SlideShare a Scribd company logo
1 of 10
Download to read offline
1 | Infinera Confidential & Proprietary
Network Cost Savings and Service
Differentiation using Priority-driven sub-
50ms Shared Mesh Protection
Soumya Roy (Speaker), Sudhindra A. Kota, Onur Turkcu,
Steven Hand, Krish Verma, Rajan Rao
Infinera Corporation
2 | Infinera Confidential & Proprietary
Resiliency Requirements for Today’s Networks
OpticalNetworksarenowmesh-centric
• Variable performance
• Multiple failure protection
• Recovery via unused
bandwidth lowering cost
Dynamic Re-routing
Optical Cross-Connect Switches
• <50 ms switching
• Protection for 1 failure
• Dedicated protection
bandwidth ($$$$)
1+1 SNCP Protection
DWDM Networks
• Deterministic behavior, within 50
milliseconds
Fast Recovery
• Single failure recovery no longer
sufficient
Multi-failure backups
• Intelligent sharing of backup resources
without losing availability
Network Efficiency
3 | Infinera Confidential & Proprietary
Hardware-accelerated Fast Shared Mesh Protection
Deterministicsub-50msProtection*
• Deterministic behavior, within 50
milliseconds
Fast Recovery
• Single failure recovery no longer
sufficient
Multi-failure backups
• Intelligent sharing of backup resources
without losing availability
Network Efficiency
 Emerging ITU standards
• G.808.3 & G.ODUSMP
 Logical protection paths
• “Virtual” until activated
 Fast activation of protection path
• Hardware acceleration
Provides the advantages of:
 Deterministic, sub-50 ms
performance
 Multiple failure protection
 Shared protection bandwidth for
Better network economics
*W. Wauford et al, ECOC -2013: Novel design of G. ODUSMP to achieve
sub-50 ms performance with shared mesh protection in carrier networks
4 | Infinera Confidential & Proprietary
Shared Mesh Protection (SMP)
MethodOfOperation
Working Path (High Priority Service)
SMP Path (High Priority Service)
SMP Path (Low Priority Service)
Working Path (Low Priority Service)
1. LINK FAILURE
3. SMP PATH
ACTIVATION
2. DATA-PATH
FAILURE
NOTIFICATION
Sharing of Bandwidth
Among Protection Paths
5 | Infinera Confidential & Proprietary
Shared Mesh Protection (SMP)
ServiceDifferentiationwithPre-emption
Working Path (High Priority Service)
SMP Path (High Priority Service)
4. LINK FAILURE
SMP Path (Low Priority Service)
Working Path (Low Priority Service)
1. LINK FAILURE
Sharing of Bandwidth
Among Protect Paths
Msg #7 is only additional message required for pre-emption.
Cross-connect over-ride only, no additional time for protection path activation.
Pre-emption of ‘Extra traffic’ follows same mechanisms.
6 | Infinera Confidential & Proprietary
Simulation Scenario
Objective:EvaluateNetworkCostSavingswithSMPusingServiceDifferentiation
Pan-USA Network
 Traffic Client Rate:
• Mix of 10G, 40G, 100G Clients
• Mix of Data Center, Transcontinental, city-to-city traffic
 50% High Priority and 50% Low Priority Traffic
 100G DWDM with real-world deployment rules
7 | Infinera Confidential & Proprietary
Economics of Deploying Different Protection Schemes
 All SMP mechanisms use significantly lower number of modules compared to 1+1 protection
 With 10% Additional Line Modules compared to zero-protection scenario, strict SLAs are
guaranteed for 50% of traffic (high priority)
% Additional Resources for Different Protection Options
8 | Infinera Confidential & Proprietary
Failure Detection Time and ServiceRecovery Time
 Impacted Demands satisfy sub-50ms
recovery time
 Recovery time does not change with
number of Impacted Demands
*Recovery Time Computed using CSIM integrated with Planning Tool
9 | Infinera Confidential & Proprietary
 Fast Shared Mesh Protection with service priority opens
up new possibilities
• High savings by sharing of resources
• Low cost network while ensuring strict SLAs (sub-50ms recovery) for high
priority traffic only
• Further savings by pre-emption of ‘Extra Traffic’
 Pre-emption of extra traffic/protection traffic has no
impact on recovery time
• Recovery time does not depend on number of impacted demands
• Pre-emption enables protection prioritization in multiple-failure scenarios
Summary
10 | Infinera Confidential & Proprietary
Thank You

