© 2005 Caspian. Caspian Confidential Next Generation Internet Architectures: Emerging Trends, Challenges and Solutions Dr. Riad Hartani Chief Architect,

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

Nortel Proprietary Information 2 The Impact of the World Wide Web on Carrier Networks – an Historic Opportunity Geoff Hall Chief Technology Officer, EMEA.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Deployment of MPLS VPN in Large ISP Networks
All rights reserved © 2006, Alcatel Benefits of Distributed Access Border Gateway in the Access  Benoît De Vos Alcatel, May 29 th 2006.
MPLS: The Magic Behind the Myths Grenville Armitage Lucent Technologies.
An evolutionary approach to G-MPLS ensuring a smooth migration of legacy networks Ben Martens Alcatel USA.
1 © 2003 Cisco Systems, Inc. All rights reserved Next Generation Services Redefining Interpersonal Communication Robert Lloyd President, EMEA Operations.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
MPLS and Traffic Engineering
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Characterizing Residential Broadband Networks Marcel Dischinger †, Andreas Haeberlen †‡, Krishna P. Gummadi †, Stefan Saroiu* † MPI-SWS, ‡ Rice University,
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
COPYRIGHT © 2012 ALCATEL-LUCENT. ALL RIGHTS RESERVED. COMMUNICATIONS DRIVERS & TRENDS FOR SMART GRIDS Istanbul April 29-30
Colombo, Sri Lanka, 7-10 April 2009 Multimedia Service Delivery on Next Generation Networks Pradeep De Almeida, Group Chief Technology Officer Dialog Telekom.
Lawrence G. Roberts CEO Anagran September 2005 Advances Toward Economic and Efficient Terabit LANs and WANs.
MPLS networking at PSP Co Multi-Protocol Label Switching Presented by: Hamid Sheikhghanbari 1.
6. Next Generation Networks A. Transition to NGN B
P2P Games Conference “Attributes of the Gaming Cloud?” Norman Henderson ASANKYA
Chapter 1: Hierarchical Network Design
APPA Community Broadband Conference ISP Network Challenges Peer-to-Peer Controls Mark Bailey, Channel Manager.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
QoS Architectures for Connectionless Networks
Ben-Gurion University of the Negev Analyzing the Integration of Innovative Telecommunication Technologies Project Number P Yossi Twizer Supervisor:
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
SDN based Network Security Monitoring in Dynamic Cloud Networks Xiuzhen CHEN School of Information Security Engineering Shanghai Jiao Tong University,
Network Fundamentals. Network Devices Routers (Layer 3)
Salim Hariri HPDC Laboratory Enhanced General Switch Management Protocol Salim Hariri Department of Electrical and Computer.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Evolution towards the Next Generation Network
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
1 NGN Evolution & its Overview Desire for a new platform: User requirements increased — MORE BANDWIDTH Technology growth — INTELLIGENT NODES, SWITCHES.
A Practical Approach for Providing QoS: MPLS and DiffServ
Geneva, Switzerland, 11 June 2012 Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic) Martin Waldburger, University of Zurich,
A policy-based per-flow mobility management system design
Internet Protocol TeleVision
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
Colombo, Sri Lanka, 7-10 April 2009 FORUM ON NEXT GENERATION STANDARDIZATION (Colombo, Sri Lanka, 7-10 April 2009) Session Moderator Ghassem Koleyni An.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
Skynet: A Cloud-Based Data Transfer Architecture Aleksandar Kuzmanovic
CJK 7 th Plenary: NGN-WG (IPv6 based NGN) IPv6 based NGN (NGNv6)
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
Can we save the OPEN Internet? with focus on The Two-Port Internet Problem and what to do about it Terry Gray Designated Prophet of Doom University of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
© 2002 Caspian Networks, Inc. CONFIDENTIAL AND PROPRIETARY INFORMATION Internet Flow State Technology and Applications Dr. Lawrence G. Roberts Founder.
Microflow-based QoS Transport Technology Dr. Lawrence G. Roberts Founder & Vice Chairman Caspian Networks Inc. Seokjae Ha.
Barracuda NG Firewall ™
An evolutionary approach to G-MPLS ensuring a smooth migration of legacy networks Ben Martens Alcatel USA.
“An Eye View On the Future Generation Of Phones”
Different Traffic Management Techniques for Mobile Broadband Networks
Vonage use of Cloud-based Communication
Introducing Novell IPv6 Stack
Privacy Through Anonymous Connection and Browsing
Software Defined Networking (SDN)
File Transfer Issues with TCP Acceleration with FileCatalyst
Contact Center Security Strategies
QoS based pricing in IP Networks
Presentation transcript:

