1 TNC2009:NOC panel discussion Dirk HAEX Coordinator Networks 09/06/2009.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

A Possible New Dawn for the Future GÉANT Network Architecture
Static Routing Exercise AFNOG 2003/ Track 2 # 1 Static Routing Exercise u Unix network interface configuration u Cisco network interface configuration.
Deployment of MPLS VPN in Large ISP Networks
Virtual LANs.
Static Routing Exercise. What will the exercise involve?  Unix network interface configuration  Cisco network interface configuration  Static routes.
End to End Uptime Monitoring
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Pacific Northwest Gigapop NGN Overview Kampala, Uganda Oct. 16th - 17th 2007.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
1 | © 2013 Infoblox Inc. All Rights Reserved. Authoritative IP Address Management (IPAM) and its Security Implications Rick Bylina, Sr. Product Marketing.
When Networking meets Wireless When Networking meets Wireless.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Call Center – What Really Makes Sense? Call Center – ce este cu adevarat important?
1 BELNET-Koen Schelkens TF-MSP meeting Rome – 04 FEB ‘10 BELNET.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Chapter 14 Managerial issues in networking. Overview Network design Network management – Hardware – Software Technology standards Role of government and.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
27 th of SeptemberAgnes PouelePage 1 MPLS Next Generation Networking September 2000 TF-TANT MPLS TESTING.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
TCOM 515 Lecture 6.
NG/VITA Strategy & Architecture Tony Shoot
Ch 13. Wireless Management and Support Myungchul Kim
How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
1 Reliable high-speed Ethernet and data services delivery Per B. Hansen ADVA Optical Networking February 14, 2005.
© Aastra Telecom Schweiz AG – 2013 Sales Presentation Updated as of Release 2.1 [depl-1658v2.10] Aastra 400 and Aastra BluStar Ecosystem All-in-one Business.
Router and Routing Basics
IT Essentials 1 Chapter 8 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Peering Exchange Architectures Jeff Bartig University of Wisconsin WiscNet Engineering.
Connect. Communicate. Collaborate Experiences with tools for network anomaly detection in the GÉANT2 core Maurizio Molina, DANTE COST TMA tech. Seminar.
How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
April 2004 At A Glance CAT is a highly portable exception monitoring and action agent that automates a set of ground system functions. Benefits Automates.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Operations in HEAnet Brian Nisbet NOC Manager. Operational Overview 30+ Technical Staff. – 75% of whom participate in NOC Duty. 60+ Clients. Expanding.
What is Bandwidth on Demand ? Bandwidth on Demand (BoD) is based on a technology that employs a new way of managing and controlling SONET-based equipment.
Connect communicate collaborate GÉANT3 Services Connectivity and Monitoring Services by and for NRENs Ann Harding, SWITCH TNC 2010.
Subnetting -2.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Connect communicate collaborate Design and Set Up of the New GÉANT NOC Toby Rodwell, DANTE TNC09, 9 June 2009.
GÉANT - Implementing Security at Terabit Speed
An Approach to IP Network Traffic Engineering NANOG Miami, FL Chris Liljenstolpe Cable & Wireless
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
How to Build a NOC. Identify Customers –Who are your customers? Understand Customer Expectations –What are your user expectations? –SLA’s? Support Service.
Belnet TF-MSP Belnet – Pierre BRUYERE Brussels – 1 March 2011.
Spring 2010CS 3321 Interdomain Routing. Spring 2010CS 3322 How to Make Routing Scale Flat versus Hierarchical Addresses Inefficient use of Hierarchical.
Static Routes Static routing occurs when you manually add routes in each router's routing table.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
1 © 2005 Cisco Systems, Inc. All rights reserved. M. Behringer: Pervasive Core Security To Route Or Not To Route? Michael H. Behringer Dirk Schroetter.
Dynamic P2P with BGP Route Servers BFD for data-plane verification Magnus Bergroth NORDUnet.
Nigel Cain Senior Program Manager Microsoft SCVMM, SCO and SCSM Integration IT Service Management for the Private Cloud Greg.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Robert Szuman – Poznań Supercomputing and Networking Center, Poland
Reconfigurable Optical Mesh and Network Intelligence
© 2002, Cisco Systems, Inc. All rights reserved.
IS3120 Network Communications Infrastructure
Your Business Opportunity
KEEPING IT UP How To Build a Redundant, Fault Tolerant, Load Balanced, Traffic Managed Wireless network a bella mia company.
MANRS for IXPs Why we did it? What did we do?
The real-time Internet routing observatory
An Application Programming Interface for Interconnection Services
Validating MANRS of a network
An Application Programming Interface for Interconnection Services
Presentation transcript:

