Cisco vnp workshop 16-17 april v1-0

4,412 views
4,236 views

Published on

Cisco vnp workshop 16-17 april v1-0

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,412
On SlideShare
0
From Embeds
0
Number of Embeds
54
Actions
Shares
0
Downloads
259
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Cisco vnp workshop 16-17 april v1-0

  1. 1. IP/MPLS Network for Mobile Operators Truong Le (truole@cisco.com) 16 - 17 April 2013 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  2. 2. • Introduction to IP NGN • Introduction to Mobile Packet Core • Introduction to IP RAN • Networking Industry Organizations and Standards that Support Network Operations • Q&A © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  3. 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  4. 4. Traditional Service Provider Networks and Services © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  5. 5. Ticketing NMS SCPs NOC STPs STPs STPs SS7 TDM Signaling Network STPs Class 5 Switch Class 5 Switch Class 4 / Tandem Class 5 Switch Bearer Network Components Subscribers © 2013 Cisco and/or its affiliates. All rights reserved. Class 4 / Tandem Class 5 Switch Circuit-Switched TDM Network Signaling Network Components Class 4/5 Switch STP SCP Cisco Confidential 5
  6. 6. Digital T1/E1/DDS Transport Services DDS DSU DDS DSU Terminal T3/E3/Sonet/SDH Central Mainframe / FEP CSU T1/E1 T1/E1 MUXs CSU MUXs T1/E1 Ticketing NMS Terminals Modem ISDN Services NOC Analog Leased Lines and Dial-up (switched) PSTN Switches Modem Data Network Access/Transport Components CSU/DSU © 2013 Cisco and/or its affiliates. All rights reserved. Modem MUX (cross connects) Terminal Digital Data (I/O) Components FEP Terminals PBX Cisco Confidential 6
  7. 7. Ticketing NMS Ticketing NOC NMS DTE LCNs DTE PC X.25 Switch NOC VPIs/VCIs DTE X.25 Switch X.25 Networks DTE Ticketing FR Switch FR Switch Frame Relay Networks PC NMS NOC DTE DTE ATM Switch ATM Switch ATM Networks © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  8. 8. SS7 TDM Signaling Network SCPs MSC STPs Ticketing STPs NMS BS NOC Class 5 Switch MSC BS Ticketing NMS Cellular Access Network © 2013 Cisco and/or its affiliates. All rights reserved. BS Switch NOC Cellular Network Components Subscribers Circuit-Switched TDM Network Class 5 MSC PSTN Network Components Class 4/5 Switch STP SCP Cisco Confidential 8
  9. 9. Video Subscribers Remote Head End Office Head End COAX Network CMTS (Docsis) Fiber Network Ticketing NMS NOC CMTS © 2013 Cisco and/or its affiliates. All rights reserved. COAX Network Video Subscribers Cisco Confidential 9
  10. 10. LAN LAN Ethernet Interfaces HDLC, PPP, FR, X.25, ATM Serial Interface Ticketing NMS WAN NOC WAN Service Adapters: DSU, CSU, PAD, TA L2 HUB L2 Switch © 2013 Cisco and/or its affiliates. All rights reserved. L3 Router Cisco Confidential 10
  11. 11. Broadband Access Services Internet Access Services DNS Browsing Email Ticketing Analog NMS NOC DSL HFC DOCSIS Transport Services CPE Modems Access Gateway © 2013 Cisco and/or its affiliates. All rights reserved. DSL Gateway Broadband Router Core Router TDM Switches Optical Switches ATM Switches Cisco Confidential 11
  12. 12. QoS-Enabled IP Networks H323 Voice Network Gatekeeper Ticketing RAS Signaling NMS H323 Gateway IP Network Ticketing NMS NOC SIP Signaling NOC RTP Voice IP Network Cisco Unified Communications Voice Network SIP/Skinny Signaling RTP Voice Ticketing SIP Voice Network IP Network NMS NOC RTP Voice H323 Voice Gateway H323 Gatekeeper © 2013 Cisco and/or its affiliates. All rights reserved. IP PBX IP Phone (Call Manager) IP Telephony Router SIP Enabled Devices SIP ATA SIP Servers Cisco Confidential 12
  13. 13. Era of Evolution Era of Divergence Data Voice Era of Convergence Converged Network (NGN) Video Time © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  14. 14. • The revolution began with the recognition that the divergence era is unsupportable: • Duplication of infrastructure • Duplication of support (NOC) • During this period, traffic types and characteristics have been examined and new solutions to the divergence problem have evolved: • DQDB • SMDS • ATM • IP (with QoS) • IP is generally accepted as the network-convergence technique of choice. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  15. 15. Next Generation Networks Defined © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  16. 