Extreme Networks

Transcription

Extreme Networks
Extreme Networks
Metro Solutions
Olaf Hagemann
Senior Network Consultant
[email protected]
Extreme Networks Confidential and Proprietary
Provider installations with Extreme
© 2005 Extreme Networks, Inc. All Rights Reserved
Triple Play Solutions GmbH Lab
Oct. 2005 in Munich-Dornach
http://www.tp-alliance.net
Triple Play ISP / Metro Solution:
Voice,Video, Data
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.triple-play-solutions.com
TP-Alliance
one World goes Online
Core Router Solution
Backbone Switching Solution
Aggregation Switching Solution
CPE´s Solution
Hotspot Solution
Headend Solution
TP-Alliance a network for us and our child's future
Security Solution
Content Solution
Migrations Solutions
Special Customer Solutions
Pipe / Cabel / Shelter Solution
48 V / USV / Clima Solution
etc.
© 2005 Extreme Networks, Inc. All Rights Reserved
Extreme Standards Leadership
Standards Bodies
Industry Affiliations
802.1ad/ah Provider Bridging
•
Craig Easley,
Director
Steve Haddock 802.1 – 802.3 Liaison
802.3 Ethernet
• 802.3z Gigabit Ethernet
•
Editor, Steve Haddock
802.3ad link aggregation
Chair, Steve Haddock
•
802.3ae 10 Gigabit Ethernet
•
Co-Chair, Steve Haddock
802.3ah Ethernet in the First Mile
RFC 3619 Ethernet Automatic
Protection Switching EAPS
© 2005 Extreme Networks, Inc. All Rights Reserved
Craig Easley,
President
Tony Lee,
former Chairman
Produktportfolio for Convergence
Summit Familiy
Value Solutions
10/100 BASE-T
1000 BASE-SX/LX/ZX
Summit 200-24
Security
BlackDiamond
Familiy
Intrusion Prevention /
Virtual Security Resource
Fixed Port
100/1000 BASE-TX
1000 BASE-SX/LX/ZX
New ! Sentriant 1
Summit7i
BD 10K
Summit 200-48
New !
Alpine Familiy
Summit48si
High Density Gig to Edge
10/100/1000
10 Gig E Uplinks
Summit5i
BlackDiamond 8810
(former Aspen)
Alpine 3808
XOS
Summit1i
POE
POE
New !
BD 6816
Summit 400-24t und 24p
Summit X450t und X450x
XOS
Summit 400-48t
Alpine 3804
Summit 300 (24/48)
BD 6808
New !
WIRELESS
WIRELESS
Summit WM-Series
POE
New !
Alpine 3802
POE
XOS
POE
© 2005 Extreme Networks, Inc. All Rights Reserved
BD 6804
ExtremeWare Device Management
Command Line
Interface
ExtremeWare
Vista
EPICenter
Manager
RS-232, Telnet,
SSH2
HTTP
SNMP v1/v2c/v3
Radius (incl. Per command)
Username/password database
Community
string
Access Lists; encrypted pword/comm string; conf logging
© 2005 Extreme Networks, Inc. All Rights Reserved
What’s Carrier Ethernet ?
Protection
•
•
•
50ms Protection
End to End Path Protection
Aggregated Line & Node Protection
Hard QoS
Scalability
•
•
•
Services and
Bandwidth
100,000’s of EVC’s
From Mbps to
x10Gbps
Carrier
Ethernet
Service
Management
•
•
•
•
•
•
Fast service creation
Carrier class OAM capabilities
Customer Network Management (CNM)
Guaranteed end to end SLA
End to End CIR and EIR
Business, Mobile, Residential
TDM Support
•
•
•
Quelle:
© 2005 Extreme Networks, Inc. All Rights Reserved
Seamless integration of TDM
Circuit Emulation Services
Support existing voice applications
Policy-Based QoS
Traffic Grouping Classification + QoS Profile => Policy
• Classifications: L1-L4 information, WINS username (using EEM and DLCS), Observe and/or
overwrite 802.1p and IPDiffServ packet markings.
• QoS Profile: Determines Bandwidth Management (e.g. Min. Bandwidth %; Max Bandwidth
%; priority). Option for Random Early Detection.
