I read that for IPoE, DHCP option 82 can be used for user authentication based on CVLAN/SVLAN but also IP source guarding I'd imagine? Theoretically the DSLAM could be configured to snoop DHCP handshakes and prevent MAC / IP addr spoofing. I'm not really sure how IP / MAC addr spoofing is mitigated for legacy ADSL2 customers whose data still passes through the MSAN in the exchange and where PPP/L2TP is used, I'd imagine it could be possible for the BRAS to maintain PPPoE session ID - MAC addr bindings and similarly for the ISP gateway to maintain IPCP configured IP addrs - TunnelID/SessionID bindings. Just a intuitive conjecture but I don't know.
Furthermore I assume the DSLAM adds the CVLAN + SVLAN, I assume that a unique QinQ pairing is assigned to each DSLAM port connected to the BRAS and when it arrives at the L2S it switches it to the correct GEA cablelink. Correct me if I'm wrong but that's the most recent mental picture I have.
The bRAS sets up a pseudowire to the ISP gateway (selects ISP based on SVLAN?) over the MPLS backbone and the ISP gateway authenticates based on option 82, 61, something like that.
Finally, does the EEA act as the MSE bRAS and the 21C bRAS at the core node functions as a regular P router?
You said about buzzwords, forgive me, my knowledge of WANs isn't the best.