© 2005 Caspian. Caspian Confidential Next Generation Internet Architectures: Emerging Trends, Challenges and Solutions Dr. Riad Hartani Chief Architect, Caspian Bangkok, May 4 th 2006

© 2005 Caspian. Caspian Confidential Agenda IPv6: Where are we today…Briefly ! Emerging Networks Trends and Implications Evolution of IPv6 Router Architectures Benefits and Applications Q&A

© 2005 Caspian. Caspian Confidential IPv6 Networks: State of the Art Motivations for IPv6 well understood -Addressing space, routing hierarchy, dynamic configuration, security, mobility -Popularity of P2P and Multimedia services Protocol specifications largely finalized -IETF specifications for IPv6 migration ready -Interoperability demonstrated, major router/application vendors support Ongoing network/services deployments -Aggressive deployment in the Far East, Semi-aggressive deployments in Europe, Slow deployments in America, mainly government/federal driven -Consumer electronics, computing industries (grid/collaborative networking) and retail industries driving applications developments

© 2005 Caspian. Caspian Confidential Network Trends and Challenges FACTS: -Services and network convergence accelerating – Internet Protocol based -Towards an always on ubiquitous broadband connectivity (DSL, FTTH, Wifi, Wimax, etc.) TRENDS: -From centralized to distributed information models (P2P content distribution, grid computing, etc.) -Emergence of overlay service providers (e.g. Skype, etc.) – Disruptive competitive landscape -Shift from geography specific competition to global competition (e.g. Google, Yahoo, Microsoft, etc.)

© 2005 Caspian. Caspian Confidential Networks Trends and Challenges CHALLENGES: -Challenge 1: How to improve Internet (node and network levels) traffic control & oversubscription dimensioning ? -Challenge 2: How to delivery QoS with low OPEX, in fixed/mobile environments ? -Challenge 3: How to secure / protect the infrastructure ? CONSTRAINTS: -Constraint 1: No change to IP / MPLS protocols -Constraint 2: No change to principles that made the Internet successful

© 2005 Caspian. Caspian Confidential IPv6 Routers Architecture Evolution IP/MPLS -Deterministic QoS -Deterministic routing DPI Appliances - Traffic Analysis - Stateful processing Architectural Principles - Evolution towards traffic aware QoS, traffic control and routing - Evolution towards behavioral models, optimal for Privacy, Application Agnostic, Neutrality, Encryption, Privacy, etc. - Leverage TCP/UDP/IP inherent characteristics

© 2005 Caspian. Caspian Confidential Conventional vs. Stateful IPv6 Routing Architectures RAM Route Each Packet Queue (Class) & Forward RAM Switch Fabric Conventional Forwarding/Routing 1.Forwarding each packet 2.Switch to output 3.Class-based QoS RAM Hash, Lookup State, Route, Store, WFQ/Flow, Switch RAM Lookup State, Store, and WFQ/Flow Flow-based Forwarding/Routing 1.Hash for flow identification 2M flows/s and 6M flows per 10 Gig Flexible definition of flows: IP flows, Pseudo-WireoMPLS flows, IPoMPLS flows 2.Create “soft” state or look up Route, switch, filters, stats 3.Per-flow QoS behavior Leverage flow state for advanced QoS Shape, police, CAC, congestion control Switching Network