• Layer Independent QoS: Use of Layer 3 & 4, IP DiffServ info without routing;
Classification
Packets
IN
QoS Profile (configured queue)
=Policy
Qp1 - Best Effort Traffic
• Ordered Hierarchy
• Layer 1,2,3,4, .1p, IP
DiffServ packet info
Packet
Layer 4
Layer 3 Layer 2
Layer 1
Layer 4
Layer 3 Layer 2
Layer 1
0% Min/100% Max
Low Priority
5% Min/100% Max
Higher Priority
QpX - Essential Traffic
Packet
© 2005 Extreme Networks, Inc. All Rights Reserved
Packets
Out
Scalable and Available Unix based
Operating System
Modularity Æ Availability and scale
Communications
Security
Monitoring
Hitless
Hitless
Failove
Failove
rr
Routing
Routing
Virtual
Virtual
Routing
Routing
Mgmt
Mgmt
Memory protection
•
Process Monitoring and Restart
•
Dynamic module loads (e.g. SSH2, SCP2)
Expensibility and open-ness Æ New
features faster
XML
Device
Device Management
Management
•
•
POSIX APIs gives a great starting point for new
code
•
TCL and scriptable CLI enable easier
management
•
•
Configurable CLI
Security
Security
System
System
Libraries
Libraries
TCP/IP
TCP/IP v4
v4 &
&
v6
v6
Hardware Abstraction Layer
Device Drivers & Network Interfaces
XML Internal configuration representation
Security
•
•
•
ClearFlow
Denial of Service Detection and Prevention
Hooks for Interactive Threat Containment
© 2005 Extreme Networks, Inc. All Rights Reserved
ExtremeWare XOS,
Tested by Tolly Group
Key Findings of Tolly Group:
Modularity has benefits:
• Extensible OS
• Higher network availability
• Dynamically add functionality
White Paper
Process recovery:
• Higher network availability
• No single process can take down the system
XOS ACL’s:
• Wirespeed ACL forwarding
• Dynamic ACL editing
• Precise wirespeed “accounting” on matching ACL
Virtual Domains:
• Ability to collapse multiple L3 switches on one device
• Flexibility to support overlapping IP addresses
© 2005 Extreme Networks, Inc. All Rights Reserved
January 2005
Pain Point: Ethernet Provisioning
Complexity
MEF Compliance
SPs needs multi-vendor, multi-technology
provisioning of:
‰ E-Line services (Point to Point)
‰ Private line, and Virtual private line
CE-VLAN CoS 6
UNI
EVC1
CE-VLAN CoS 4
CE-VLAN CoS 2
‰ E-LAN services (Multipt to Multipt)
Ingress Profile
Per COS ID 6
Ingress Profile
Per COS ID 4
Ingress Profile
Per COS ID 2
‰ Private LAN, and Virtual private LAN
EVC2
EVC3
Speed
- Ethernet Interface rates:
10 MB,100MB,1GB, 10GB
- Increments
Class Of Service (COS)
- Per Port: All EVCs at UNI
- Per COS ID
Bandwidth Parameters
- Potentially apply per UNI, EVC, or VLAN ID
- CIR, CBS, PIR, PBS
Service Level Agreements
- Built around bandwidth &
performance parameters
Service Performance Parameters
- Apply per-COS ID
- Frame delay, Jitter, Loss
EVC1
UNI
EVC2
Ingress BW
Profile per
Ingress UNI
EVC3
Source: Based on Metro Ethernet Forum material
Quelle:
© 2005 Extreme Networks, Inc. All Rights Reserved
UNI
EVC1
Ingress BW Profile
Per EVC1
EVC2
Ingress BW Profile
Per EVC2
EVC3
Ingress BW Profile
Per EVC3
Advanced Traffic Management
Engine
Bi-directional (ingress and egress) rate limiting
•
On egress, “phantom” scheduling is supported to distribute unused
bandwidth to other customers
3-tiered hierarchical rate limiting
1. Per application (up to 8 apps per customer)
2. Per customer (up to 4K per 10Gig link / 32K customer in total)