More Related Content

What's hot

Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud ComutingKazuhiko Kato
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01Hussein Elmenshawy
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
Reengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighterReengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighterjchapin
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environmentASBIS SK
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 

What's hot (17)

01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
 
Week14
Week14Week14
Week14
 
Cresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPGCresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPG
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Reengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighterReengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighter
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
CIMCO MPLS
CIMCO MPLSCIMCO MPLS
CIMCO MPLS
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 

Viewers also liked

The Benefits and Requirements for a Programmable Transport Layer
The Benefits and Requirements for a Programmable Transport LayerThe Benefits and Requirements for a Programmable Transport Layer
The Benefits and Requirements for a Programmable Transport LayerInfinera
 
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less CostFastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less CostInfinera
 
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefits
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefitsOfc presentation on Impact of Traffic and Connectivity on OTN Switching benefits
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefitsroysoumya
 
Open Transport Switch Enables Network Virtualization
Open Transport Switch Enables Network VirtualizationOpen Transport Switch Enables Network Virtualization
Open Transport Switch Enables Network VirtualizationInfinera
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Anuj Malik
 
Infinera Intelligent Transport Networks
Infinera Intelligent Transport NetworksInfinera Intelligent Transport Networks
Infinera Intelligent Transport NetworksInfinera
 
Evaluating efficiency of multi layer switching in future optical transport ne...
Evaluating efficiency of multi layer switching in future optical transport ne...Evaluating efficiency of multi layer switching in future optical transport ne...
Evaluating efficiency of multi layer switching in future optical transport ne...Anuj Malik
 
Open Transport Switch and Transport SDN
Open Transport Switch and Transport SDNOpen Transport Switch and Transport SDN
Open Transport Switch and Transport SDNInfinera
 
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...Infinera
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingInfinera
 
Transport SDN
Transport SDNTransport SDN
Transport SDNInfinera
 
Traffic Optimization in Multi-Layered WANs using SDN
Traffic Optimization in Multi-Layered WANs using SDN Traffic Optimization in Multi-Layered WANs using SDN
Traffic Optimization in Multi-Layered WANs using SDN Infinera
 
Optimizing Data Center WANs with SDN and Underlay Networking
Optimizing Data Center WANs with SDN and Underlay NetworkingOptimizing Data Center WANs with SDN and Underlay Networking
Optimizing Data Center WANs with SDN and Underlay NetworkingInfinera
 
Transport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesTransport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesInfinera
 
Intelligent Transport Network in the Evolving Content Dominated Marketplace
Intelligent Transport Network in the Evolving Content Dominated MarketplaceIntelligent Transport Network in the Evolving Content Dominated Marketplace
Intelligent Transport Network in the Evolving Content Dominated MarketplaceInfinera
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksInfinera
 
Strategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersStrategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersInfinera
 
OFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching BenefitsOFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching BenefitsInfinera
 
Extending SDN into the Transport Network
Extending SDN into the Transport NetworkExtending SDN into the Transport Network
Extending SDN into the Transport NetworkInfinera
 
Network economics of optical transport networks with sd fec technology
Network economics of optical transport networks with sd fec technologyNetwork economics of optical transport networks with sd fec technology
Network economics of optical transport networks with sd fec technologyAnuj Malik
 

Viewers also liked (20)

The Benefits and Requirements for a Programmable Transport Layer
The Benefits and Requirements for a Programmable Transport LayerThe Benefits and Requirements for a Programmable Transport Layer
The Benefits and Requirements for a Programmable Transport Layer
 
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less CostFastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
 
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefits
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefitsOfc presentation on Impact of Traffic and Connectivity on OTN Switching benefits
Ofc presentation on Impact of Traffic and Connectivity on OTN Switching benefits
 
Open Transport Switch Enables Network Virtualization
Open Transport Switch Enables Network VirtualizationOpen Transport Switch Enables Network Virtualization
Open Transport Switch Enables Network Virtualization
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...
 