© 2005 Caspian. Caspian Confidential Flow Aware Traffic Management Principles Per Flow Actions / Controls -Generic actions based on traffic control principles -Specific actions based on specific network services Dynamic Flow/Aggregate Identification Per-Flow Traffic Control Identification Methods -Function of network service -Function of traffic control business case

© 2005 Caspian. Caspian Confidential Flow Aware Architecture Benefits Customized congestion/resources control schemes for Video/Voice/P2P/Wireless traffic Advanced application level QoS (Shaping/Policing/CAC) guarantees Preventive DDOS security models Others: Traffic aware routing, Dynamic services diagnostic, Lawful intercept, etc. State  Intelligence  Improved nodal behavior  Enhanced network services at lower cost

© 2005 Caspian. Caspian Confidential Example: IPv6 Dynamic Flow Identification & Customized Congestion Management Unknown Traffic Browsing Streaming Voice/Video over IP Some P2P (skype, small transfers, etc) Small web downloads Large FTP Transfers Some P2P (large transfers) Flow routers leverage state information to characterize traffic flows -Can enforce specified congestion control policies -(responsive vs. unresponsive, high rate vs. low rate, short lived vs. long lived, P2P vs. web, “legal” vs. “illegal” content ) Non-interactive Traffic Large FTP Transfers Some P2P (large transfers) Interactive Traffic Browsing Streaming Voice/Video over IP Some P2P (skype, small transfers, etc) Small web downloads

© 2005 Caspian. Caspian Confidential Example: IPv6 Flow-aware Connection Admission Control Port  New flows CACed  Preserves integrity of existing flows, no performance degradation  Enables ON/OFF service model Port With CAC Without CAC New UDP/TCP flows rejected  All flows allowed into a class  wRED on class congestion  Many flows affected - poor service lack of determinism

© 2005 Caspian. Caspian Confidential Example: IPv6 Flow-based Shaping/Policing Port  Shaping aims at changing characteristics of input stream to produce an output stream with required characteristics Benefits for the end users, and For the downstream network  Policing aims at enforcing traffic contracts  Flow routing allows shaping and policing of desired flows Flows are shaped/policed based on requirements

© 2005 Caspian. Caspian Confidential Example: IPv6 Flow Graduation Application Control Traffic Class Video & Voice over IP Class Virtual Leased Line Class Unknown Traffic Class (Default) Non Interactive Traffic Class BGP, IS-IS, OSPF Flows VoIP and VIDoIP Flows Corporate Flows Unknown Flows Flows dynamically thresholds are graduated to a different class, policy routed or mirrored Dynamic Traffic Aware Management, Routing

© 2005 Caspian. Caspian Confidential Example: IPv6 Covert Intercept 67% P2P 17% TCP 11% HTTP 4% Video 1% VoIP VoIP hides in Internet Which links to monitor? HTTP & random ports used Explicit Identification and analysis of Traffic Dynamic Re-routing of traffic Explicit Identification and analysis of Traffic Dynamic Re-routing of traffic

© 2005 Caspian. Caspian Confidential Put in specific focal points for DOS attacks Detect anomalies in traffic flows, online Raise alarms to operator for immediate investigation Fast, inexpensive way to detect attack before customer is impacted Example: Flow-based DDOS Prevention in IPv6 Other Carrier Network ISP Dynamic Security Models

© 2005 Caspian. Caspian Confidential Conclusions Gradual migration from IPv4 to IPv6 with long term co- existence of IPv4 and IPv6 Deployment of IPv6 networks required to satisfy evolving network/service architecture models Stateful IPv6 routers nodal behavior, fully interoperable with existing technologies – a new resources management model, QoS and security architectures Enhances value proposition & ROI of migration to IPv6

© 2005 Caspian. Caspian Confidential Thank you ! Riad Hartani, Caspian