3. Per physical port (up to 160 = 2 * 80-port)
Packet Classification
•
Any data field can be used to classify the packet (in 4GNSS
programmable packet processor = Cartman)
© 2005 Extreme Networks, Inc. All Rights Reserved
QoS Characteristic
Ingress Limiting / MAX 180K limiters per Chip
1st Level (Application CoS)
2nd Level (Customer ID)
3rd Level (Physical Port)
10GbE
Port
8 Limiters per Ingress
Service ID
4K Limiters per Physical
Port
Dual Rate Limiter
1GbE
Port
8 Limiters per Ingress
Service ID
2K Limiters per Physical
Port
Dual Rate Limiter
Egress Limiting / MAX 288K limiters per System
1st Level (Application CoS)
2nd Level (Customer ID)
3rd Level (Physical Port)
10GbE
Port
8 Limiters per Egress
Service ID
4K Limiters per Physical
Port
Dual Rate Limiter
1GbE
Port
8 Limiters per Egress
Service ID
400 Limiters per Physical
Port
Dual Rate Limiter
1st Level
2nd Level
3rd Level
© 2005 Extreme Networks, Inc. All Rights Reserved
Ingress and Egress
3-tier Hierarchical Rate Limiting
Rate Limiting
Rate Shaping / Prioritization
CIR
CIR
CIR
App #1
App #2
QP #1
App #3
QP #2
Customer #A
QP #3
App #8
PR
PR
Port #1.1
QP #8
App #1
App #2
Egress QoS “Queue”
Customer #B
PR
App #3
App #8
App #1
App #2
App #3
Customer #B
Only applicable to
App #8
Egress control
1st level Limiter
2nd level Limiter
3rd level Limiter
(Application CIR)
(Customer PR)
(Port CIR/PR)
© 2005 Extreme Networks, Inc. All Rights Reserved
Extreme: Ingress and Egress Strict
Queuing
2. In addition, Priority Traffic will
continue to get enforced on the
Egress
Backplane
Switching Fabric
Low Priority Traffic
1. With Ingress Strict Queue
Enforcement, Priority Traffic will
always be guaranteed bandwidth
when congestion occurs on the
backplane
From other I/O
modules or ports
High Priority Traffic
Low Priority Traffic
I/O Module
© 2005 Extreme Networks, Inc. All Rights Reserved
Carrier Ethernet Protection
Protection
•
•
•
50ms Protection
End to End Path Protection
Aggregated Line & Node Protection
Hard QoS
Scalability
•
•
•
Services and
Bandwidth
100,000’s of EVC’s
From Mbps to
x10Gbps
Carrier
Ethernet
Service
Management
•
•
•
•
•
•
Fast service creation
Carrier class OAM capabilities
Customer Network Management (CNM)
Guaranteed end to end SLA
End to End CIR and EIR
Business, Mobile, Residential
TDM Support
•
•
•
© 2005 Extreme Networks, Inc. All Rights Reserved
Seamless integration of TDM
Circuit Emulation Services
Support existing voice applications
Quelle:
Protecting the Network
Detection of anomalies Æ Extreme’s CLEAR-Flow:
• is an ASIC-based technology built into our 4GNSS chipset
• examines the first 120 bytes in every packet, on every port, of a
4GNSS switch
• enables discovery of anomalous traffic even in 10 gig core
networks
Send suspicious traffic
for analysis by an IPS
Rate limit traffic and
alert a network
administrator
Block traffic
automatically
X
X
© 2005 Extreme Networks, Inc. All Rights Reserved
Implications for Day-Zero attacks
Infect Targets
Attack Traffic (packets/sec)
Find Targets
Suspicious
Activity
PreAttack
Rapidly Propagating Infection
(Under Attack)
Mitigation
(Manual)
Focus so far is post-attack mitigation …
© 2005 Extreme Networks, Inc. All Rights Reserved
Time
Smarter Alternative
Attack Traffic (packets/sec)
Find Targets ..