16. New multimedia services APPLICATION CONVERGENCE Integrated data, voice, and video Increased revenue Customer loyalty Explosion of Internet traffic SERVICE CONTROL CONVERGENCE New business models Service continuity More effective network management Single infrastructure Cutting-edge technology NETWORK CONVERGENCE Scalability and faster rollout Higher resiliency Reduce OpEx/CapEx © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  17. 17. • Multiple Interworked Networks: • Converged Core: Mostly connectionless Often connection oriented IP/MPLS aware end-to-end End-to-end provisioning Reduced provision replication Scalability issues Highly scalable CapEx intensive More CapEx and OpEx efficient Less OpEx efficient Ethernet MPLS ATM TDM Core Frame Relay Internet DSL Access © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  18. 18. An NGN is: • A packet-based network able to provide telecommunication services, and able to make use of multiple broadband and QoS-enabled transport technologies, in which service-related functions are independent from underlying transport-related technologies. • The NGN offers unfettered access for users to networks and to competing service providers and/or services of their choice and supports generalized mobility that will allow consistent and ubiquitous provision of services to users. • Characteristics: NGN is an IP-based network NGN enables any IP access from mobile, home, and/or enterprise domains NGN enables service mobility NGN enables interworking toward circuit-switched voice NGN maintains service operator control Source: ITU (http://www.itu.int/ITU-T/studygroups/com13/ngn2004/working_definition.html) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  19. 19. • ITU-T NGN FG: International Telecommunication Union (Telecom), Next Generation Networks Focus Group • ATIS NGN FG: Alliance for Telecommunications Industry Solutions, Next Generation Networks Focus Group North American-based body that is committed to developing and promoting technical and operations standards for the telecommunications industry worldwide, using a flexible and open approach • ETSI TISPAN: European Telecommunications Standards Institute, Telecoms & Internet converged Services & Protocols for Advanced Networks ETSI is an independent, nonprofit organization whose mission is to produce telecommunications standards for today and for the future. • 3GPP: Third Generation Partnership Project 3GPP created the IP Multimedia Subsystem (IMS). © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  20. 20. ETSI TISPAN Fixed Access to IMS 3GPP CableLabs WiMAX Forum IMS Cable Access to IMS Broadband Wireless Access to IMS 3GPP 3GPP2 Mobile Access to IMS © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  21. 21. Cellular IMS Services (SIP MM) DSL Service Provider Network Fixed Wireless Internet (Web, P2P) Cable Enterprise © 2013 Cisco and/or its affiliates. All rights reserved. 3rd Party Hosted Apps Cisco Confidential 21
  22. 22. NGN: Integrated Access, Video, and Mobility Services © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  23. 23. Core Aggregation Access © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  24. 24. Portal Monitoring Billing Subscriber Address Identity Data Mgmt Policy Mgmt STB Residential DSLAM BRAS Business MPLS Core Residential Aggregation CMTS HFC Internet Peering Points Access STB © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  25. 25. Portal Monitoring Billing Video Switching Office Subscriber Address Identity Data Mgmt Policy Mgmt Video Headend Office TV Super Head End VoD Servers DSLAM TV Streamer Content Acquirer Cable/DSL Fiber Transport MPLS Core Vault Mobile Wireless Metro E/ FTTx) Internet Streamer Aggregation Distribution Edge Routers Internet Peering Points PC © 2013 Cisco and/or its affiliates. All rights reserved. Access Cisco Confidential 25
  26. 26. Portal Monitoring Billing SS7 Residential Services Subscriber Address Identity Data Mgmt Policy Mgmt External Service Provider Networks Femto RAN Aggregation Broadband Wireless Laptop UMTS / HSPA Applications Partners MPLS Core WiMAX Base station Broadband Wireless Mobile Aggregation SMB / Enterprise Services Wi-Fi Hotspots / Mesh © 2013 Cisco and/or its affiliates. All rights reserved. Border Routing / SBC Internet Peering Points Access Cisco Confidential 26