Infinera Intelligent Transport Networks
Infinera Intelligent Transport NetworksInfinera Intelligent Transport Networks
Infinera Intelligent Transport Networks
 
Evaluating efficiency of multi layer switching in future optical transport ne...
Evaluating efficiency of multi layer switching in future optical transport ne...Evaluating efficiency of multi layer switching in future optical transport ne...
Evaluating efficiency of multi layer switching in future optical transport ne...
 
Open Transport Switch and Transport SDN
Open Transport Switch and Transport SDNOpen Transport Switch and Transport SDN
Open Transport Switch and Transport SDN
 
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...
Realizing a Multi-Layer Transport SDN: Practical Considerations and Implement...
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center Networking
 
Transport SDN
Transport SDNTransport SDN
Transport SDN
 
Traffic Optimization in Multi-Layered WANs using SDN
Traffic Optimization in Multi-Layered WANs using SDN Traffic Optimization in Multi-Layered WANs using SDN
Traffic Optimization in Multi-Layered WANs using SDN
 
Optimizing Data Center WANs with SDN and Underlay Networking
Optimizing Data Center WANs with SDN and Underlay NetworkingOptimizing Data Center WANs with SDN and Underlay Networking
Optimizing Data Center WANs with SDN and Underlay Networking
 
Transport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry PerspectivesTransport SDN Overview and Standards Update: Industry Perspectives
Transport SDN Overview and Standards Update: Industry Perspectives
 
Intelligent Transport Network in the Evolving Content Dominated Marketplace
Intelligent Transport Network in the Evolving Content Dominated MarketplaceIntelligent Transport Network in the Evolving Content Dominated Marketplace
Intelligent Transport Network in the Evolving Content Dominated Marketplace
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport Networks
 
Strategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centersStrategies to architecting ultra-efficient data centers
Strategies to architecting ultra-efficient data centers
 
OFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching BenefitsOFC 2014: Impact of Traffic and Network on OTN Switching Benefits
OFC 2014: Impact of Traffic and Network on OTN Switching Benefits
 
Extending SDN into the Transport Network
Extending SDN into the Transport NetworkExtending SDN into the Transport Network
Extending SDN into the Transport Network
 
Network economics of optical transport networks with sd fec technology
Network economics of optical transport networks with sd fec technologyNetwork economics of optical transport networks with sd fec technology
Network economics of optical transport networks with sd fec technology
 

Similar to OFC 2014: Fast Network Recovery

Unified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networkingUnified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networkingAnuj Malik
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Alidu Abubakari
 
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...Edge AI and Vision Alliance
 
Capacity and Availability for Maximum Performance
Capacity and Availability for Maximum PerformanceCapacity and Availability for Maximum Performance
Capacity and Availability for Maximum PerformanceDon Talend
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0PHIL110
 
6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architectureCPqD
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology3G4G
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2indonesiabelajar
 
IoT and Smart Grids II
IoT and Smart Grids IIIoT and Smart Grids II
IoT and Smart Grids IIJustin Hayward
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Nir Cohen
 
5G for Reliable Industrial Wireless Networks
5G for Reliable Industrial Wireless Networks5G for Reliable Industrial Wireless Networks
5G for Reliable Industrial Wireless NetworksAUTOWARE
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513Zarobiza
 

Similar to OFC 2014: Fast Network Recovery (20)

Unified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networkingUnified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networking
 
Chapter02
Chapter02Chapter02
Chapter02
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Agile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huaweiAgile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huawei
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
 
Capacity and Availability for Maximum Performance
Capacity and Availability for Maximum PerformanceCapacity and Availability for Maximum Performance
Capacity and Availability for Maximum Performance
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
 
IoT and Smart Grids II
IoT and Smart Grids IIIoT and Smart Grids II
IoT and Smart Grids II
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
 
5G for Reliable Industrial Wireless Networks
5G for Reliable Industrial Wireless Networks5G for Reliable Industrial Wireless Networks
5G for Reliable Industrial Wireless Networks
 