Extreme Security Solutions
• Detect Suspicious Behavior
• Identify Threat Source(s)
• Automate Mitigation
Time
Detect & mitigate
before attack is
launched
© 2005 Extreme Networks, Inc. All Rights Reserved
CLEAR-Flow
First order threats that can be mitigated
Denial of Service
Attacks
Smurf attack
Ping of death
Ping sweep
Ping flood
Port sweep
TCP Flood (Syn, Syn-Ack,
Ack, Fin, Xmas, Rst)
Syn attack: RFC-2827
Flood attacks against
well know port numbers
Login services
RPC, NFS
File sharing
X windows
Name services
Mail services
Web services
ICMP messages
© 2005 Extreme Networks, Inc. All Rights Reserved
…
Virtual Router BD10k
Subnet 1
Subnet 2
Layer 3 Virtual Switch #1
Subnet 1
Layer 3 Virtual Switch #2
Subnet 2
Layer 2 Virtual Switch #1
VLAN 1
VLAN 2
Virtual Switches provide isolated route tables and traffic
Overlap IP address spaces initially
• VLAN spaces (vlan ID´s) in a future release
Benefits: Collapse / simplify networks without compromise
• Security: Total isolation between users on different Virtual Switches
• Availability: If one virtual switch is attacked, others will be unaffected
© 2005 Extreme Networks, Inc. All Rights Reserved
Protecting the Network: Illustration
Analyze
- Baseline normal behavior
- Identify anomalies
- Generate alerts
Analysis
Engine
Respond
- Shutdown Hosts
- Shutdown Ports
- Initiate detailed monitoring
- send data to mirror port
- Throttle large
movements of data
Measure
- Pre-Filter Data
- Maintain Counters
- Sample Flows
- ID Traffic bursts
- ID State Changes
Enforce
- Deep & Extensive ACLs
- Rate Limiting
- Traffic Marking
CLEAR-Flow for Interactive Threat Containment
© 2005 Extreme Networks, Inc. All Rights Reserved
EAPS
Ethernet Automatic Protection Switching
Proven sub-50ms failover times
Featured on all Extreme product lines
Designed for Carriers/ISP – Required for
Convergence in the Enterprise
© 2005 Extreme Networks, Inc. All Rights Reserved
EAPS v2: redundant ring connections
Avoids „super loop“ problem if a common link betwenn 2 EAPS
rings fails
„health-check“ pakets between „controller“ and „partner“
If common link fails, the controller blocks all but one port, the
„active open“ port
Common Link
Controller
Shared Ports
S6
S3
S4
S2
EAPS Domain 2
EAPS Domain 1
S5
P
P
S
S1
Master Switch
Partner
S
S8
Master Switch
© 2005 Extreme Networks, Inc. All Rights Reserved
S67
Carrier Ethernet Management
Protection
•
•
•
50ms Protection
End to End Path Protection
Aggregated Line & Node Protection
Hard QoS
Scalability
•
•
•
Services and
Bandwidth
100,000’s of EVC’s
From Mbps to
x10Gbps
Carrier
Ethernet
Service
Management
•
•
•
Fast service creation
Carrier class OAM capabilities
Customer Network Management (CNM)
Quelle:
•
•
•
Guaranteed end to end SLA
End to End CIR and EIR
Business, Mobile, Residential
TDM Support
•
•
•
© 2005 Extreme Networks, Inc. All Rights Reserved
Seamless integration of TDM
Circuit Emulation Services
Support existing voice applications
“EPICenter” Overview
Product focus: Network / Device Monitoring, Element Management
Inventory Manager with Network Discovery
VLAN Manager
ExtremeView System
Real-Time Statistics
IP/MAC Address Finder
Administration Tool
Topological Discovery with Display Map
Alarm System with Configurable Alarms
Configuration Management
ESRP Application
EPICenter Report System
Exportable database
Configurable Functionality
© 2005 Extreme Networks, Inc. All Rights Reserved
“EPICenter Policy Manager”
Functionality upgrade to EPICenter
•
License key only
•
Enables two additional applets: Policy and VoIP
Config
QoS policy configuration
•
One switch or group of switches
•
Automatic policy synchronization
Security Policies
•
User based dynamic policies
•
Network Login / 802.1x
VoIP Configuration
•
Assists in QoS configuration for VoIP traffic
Directory-enabled deployment
