11/03/09 Tina TSOU Network configuration in IP network Draft-tsou-network-configuration-problem-statement- 01.txt.

Slides:



Advertisements
Similar presentations
A New Era in Critical Communications
Advertisements

Report from the Networking in Times of Disaster. What is a Disaster? Networks that work in times of disaster should address: Events that affect a network.
FederalAppliance.com Self-Service Pricing. Full-Service VAR. Server / Storage Consolidation Plan using VMWare and EqualLogic Virtual Machines Virtual Network.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
1 Hardy Process Solutions – New Product Introduction HI6600 Series – Modular Sensor System Hardy delivers productivity solutions to manufacturers and processors.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Draft-tsou-bfd-ds-lite-02 Tina Tsou. Problem to solve – There is no status information of DS-Lite tunnel, e.g. tunnel up or down, which brings difficulties.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
Submitted by- Mr. Avinash Sadaphule 20 November 2009 Management Trainee, MKCL.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
1 Customer Network Operations Center. 2 Agenda Overview Benefits Value Additional Services Questions Monitoring Options.
Abstraction and Control of Transport Networks (ACTN) BoF
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Juniper Networks. Brief Facts Juniper Networks is a telecommunications equipment vendor specializing in information routing and data security. Founded:
Chapter 1: Hierarchical Network Design
February 25, Infrastructure-ENUM Secure, Private, Next Generation Addressing Infrastructure Douglas J. Ranalli Founder, Chief Strategy Officer NetNumber,
Introduction to Routing and Routing Protocols By Ashar Anwar.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
Common Devices Used In Computer Networks
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Lec4: TCP/IP, Network management model, Agent architectures
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Network Applications and Layered Architectures Protocols OSI Reference Model.
Open Systems Interconnection Model (OSI model). The Open Systems Interconnect Model.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
IPv6 transition strategies IPv6 forum OSAKA 12/19/2000 1/29.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
PTCL Training & Development
Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin-Madison.
W&L Page 1 CCNA CCNA Training 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4 Jose Luis Flores /
CISCO PACKET TRACER By:- Ankita Rawat Sohit Mehta Sukhwinder Singh.
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Ten Internetworking.
“Local Area Networks” - Gerd Keiser Copyright © The McGraw-Hill Companies srl Local Area Networks Gerd Keiser.
September 2004Rudolf, Carlton and TGr Marian Rudolf, Alan Carlton - InterDigital doc: IEEE /1052r0.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Wireless Data Technologies
L2 Trigger Implementation Examples on MIRAI-SF Simulator - A Candidate for Evaluation Platform Masahiro Kuroda
CINAPTUS Technology Consulting Networking Concepts Simulating Network Communications.
1 Role based Auto Mesh IETF90 CCAMP Jul Toronto draft-li-ccamp-role-based-automesh-02.
Introduction to Avaya’s SDN Architecture February 2015.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
MWT Assignment U&I Communications Group Leader: Ngik Soon Teck Group Member: Tan Ming Fatt Adi Kelera Anish Kumar.
Ad-hoc Networks.
Chapter 17 Connecting Devices And Virtual LANs 17.# 1
Brief Introduction to IEEE P802.1CF
Concept of VLAN (Virtual LAN) and Benefits
Kireeti Kompella Juniper Networks
Applied Information Technology 2016 Rhys greaney
Connecting Devices Hosts and networks do not normally operate in isolation Connecting devices connect hosts together to make a network or connect networks.
Applying CIM to SD-WAN Weiqiang Cheng, Feng Yang(CMCC)
An Application Programming Interface for Interconnection Services
An Application Programming Interface for Interconnection Services
Presentation transcript:

11/03/09 Tina TSOU Network configuration in IP network Draft-tsou-network-configuration-problem-statement- 01.txt

11/03/09 Introduction With the network evolution to all IP, IP network will have more and more network devices. Constructing an IP network will take a lot of effort due to the large number of network devices being configured manually.

11/03/09 Configuration workload in IP network In a typical IP network, e.g., LTE IP backhaul network, there will be up to base stations, network devices and up to 200K service tunnels. The workload of network configuration in this typical scenario is estimated and shown in the following figure: |Project |Config. |Travel time|link |Temporary |Config. | | |design |of engineer |check |change of |input | | | | | |Config. | | |work load |30min/ |60min/site |10min/ |30min/ |10min/ | | |device | | device |device |device | |People |Senior | |skilled |Senior |Skilled | |requirement|engineer | |engineer|engineer |engineer | |Total |30*20000 |20000*60 |10*20000|30*20000* |10*20000 | |workload |= |= |= |0.3=180000|= | Engineer travel time to the network devices occupies 51% and configuration design of the device occupies 33% of the total effort.

11/03/09 Configuration workload in IP network Besides LTE IP backhaul network, DSLAM or FTTx have been the main stream in fixed network infrastructure which brings the IP network into the access network edge. Both the mobile network and the fixed network are evolving towards ALL IP network. Therefore, from the core segment to aggregation and till access edge, the number of IP devices increases rapidly. The existing IP network management mainly depends on manual configuration. It is a great burden for service providers to deploy and maintain such large scale IP networks.

11/03/09 Problems need to be solved for IP network configuration To reduce deploy and maintenance workload and cost, it is important to bring in automatic and remote configuration mechanism for large scale IP network. One key goal is Plug & Play: simplicity on site manual configuration is required. Once the cable is connected, the IP network devices interconnect with each other and get specific configuration information from NMS. IP configuration problems to be solved to achieve Plug & Play in the commissioning device stage: –Initial configuration of management IP for network device management. –How can all IP network devices be connected to each other at IP layer so that the management message can reach all the devices after the cable is connected? –How can network devices authenticate each other during the automatic connection setup process? –Interoperate among different heterogeneous equipments (such as network composed of routers, switches, access gateways etc) –Traversing equipments from different vendors may cause the problem that the third party network may block the Plug & Play of network devices. –For service providers, the network devices are managed by network management system (NMS). It is very difficult to add all the device information into the NMS one by one and manually. Some kind of auto discovery mechanism is needed to simplify the device discovering.