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

OFC 2014: Fast Network Recovery

  • 1. 1 | Infinera Confidential & Proprietary Network Cost Savings and Service Differentiation using Priority-driven sub- 50ms Shared Mesh Protection Soumya Roy (Speaker), Sudhindra A. Kota, Onur Turkcu, Steven Hand, Krish Verma, Rajan Rao Infinera Corporation
  • 2. 2 | Infinera Confidential & Proprietary Resiliency Requirements for Today’s Networks OpticalNetworksarenowmesh-centric • Variable performance • Multiple failure protection • Recovery via unused bandwidth lowering cost Dynamic Re-routing Optical Cross-Connect Switches • <50 ms switching • Protection for 1 failure • Dedicated protection bandwidth ($$$$) 1+1 SNCP Protection DWDM Networks • Deterministic behavior, within 50 milliseconds Fast Recovery • Single failure recovery no longer sufficient Multi-failure backups • Intelligent sharing of backup resources without losing availability Network Efficiency
  • 3. 3 | Infinera Confidential & Proprietary Hardware-accelerated Fast Shared Mesh Protection Deterministicsub-50msProtection* • Deterministic behavior, within 50 milliseconds Fast Recovery • Single failure recovery no longer sufficient Multi-failure backups • Intelligent sharing of backup resources without losing availability Network Efficiency  Emerging ITU standards • G.808.3 & G.ODUSMP  Logical protection paths • “Virtual” until activated  Fast activation of protection path • Hardware acceleration Provides the advantages of:  Deterministic, sub-50 ms performance  Multiple failure protection  Shared protection bandwidth for Better network economics *W. Wauford et al, ECOC -2013: Novel design of G. ODUSMP to achieve sub-50 ms performance with shared mesh protection in carrier networks
  • 4. 4 | Infinera Confidential & Proprietary Shared Mesh Protection (SMP) MethodOfOperation Working Path (High Priority Service) SMP Path (High Priority Service) SMP Path (Low Priority Service) Working Path (Low Priority Service) 1. LINK FAILURE 3. SMP PATH ACTIVATION 2. DATA-PATH FAILURE NOTIFICATION Sharing of Bandwidth Among Protection Paths
  • 5. 5 | Infinera Confidential & Proprietary Shared Mesh Protection (SMP) ServiceDifferentiationwithPre-emption Working Path (High Priority Service) SMP Path (High Priority Service) 4. LINK FAILURE SMP Path (Low Priority Service) Working Path (Low Priority Service) 1. LINK FAILURE Sharing of Bandwidth Among Protect Paths Msg #7 is only additional message required for pre-emption. Cross-connect over-ride only, no additional time for protection path activation. Pre-emption of ‘Extra traffic’ follows same mechanisms.
  • 6. 6 | Infinera Confidential & Proprietary Simulation Scenario Objective:EvaluateNetworkCostSavingswithSMPusingServiceDifferentiation Pan-USA Network  Traffic Client Rate: • Mix of 10G, 40G, 100G Clients • Mix of Data Center, Transcontinental, city-to-city traffic  50% High Priority and 50% Low Priority Traffic  100G DWDM with real-world deployment rules
  • 7. 7 | Infinera Confidential & Proprietary Economics of Deploying Different Protection Schemes  All SMP mechanisms use significantly lower number of modules compared to 1+1 protection  With 10% Additional Line Modules compared to zero-protection scenario, strict SLAs are guaranteed for 50% of traffic (high priority) % Additional Resources for Different Protection Options
  • 8. 8 | Infinera Confidential & Proprietary Failure Detection Time and ServiceRecovery Time  Impacted Demands satisfy sub-50ms recovery time  Recovery time does not change with number of Impacted Demands *Recovery Time Computed using CSIM integrated with Planning Tool
  • 9. 9 | Infinera Confidential & Proprietary  Fast Shared Mesh Protection with service priority opens up new possibilities • High savings by sharing of resources • Low cost network while ensuring strict SLAs (sub-50ms recovery) for high priority traffic only • Further savings by pre-emption of ‘Extra Traffic’  Pre-emption of extra traffic/protection traffic has no impact on recovery time • Recovery time does not depend on number of impacted demands • Pre-emption enables protection prioritization in multiple-failure scenarios Summary
  • 10. 10 | Infinera Confidential & Proprietary Thank You