•
Windows Domain Integration
•
Active Directory, LDAP, NIS
© 2005 Extreme Networks, Inc. All Rights Reserved
Converged Network Analyzer (CNA)
VoIP Monitoring & Resolution for Extreme Networks
CNA Server
IBM xSeries 306/336
Third
Party
Switch
CNA Agent
Test
Request
Test
Result
WAN
SNMP
Trap
Router
Extreme
Switch
CNA Agent
IV Network
Management
Station
Extreme Switches provide QoS on the LAN
CNA Server Appliance
• Find QoS problems with CNA
• Fix WAN problems by re-routing calls over high quality WAN links
CNA Agent client monitoring software- embedded in:
• Extreme XoS- based switches (BD10K, BD8810, Summit 450)
• External box for non-Extreme or supported equipment
© 2005 Extreme Networks, Inc. All Rights Reserved
Overall Network
Topology View
CNA Dashboard: Managing applications in the
Operations Center
User
experience
and
application
availability
Urgent
problems
Rescued
users
Application
performance
(e.g., VoIP,
VPN, VoD,
IPTV)
© 2005 Extreme Networks, Inc. All Rights Reserved
sFlow Traffic Analysis
one part of the Clearflow functionality
Protocol for traffic accounting:
•
•
•
•
Usage-based billing
Baselining
Troubleshooting
Security (Attack Identification)
Defined in RFC 3176
Similar to Netflow
•
But takes samples and extrapolates network traffic profile
sFlow Datagram
forwarding
tables
sFlow
agent
eg 128B
interface
stats/counters
Switching
Engine
packet header
1 in N
sampling
src/dst i/f
sampling parms
rate
pool
forwarding
src 802.1p/Q
dst 802.1p/Q
next hop
src/dst mask
AS path
communities
localPref
user ID
URL
src/dst
Radius
TACACS
Network
sFlow Collector &
Analyzer
© 2005 Extreme Networks, Inc. All Rights Reserved
i/f counters
IP Mediation – Web Services
(3)
AAA
server
GUI
(1c)
(5)
(4a)
CRM
MSP
(4b)
Switches
(6)
Billing
Server
(2)
(1) Network connections from the m obile network to PSDN / Internet
(2) Subscriber look up for unique identification of the subscriber using IP network session inform ation
(3) Network session ev ents
-
End of user session (Start of user session)
-
CSTM service ended (started)
All services to be inspected by the traffic m onitor are reported to tecControl, e.g. web browsing,
M M S, IP telephony incl. start tim e, end tim e, service type, data volum e.
Access to the serv ice is always granted.
(4) Rated call records in real tim e
The reported service events are m apped to call records, rated depending on service type, duration and
volum e and transferred to the billing serv er.
Depending on the service, content specific inform ation is av ailable and use d for rating purposes, e.g. to
ov erwrite v olum e or duration of the CDR for processing in the billing serv er.
(5) N.A.
(6) tecControl adm inistration, configuration, m aintenance
© 2005 Extreme Networks, Inc. All Rights Reserved
IP Mediation – VoIP
AAA
server
(3)
GUI
(5)
SIP server
(for proxy,
registrar,
redirect,
location
funct.)
(4a)
(1a)
CRM
MSP
(6)
(4b)
(3)
Billing
Server
(2)
(1) Network connections from the m obile network to PSDN / Internet
(2) Subscriber look up for unique identification of the subscriber using IP network session inform ation
(3) Network session ev ents
-
End of user session (Start of user session)
-
CSTM service ended (started)
All services to be inspected by the traffic m onitor are reported to tecControl, e.g. web browsing,
MMS, IP telephony incl. start time, end time, service type, data volum e.
Access to the serv ice is always granted.
(4) Rated call records in real tim e
The reported service events are m apped to call records, rated depending on service type, duration
and v olum e and transferred to the billing serv er.
Depending on the serv ice, content specific information is available and used for rating purposes, e.g.
to overwrite volum e or duration of the CDR for processing in the billing server.
(5) N.A.