1 TNC2009:NOC panel discussion Dirk HAEX Coordinator Networks 09/06/2009

2

3 Agenda - BELNET in a nutshell - Helpdesk and NOC evolution a long time ago / some time ago lessons learned today: approach and tools - ‘Scripted’ change management rationales example and advantages

4 BELNET in a nutshell 15 years BELNET - More… autonomy employees bandwidth and resilience networks and services customer oriented - But… change in statute necessary!

5 BELNET in a nutshell Current organisation 24x7 Helpdesk 24x7 NOC

6 BELNET in a nutshell The BELNET network 35 ROADMs 4 core routers 33 access routers 63 x 10 Gbit/s connections

7 BELNET in a nutshell Other networks - BNIX 3 devices, 3 x 10 Gbit/s 69 connections layer 2 platform focussed on commercial market - FedMAN Belgian federal MAN 68 devices, 70 x 1 Gbit/s 45 connections

8 Helpdesk and NOC evolution A long time ago - Internal Helpdesk and NOC (Business hours)

9 Helpdesk and NOC evolution Some time ago - Internal Helpdesk & NOC (Business hours) - 24x7 ‘Watch Service’ for the backbone

10 Helpdesk and NOC evolution In First experience with NOC outsourcing - Incident and Change Management - 24/7Helpdesk and NOC for FedMAN - 3 layers: Helpdesk – NOC - BELNET

11 Lessons learned (1) - Outsourced incident management added value? Yes! clear procedures customer is ‘key’ close follow-up collaborative tools beware of pitfalls Helpdesk and NOC evolution

12 Lessons learned (2) - Outsourced change management added value? Not really time consuming potentially dangerous → reputation → reaction from employees Helpdesk and NOC evolution

13 Today: approach and tools (1) Helpdesk and NOC evolution Incident Management Outsourced (transparant) 24x7 Phone and 3 layers contact Change Management BELNET Business hours Phone and Direct contact Support / Advice BELNET Business hours Phone and Direct contact

14 Today: approach and tools (2) Helpdesk and NOC evolution

15 Helpdesk and NOC evolution Today: approach and tools (3)

16 Helpdesk and NOC evolution Today: approach and tools (4) 24/7 BELNET Helpdesk BELNET customer Monitoring outsourced Ticketing system CRM NOC Services Networks Customer update

17 - Change in expectations - ‘always on’ - commodity - new business models - Take nothing for granted - 24x7 organisation is not trivial - anticipate the workload - talk with your peers! Helpdesk and NOC evolution Conclusions

18 - Script to automate configurations - Backbone design BGP full mesh MPLS LSP full mesh - Change Management IP services PtP Ethernet services ‘Scripted’ change management Rationales

19 - BELNET customer: static routing - Before: manual configuration: logical interface anti-spoofing filter policer to ratelimit traffic static route - Now: scripted! all parameters on 1 line! ‘Scripted’ change management Example and advantages (1)

20 - Concrete case: KHLEUVEN customer category commercial bandwidth interface ptp subnet type of routing customer prefix(es) ‘Scripted’ change management Example and advantages (2) “ADD research 100m fe-3/0/ /29 static prefix= /24”

21 - Benefits: - Single line concept automated configuration uniform & consistent config same syntax everywhere much more efficient detect config anomalies - Smooth integration with tools ‘Scripted’ change management Example and advantages (3)

22 Thank you for your attention. Any questions?