Examples based on draft-cheng-supa-applicability-00.txt

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Elastic Provisioning In Virtual Private Clouds
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Network Systems Sales LLC
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Improving Routing Performance.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-virtual-subnet-10 Xiaohu Xu (Huawei) Susan Hares (Huawei) Yongbing Fan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Use Case for Distributed Data Center in SUPA
Virtualization Infrastructure Administration Network Jakub Yaghob.
Status of Work Feb 2, What and how fits? (option 1) Network Manager Network Elements (routers, switches, etc) RESTCONF / NETCONF Service Management.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
CloudNaaS: A Cloud Networking Platform for Enterprise Applications Theophilus Benson*, Aditya Akella*, Anees Shaikh +, Sambit Sahu + (*University of Wisconsin,
TEMPLATE DESIGN © SUPA – Simplified Use of Policy Abstractions Policy-driven Service Management Date: Monday, March 23,
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
Firewall Policies. Module Objectives By the end of this module participants will be able to: Identify the components used in a firewall policy Create.
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
Network Virtualization Sandip Chakraborty. In routing table we keep both the next hop IP (gateway) as well as the default interface. Why do we require.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Segment Routing Traffic Engineering
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Inter-domain SLA Exchange
1 Vicon A&E Summit 2011 Video Security Design Workshop: NVR Recording and Network Considerations vicon-security.com.
Address Resolution Issues Induced by VPN-oriented Cloud Service
“Your application performance is only as good as your network” (4)
Barracuda NG Firewall ™
NVR Recording and Network Considerations
Virtual Private Networks
Instructor Materials Chapter 6: Quality of Service
NET 3710 WAN Data Networks.
TRILL DataCenter/Campus/PBB Inter-connect over IP core with BGP
VPN Extension Requirements for Private Clouds
Use Case for Distributed Data Center in SUPA
Cisco MPLS Enabling Managed Shared Services for Greater Profitability
MOBILE NETWORKS DISASTER RECOVERY USING SDN-NFV
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
Congestion Control, Quality of Service, and Internetworking
Virtual Subnet : A L3VPN-based Subnet Extension Solution
NVR Recording and Network Considerations
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
Elastic Provisioning In Virtual Private Clouds
Enterprise vCPE use case requirement
VIDIZMO Deployment Options
Enterprise vCPE use case requirement
2018 Real Cisco Dumps IT-Dumps
Network side issues in WLAN Interworking
Data Security for Microsoft Azure
IS4680 Security Auditing for Compliance
NTHU CS5421 Cloud Computing
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
IP Control Gateway (IPCG)
Private Networks.
AT&T Firewall Battlecard
What’s New In WatchGuard Wi-Fi Cloud v8.6
TESTA-II IP Addressing
TESTA-II IP Addressing
Chapter 8 – Data switching and routing
Presentation transcript:

Examples based on draft-cheng-supa-applicability-00.txt

Switched Ethernet services (SES) SUPA policy data models used for maximizing WAN performance by analyzing the traffic and performing application management and acceleration tools for the network Policy data model describes a condition when the link capacity reaches 90%, Service prioritization and WAN optimization need to be enforced based on the customers service package. Event is the link utilization and condition is the usage and action is the WAN optimization. The actions could trigger multiple actions like data compression, protocol acceleration (like streaming gets priority) which are beyond the scope of SUPA. ECA Policy: Event: link_load > 90% Condition: acceleration for service available Action: data compression; protocol acceleration

VPC (Virtualized Private Cloud) A public cloud operator can virtualize the cloud resources into multiple isolated virtualized private clouds and provide them to different tenants. Such a Virtualized Private After the VM is moved to the new DC, the network related to the VM must be updated accordingly. Target: Perform VM migration when user location changed and the network load between the DCs is low. ECA Policy: Event: a VPC user's location is changed (near to another DC). Condition: network_load(DC_old, DC_new) < threshold. Action: 1. Migrate the VM to the new data center (DC_new). 2. Update the VPNs connecting the user's services. Cloud is referred to as a VPC

Traffic Manipulation cross DCs In order to make full use of the bandwidth of the links, dynamic traffic steering is necessary for SLA meanwhile with full use of network resources Target: a DC has multiple external links. When the load on a link is over a threshold, perform traffic steering for a better bandwidth resource usage ECA Policy: Event: load on a DC link exceeds threshold. Condition: multiple disjoint links between DCs. Action: steer some traffic to link with low load.

Virtual Service Provider Virtual network operators usually do not build all networks, including access network, metro network, and backbone network, by themselves. Instead, they rent network from other operators. In above cases, virtual network operators may have to face an issue; they have no control over the tunnels and cannot decide the exact path that a tunnel should go through A possible solution for such a virtual network operator is to rent or put some routers in network operators' DCs, and then configure tunnels between the routers and perform traffic steering After initial network configuration is finished, if any problem is detected in any tunnel, the network management system can perform network wide optimization, taking all the routers into account and working out another set of tunnels if necessary ECA Policy: Event: QoS parameters < threshold. Condition: multiple disjoint tunnels available. Action: Network wide tunnel optimization + traffic steering.

Instant creation VPN CE should send authentication (with credentials) request to the PE, and PE should forward the request to the management system together with port/frame/slot on which the request is received, the PE ID etc. Target: Configure VPN for an enterprise customer to connect its enterprise network with VPC ECA Policy: Event: service management system receive a CE request for VPN creation (forwarded by PE). Condition: Authentication and Authorization results are OK. Action: Configure VPN based on received request, including the user's grade and physical info (port/slot/frame/route id, etc, from which the request is received).

Traffic optimization and Qos assurance on ISP DC ISPs usually build DCs at the core network border, DCs have more than one uplinks to DC core network; In order to provide service assurance for import tenant, network administrators need to schedule the traffic in specific periods. When utilization of a link reaches a certain threshold, specific flows should be steered to a low load link according to IP address and AS number Target 1: a DC has multiple external links. When the load on a link is over a threshold, perform traffic steering for a better bandwidth resource usage. ECA Policy: Event: load on a DC link exceeds threshold or a VIP tenant needs bandwidth assurance. Condition: DC has multiple external links. Action: steer VIP's traffic to link with low load in a specific period Target 2: Tenants or users may have critical request on network Qos. When there is enough bandwidth along the link, perform resource reservation for VIP's traffic on specific links. Event: Tenants or users have critical network requests. Condition: Resources along the link are enough for reservation. Action: perform resource reservation for VIP's traffic on specific links.