(6) tecControl adm inistration, configuration, m aintenance
© 2005 Extreme Networks, Inc. All Rights Reserved
Seamless Real-Time and Historical
Drilldown for SLAs
Resources Supporting
the Service
Customer
Service
Drill--Down
to technical details
Service Level Violation
© 2005 Extreme Networks, Inc. All Rights Reserved
Open integration with Fault
Management tools
1 : Performance Notifications
Performance
Performance
Problem
Problem
Identification
Identification
2 : Access to performance reports
CRM
CRM
Performance Analysis and
Early Warning System
API / SNMP / XML
apps
apps
Trouble
Trouble Ticketing
Ticketing
Event
Event Management
Management
Faults & up/down
status
Easy High-resolution,
servers
Real-time Analysis
servers
networks, systems, applications
CNA
CNA
Server
Server
Directory
Switch Analyses, Reporting,
Policies
SNMP Connection
LDAP
EPI
EPICenter
Center
Policy
PolicyManager
Manager
© 2005 Extreme Networks, Inc. All Rights Reserved
Domain
Controller
Faults and
Performance
Notifications
Carrier Ethernet TDM Support
Protection
•
•
•
50ms Protection
End to End Path Protection
Aggregated Line & Node Protection
Hard QoS
Scalability
•
•
•
Services and
Bandwidth
100,000’s of EVC’s
From Mbps to
x10Gbps
Carrier
Ethernet
Service
Management
•
•
•
•
•
•
Fast service creation
Carrier class OAM capabilities
Customer Network Management (CNM)
Guaranteed end to end SLA
End to End CIR and EIR
Business, Mobile, Residential
TDM Support
•
•
•
© 2005 Extreme Networks, Inc. All Rights Reserved
Seamless integration of TDM
Circuit Emulation Services
Support existing voice applications
Quelle:
TDM ready - ExtremeWare XOS and
P-ASICs
Open architecture with UNIXlike scale and availability
Highly Availabile
•
Memory protection
•
Hitless failover
•
Memory protection
•
Module upgrades
•
Hitless software migration
•
Virtual Router Architecture
•
•
Process Monitoring and Restart
Flexible configuration management based
on XML with scriptable CLI
Highly resilient
Extensible
•
Flexible configuration management and
APIs based on XML with scriptable CLI
•
Dynamic loading of extensions
•
New features to market – faster!
Future Proof
•
Scalable through modularity and HAL
•
Device management via XML, …
•
Virtual Router Architecture
•
Process Monitoring and Restart
Extensible
•
New features to market – faster!
Infrastructure for the
intelligent network
•
Distributed processing both inside and
outside of the box
© 2005 Extreme Networks, Inc. All Rights Reserved
Supporting Business Services
Any-to-any Layer 2 VPN to interconnect multiple locations
transparently and effectively (with high and guaranteed bandwidth)
Supporting the convergence of data and voice
Branch
ISP
Internet
IP
Metro
Carrier Ethernet
Nationwide/Global
Ethernet
Carrier
E-LAN
Metro
Carrier Ethernet
HQ
Branch
Metro
Carrier Ethernet
Branch
Branch
© 2005 Extreme Networks, Inc. All Rights Reserved
MPLS TLS: Simplifying Provisioning
Customer
Site B
802.1Q Tag
500
Switch
Switch
Switch
Switch
Customer
Site A
802.1Q Tag
500
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
•
•
Switch
NEW
Customer
Site C
Example Network; a customer has 2 sites in a TLS network, and wants to
add an additional site.
Before adding the site, 4 switches must be configured with his 802.1Q tag
(500).
© 2005 Extreme Networks, Inc. All Rights Reserved
MPLS TLS: Simplifying Provisioning
Transport Layer Security
Switch
Customer
Site B
802.1Q Tag
500
Switch
Switch
Switch
Switch
Switch
Customer
Site A
802.1Q Tag
500
Switch
Switch
Switch
Switch
Switch
NEW
Customer
Site C
802.1Q Tag
500
Switch
Switch
Switch
Switch
•
How many switches must be reconfigured when the additional site (Site C)
is added?
•
A TOTAL OF 9 SWITCHES MUST BE RECONFIGURED – IN THIS
SMALL NETWORK ( Hub and Spoke Mode )
© 2005 Extreme Networks, Inc. All Rights Reserved
vMAN: Simplifying Provisioning
Customer
Site B
Switch
Switch
Switch
Switch
vMAN
vMAN
Switch
Switch
Customer
Site A
vMAN
Switch
vMAN
Switch
Switch
Switch
vMAN
Switch
Switch
Switch
•
•
Switch
Switch
NEW Customer
Site C
Example Network; a customer has 2 sites in a vMAN network, and wants
to add an additional site (Site C).
Before adding the site, only 2 switches must be configured with vMAN
connecting Site A and Site B.
© 2005 Extreme Networks, Inc. All Rights Reserved
vMAN: Simplifying Provisioning
Switch
Customer
Site B
802.1Q Tag
500
Switch
Switch
Switch
Switch
Switch
Customer
Site A
802.1Q Tag
500
Switch
Switch
Switch
Switch
Switch
NEW Customer
Site C
802.1Q Tag
500
Switch
Switch
Switch
Switch
•
How many must be reconfigured when the additional site (Site C) is
added?
•
Only with one config Line for vMAN Setup on all Switches and another
one for the 802.1Q Tag on the Site C Switch.
