Z","dateModified":"2025-03-21T12:24:41Z"},"rendered":"<meta name=\"parsely-title\" content=\"Network protection is key to successful ethernet deployments\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/in-en\/insights\/expert-perspectives\/network-protection-is-key-to-successful-ethernet-deployments\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-pub-date\" content=\"2023-07-19T14:43:30Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/in-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","featured_image_alt":false,"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini India","distributor_original_site_url":"https:\/\/www.capgemini.com\/in-en","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/in-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","author_title":"Capgemini","author_thumbnail_url":false,"author_thumbnail_alt":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/posts\/1082250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/comments?post=1082250"}],"version-history":[{"count":3,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/posts\/1082250\/revisions"}],"predecessor-version":[{"id":1145844,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/posts\/1082250\/revisions\/1145844"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/media?parent=1082250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/categories?post=1082250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/tags?post=1082250"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/brand?post=1082250"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/service?post=1082250"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/industry?post=1082250"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/partners?post=1082250"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/blog-topic?post=1082250"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/in-en\/wp-json\/wp\/v2\/content-group?post=1082250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}