Why Are We Here? The combination of ownership diversity and - - PowerPoint PPT Presentation
Why Are We Here? The combination of ownership diversity and - - PowerPoint PPT Presentation
GIBSON: Global IP-Based Service-Oriented Network Ping Pan, Tom Nolle S eptember 2006, Oslo Meeting Why Are We Here? The combination of ownership diversity and technology diversity is reflected in a more complex set of management
2
Why Are We Here?
- The combination of ownership diversity and technology diversity is
reflected in a more complex set of management interfaces to control infrastructure:
- Access/ metro and backbone networks may belong to different carriers or
business entities
- Different technologies among providers (Metro/ Access and Core networks)
- Different service “ values” : per-flow for video streams vs. per-aggregation
group for voice sessions vs. best-effort
- Regulatory issues such as intercept/ surveillance which may result in routing
and aggregation decisions
- Difficult to control user traffic
- Core networks have no ability or incentive to provide special treatment on
import ant user flows
- End-user congestion and flow control (e,g, TCP) may not be sufficient
- Routing mechanisms like OS
PF or IS
- IS
may not be good enough when it comes to business-based route selection
- Providers need to create more services with manageable operation cost
3
Metro Network Metro Network Core Network Ethernet MPLS Tunnel Optical A B C D
GIBSON Architecture and Operation Overview
IPsphere SMS Business Services
SMS Interface
Pseudowire Segment Pseudowire Segment Pseudowire Segment User Flow Us Flo
Policy Routing
er w
Mapping / Aggregation
GIBSON Pseudowire
Application Stream
4
User 1 Packet Tunnel Pseudowire for User Flow 2 Pseudowire for User Flow 1 User 2
PW Label Control Word L1 / L2 / IP Header Application Header Data Payload L1 / L2 / IP Header Application Header Data Payload PW Label Control Word L1 / L2 / IP Header Application Header Data Payload L1 / L2 / IP Header Application Header Data Payload
Today’s Pseudowire Definition:
- Encapsulate based on L1/L2 and IP headers
- Emulate low layer services (OAM etc.)
GIBSON Pseudowire Definition:
- Encapsulate based on application headers
- Emulate high layer services (rate adaptation etc.)
A Review of Pseudowire
5
Pseudowire provides the following today…
- Transport Agnostic
- Pseudowires can support IP and Ethernet, and even optical cross-connections
- IP-friendly
- Pseudowires are provisioned and controlled via IP control plane
- Inter-network capable
- PWE3 multi-hop [MHOP] and switching [S
WITCH] techniques enable the providers to provision Pseudowires over multiple intra-domain or inter-domain networks.
- VPN capable
- Pseudowire has been extended in IETF to create a nested topology for VPN applications,
which include VPLS and VPWS .
- SLA capable
- Pseudowire technique can provide QoS
, protection and restoration and congestion control functionality at per-flow basis.
- Flow type agnost ic
- Pseudowires can encapsulate any type of data flows. As defined today, Pseudowires can
encapsulate Layer-1 flows in S ONET/ S DH format (the technique is known as Circuit Emulation), Layer-2 flows such as ATM, Frame Relay, PPP and Ethernet, and IP
All in deployment today
6
The Importance of Application-Awareness
- New data services may require per-application-flow management
and control:
- Application flow examples
- RTP for session-based applications such as VoD and VoIP
- MPEG for multimedia applications
- Application flows need to be managed inside the network
- New applications bring an entirely different set of service
requirements:
- Examples:
- Packet video: tolerate packet out-of-order delivery
- Packet voice: tolerate packet drop, but not delay
- “ S
eamless Convergence” offerings: user flows can adapt to the
change of link bandwidth, but maintain constant-bit-rate
- Traditional mechanisms (IEEE 802.1p or IP DiffS
erv) are not adequate to handle such applications. Map application flows into Pseudowires Consistent e2e behavior
7
GIBSON Attributes
- Application-awareness
- GIBS
ON Pseudowires map and aggregate data flows from any layer (i.e., layer 1 to 7)
- Aggregation method depends on applications:
- One flow/ Pseudowire: high-bandwidth and long-duration VoD
streams
- Multiple flows/ Pseudowire: low-speed and short-lived VoIP
sessions
- Business-driven routing
- At network border, GIBS
ON pseudowires are switched based on business-driven routing
- SMS
Interfacing
- GIBS
ON pseudowires are provisioned as a result of S MS Administration, S MS Parent, and S MS Child communication
8
SMS Provider #1
GIBSON Endpoint A GIBSON Endpoint B Route Server E
SMS Provider #2
GIBSON Endpoint C Route Server F
SMS Provider #3
GIBSON Endpoint D Route Server G
Business Peering and Routing
GIBSON Pseudowire User Flow
GIBSON Policy Routing
9 Service access device Service access device
Gibson Endpoint
Non-Gibson Endpoint
Gibson Endpoint Gibson Endpoint Gibson Endpoint
Interfaces in GIBSON
S1 S2 S3 S4 S5
Transport Tunnels Pseudowires within GIBSON-enabled network Data flows in best-effort IP networks
Access: lightweight signaling Aggregation (Pseudowire routing) Pseudowire Termination (Meshed VPN)
10
SMS
IMS Control
Network 1
IMS Control
Network 3 Network 2 Media Flow SMS SMS GIBSON Endpoint GIBSON Endpoint GIBSON Endpoint
- 1. tunnel setup
- 1. tunnel setup
- 1. tunnel setup
- 3. populate IMS
- 3. populate IMS
- 4. Negotiating with resource awareness
- 2. route exchange
- 2. route exchange
GIBSON: IMS User Case
11
SMS
IMS Control
Network 1
IMS Control
Network 3 Network 2 Media Flow SMS SMS GIBSON Endpoint GIBSON Endpoint GIBSON Endpoint
- 5. Download session data
- 5. Download session data
- 6. Policy routing
- 6. Policy routing
- 7. Trigger PW setup
- 7. Trigger PW setup
- 8. Routing updates
GIBSON: IMS User Case (cont. 1)
12
SMS
IMS Control
Network 1
IMS Control
Network 3 Network 2 Media Flow SMS SMS GIBSON Endpoint GIBSON Endpoint GIBSON Endpoint
- 9. PW Setup
- 10. PW Routing
- 9. PW Setup
- 11. Data aggregation, grouping and mapping
GIBSON: IMS User Case (cont. 2)
13
Summary on GIBSON
- Open interface for business service creation and provisioning
- Operate in both intra-provider and inter-provider environment
- Provide consistent edge-to-edge per-flow forwarding behavior
- Flow type agnostics – capable of processing flows in any format
- S
upport for “ nesting” of Pseudowires to facilitate traffic management and virtual service creation
- S
upport for “ virtual segment s” that envelope multipoint service behavior created by capabilities like RFC 2547, to permit end-to-end multipoint delivery
- Independent of underlying network transport tunneling mechanism
- Applicable on all service devices, with less dependency on IP routing
- Leverage and extend a proven and simple technology: Pseduowire
14
What’s Next…
- Gather more feedback from service providers
- Define and implement S
MS interfaces
- Investigate more on routing interfaces
- Routing updates, and scalability
- Interface with PCE
- Investigate more on RACF interfaces
- How to deal with all those QoS policies?
- Apply GIBSON to other user cases
- Business access (leased line services)
- FMC
- Working toward standardizing the GIBS