© 2005 Extreme Networks, Inc. All Rights Reserved
MPLS RSVP-TE:
Simplifying Provisioning
Resource Reservation Protocol - Traffic Extension RFC3209
Rate limiting can be done at ingress, and RSVP-TE “reserves” bandwidth for the LSP, and ensures no oversubscription.
Switch
Customer
Site B
Switch
Switch
Switch
Switch
Switch
Customer
Site A
LSP = label switched
paths
Switch
Switch
Switch
Switch
NEW Customer
Site C
Switch
LSP Site A to Site B
Switch
Switch
Switch
•
•
•
Switch
LSP Site A to Site C
LSP Site B to Site C
How many switches must be reconfigured when the additional site (Site C) is
added? Now just the LERs must be reconfigured.
Only 3 MPLS switches must be reconfigured; other nodes require no config
change but it is normal a Multicast Protocol.
RSVP-TE SIGNALING SETS UP LSP ON LSR’s ( Full Meshed Mode )
© 2005 Extreme Networks, Inc. All Rights Reserved
Supporting Transport for IP
Network
E-LAN connections among routers
•
Any logical IP topology, multiple EVC’s of a single physical interface
It supports all business IP services, from IP VPN to Internet access
IP
IP
Layer3 Switch:
vMAN pro Port or
vLAN pro Port
50ms Failover
R
R
Layer3 Switch:
MPLS / vMAN
50ms Failover
Metro IP
R
Carrier Ethernet
Nationwide/Global
Carrier Ethernet
Metro
Carrier Ethernet
IP
R Carrier
RIP
R
IP
R
IP
IP
R
R
IP
Metro
Carrier Ethernet
R
IP
R
IP
R
IP
IP Network
Using Carrier Ethernet
as the Transport Layer
with MPLS and EAPS
Nationwide
and
EAPS with vMAN in the
Metro
© 2005 Extreme Networks, Inc. All Rights Reserved
Supporting TV Distribution Service
1. Multicast tree(s) is(are) established with QoS guaranteed
2. Subscribers (the Set-Top-Box) sends request for a channel
3. Carrier Ethernet filters, only replicates and forwards the requested channel to the subscribers with IGMP Snooping
4. Video source protection and network protection are set up automatically between the HE and CPE
Video
Source
Subscribers
IP
IP DSLAM
IP
Video
Source
L2 DSLAM
IP
Metro
Carrier Ethernet
Nationwide/Global
Carrier Ethernet
Metro
Carrier Ethernet
IP DSLAM
IP
L2 DSLAM
Metro
Carrier Ethernet
IP DSLAM
IP
IP
IP
© 2005 Extreme Networks, Inc. All Rights Reserved
IP DSLAM
Supporting VoD Service
1. An E-LAN connection is established between DSLAMs and VoD servers
2. Subscribers (the Set-Top-Box) sends request to RSM for a movie
3. RSM finds/informs the best VoD server, acknowledge subscribers of such
4. The subscriber establishes session with VoD and Command server respectively
Subscribers
IP
IP DSLAM
IP
IP
E-LAN
IP
Resource &
Subscriber
Manager
(RSM)
Metro
IP
Carrier Ethernet
IP DSLAM
VoD server
L2 DSLAM
Nationwide/Global
Carrier Ethernet
Metro
IP
Ethernet
Carrier
Command Server
IP
L2 DSLAM
IP
Metro
Carrier Ethernet
IP DSLAM
IP
IP
IP
© 2005 Extreme Networks, Inc. All Rights Reserved
IP DSLAM
Supporting VoIP Service
1. An E-LAN connection is established between WAN routers to build an IP WAN
2. An E-LAN connection is established between the DSLAMs/CPEs and the IP PoP in each metro
3. Caller contacts the SIP Proxy server in order to find the IP address of the called party
4. Caller establishes session with the called party through E-LAN connection
Location Server
IP WAN
IP
SIP Proxy
Server
Subscribers
IP
CPE
CPE
IP
Metro
IP
Carrier Ethernet
bal
Nationwide/Glo
E-LAN
Carrier Ethernet
Metro
IP
Ethernet
Carrier
IP DSLAM
CPE
L2 DSLAM
IP
Metro
Carrier Ethernet
IP DSLAM
IP
IP
IP
© 2005 Extreme Networks, Inc. All Rights Reserved
Carrier Ethernet Standards
Protection
• MEF 2 – Ethernet Protection
• MEF 4 – Architecture Framework
Scalability
Hard QoS
• MEF 9 – UNI Testing
• MEF 11 – UNI Framework
Carrier
Ethernet
Service
Management
TDM Support
• MEF 7 – EMS and NMS Info Model
Quelle:
• MEF 6 – Service
Definition
• MEF 10 – Service
Attributes
© 2005 Extreme Networks, Inc. All Rights Reserved
• MEF 3 – CES Framework
• MEF 8 – CES Implementation
The New MEF Network Architecture
First MEF9 Tested Solution
Transport
Business
Subscriber
IP
IP
IP
Metro
Carrier
Ethernet
Nationwide
Carrier Ethernet
IP
IP
Metro
Carrier
Ethernet
IP
IP
IP
Residential
Subscriber
Service Provider
• Hard QoS and Traffic Engineering
• Better bandwidth utilization/Scalability
• Protection Switching (50ms)
• OAM functions and TDM Support
• Any-to-Any VPN services
• Multicast support with Hard QoS
• Carries all applications
• Internet Access
• IP VPN service
IP
Metro
Carrier Ethernet
IP
IP
• ASIC Technologie, IPv6 in Hardware
IP
• QoS, 8 Hardwarequeues, Ingreesshaping, Egreesshaping, 3-tier hierachical Ratelimiting
• EAPS
• Full Redundant Switching Technologie, XOS, Open XML integration for other vendors
• vMAN: per port, VLAN to VMAN mapping , MPLS L2 VPN implementation (Q4/05)
• Multicast streams - 100kbps- 2M (size), 2000(number), Multicast receivers - 10k, Multicast zapping rate - 4 per second
© 2005 Extreme Networks, Inc. All Rights Reserved
Quelle:
Extreme’s Key Strengths
Key Strengths
Benefit
Quality Connections
9Clear Voice Calls on LAN
• Ingress and Egress QoS for low latency and jitter tested superior over Cisco (June 05 Tolly Report)
• CNA: End-to-end Application Monitoring and
Resolution
9Clear Voice Calls on WAN
9Video implementation
9High Zapping rate
9 No lost or dropped calls
Continuous Uptime
• ExtremeWare OS hardened OS
• EAPS
• Hardware Redundancy
9 Service continuity – dial tone always available.
9 CPE device control. Simplify deployment.
Security & Compliance:
• MAC Radius to authenticate CPEs
• Sentriant Security Appliance
• Layer 3 Virtual Routing
9 Prevents VoIP / VoD DOS attacks directed to IP
telephony / TV server
9 Hierarchical isolation for multiple levels of security,
i.e., protect Call centers. Also, enables hosted IP
telephony services
9 MEF 9 Certified
9 EPICenter to manage Extreme network inventory.
Simple Management:
• EPICenter management / AIM Manager
• Plug and play with LLDP and Universal Port
Manager, Auto PoE
• XML APIs with EPICenter and Extreme switches
Simplified network (VoIP/Video) troubleshooting for
IT= lowers help desk costs.
9 Std. based device discovery & power mgmt = Lower
cost of operation. Std. based APIs allow rapid
development and deployment of applications.
Example: Interactive Voice Response (IVR) system.
Dynamically open and close ports for voice calls.
© 2005 Extreme Networks, Inc. All Rights Reserved
Metro Ethernet Network Overview
Standard based and flexible
Metro Core
Provider Edge Customer Edge
MDU
10GbE Core Ring
2 – 4 Link Aggregated GbE
PoP
GbE/10GbE
Access Ring
T1/E1/T3/E3
GbE/10GbE
Access Ring
Access Ring
PoP
PoP
PoP
OLT
PON
PoP
CMTS
FE
M/C
IP DSLAM
HFC
(Cable)
DSL
Fiber
FE/GbE
Copper
M/C
MT
U
GbE
© 2005 Extreme Networks, Inc. All Rights Reserved
MT
U
WifiNetwork
© 2005 Extreme Networks, Inc. All Rights Reserved
Thank You
This product roadmap represents Extreme Network’s current strategic direction. All
ExtremeWare® releases will be on a when-and-if available basis. Actual feature development
and timing of releases will be at the sole discretion of Extreme Networks. Presentation of the
product roadmap does not create a commitment by Extreme Networks to deliver a specific
feature.
Extreme Networks Confidential and Proprietary