  27. 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  28. 28. Home Location Service Control Register (HLR) Point (SCP) There was wireless ISDN (aka GSM) Mobile Station Base Transceiver System (BTS) Base Station Controller (BSC) Mobile Switching Center + Visitor Location Register (MSC/VLR) • Voice oriented architecture • Re-define fixed wireline services (e.g. SS and IN) • SMS is a signalling transport rather than a data service • Network transport based on TDM © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  29. 29. • One burst of every TDMA frame was sufficient to transport a speech frame with source rate of 13 kbit/s • GSM Phase 2 (circa 1996) added Circuit Switched Data support offering 9.6 kbit/s service • High Speed CSD consisted in aggregating multiple timeslot for a single user but resource intensive Modem Interworking Function (IWF) Modified V.110 3.1 kHz audio or V110 64k UDI BSC © 2013 Cisco and/or its affiliates. All rights reserved. MSC Cisco Confidential 29
  30. 30. BTS BSC Gateway MSC MSC/VLR IP Packet Control Unit (PCU) © 2013 Cisco and/or its affiliates. All rights reserved. Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) Cisco Confidential 30
  31. 31. BTS Gateway MSC MSC/VLR BSC IP Packet Control Unit (PCU) Gateway GPRS Support Node (GGSN) Serving GPRS Support Node (SGSN) IP IP Relay SNDCP SNDCP LLC RLC MAC GSM Radio © 2013 Cisco and/or its affiliates. All rights reserved. GTP LLC Relay GTP UDP UDP RLC Relay GSM Radio 64 kbps BSSGP BSSGP IP IP MAC Nw Services Nw Services L2 L2 L1bis L1bis 64 kbps L1 L1 Cisco Confidential 31
  32. 32. • Round Trip Times 700ms and 1000ms • Packet transfer interruption times between 2 and 8 seconds following a cell reselection and between 8s and 20s when the cell reselection triggers a routing area update • Application throughput up to 40 kbps using a handset capable of receiving 4 timeslots  Unable to reliably transport real time IP traffic © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  33. 33. • First step towards an all IP network • New radio designed to accommodate greater packet throughput (up to 2Mbits/s initially… In reality, can support up to 384 kbit/s) • Core network remains largely unchanged from 2.5G • Migration to ATM for Radio Access Transport • More control into the RNC 3G MSC PSTN ATM/AAL2 ATM/AAL5 3G RNC Node B IP 3G SGSN © 2013 Cisco and/or its affiliates. All rights reserved. GGSN Cisco Confidential 33
  34. 34. Iu-ps NodeB Radio Network Controller (RNC) Gn/Gp 3G SGSN GGSN IP IP PDCP PDCP GTP-U GTP-U GTP-U GTP-U RLC RLC UDP UDP UDP UDP Frame Protocol MAC IP IP IP IP AAL2 AAL2 AAL5 AAL5 L2 L2 ATM ATM ATM ATM L1 L1 MAC WCDMA Radio © 2013 Cisco and/or its affiliates. All rights reserved. WCDM A Radio Cisco Confidential 34
  35. 35. HLR MSC-s MSC-s Iu-cs IP MGW MGW • Still Voice over CS bearer on the radio access, data bearer not suitable (latency, overhead) • Option to transport Voice over IP in the Core (see TS 23.205) • Introduction of SS7oIP transport © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  36. 36. HLR MSC-s MSC-s Iu-cs IP RTP Iu-UP IP INAP H.248 TCAP SCCP UDP AAL2 BICC or SIP-T Nb-UP ATM L1/2 MAP MGW MGW M3UA SCTP IP L1/2 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  37. 37. Iu-ps Gn Drift RNC Serving RNC Node B 3G SGSN IP GGSN IP PDCP PDCP GTP-U GTP-U GTP-U GTP-U RLC RLC UDP UDP UDP UDP MAC MAC IP IP IP IP AAL5/ATM L2 L2 L1 L1 MACHS WCDMA © 2013 Cisco and/or its affiliates. All rights reserved. MACHS Frame Protocol FP FP AAL2/ATM AAL 2 AAL 2 L1 L1 WCDMA L1 Frame Protocol AAL2/ATM AAL5/ATM L1 L1 L1 Cisco Confidential 37
  38. 38. HSDPA Removes Drift RNC and adds intelligence to the Node B Iu-ps Node B Serving RNC Gn 3G SGSN IP GGSN IP PDCP PDCP RLC RLC MAC MAC MACHS WCDMA © 2013 Cisco and/or its affiliates. All rights reserved. MACHS Frame Protocol AAL2/ATM WCDMA L1 Frame Protocol GTPU UDP IP AAL2/ATM AAL5/ATM L1 L1 GTPU UDP GTPU UDP GTP-U IP IP IP AAL5/ATM L2 L2 L1 L1 L1 UDP Cisco Confidential 38
  39. 39. Iu-ps Node B Serving RNC IP PDCP Gn 3G SGSN GGSN IP Direct Tunnel allows SGSN to remove itself from data plane PDCP GTP-U GTP-U RLC RLC UDP UDP MAC MAC IP IP MACHS WCDMA © 2013 Cisco and/or its affiliates. All rights reserved. MACHS Frame Protocol AAL2/ATM WCDMA L1 Frame Protocol AAL2/ATM AAL5/ATM L1 L1 L2 L1 Cisco Confidential 39
  40. 40. HSPA+: Distribute RNC Data plane to Node B Iu-ps Serving RNC Node B IP Gn 3G SGSN GGSN IP PDCP PDCP GTP-U GTP-U RLC RLC UDP UDP MAC MAC IP IP MACHS MACHS L2 L2 WCDMA WCDMA L1 L1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
  41. 41. 3GPP R6 3GPP Direct Tunnel RNC NodeB 3G SGSN GGSN SGSN-S RNC NodeB GGSN MME 3GPP LTE/EPC eNodeB © 2013 Cisco and/or its affiliates. All rights reserved. SGW PGW Cisco Confidential 41
  42. 42. Highlighting the growing importance of IP transport 3G MSC-S HLR/HSS PSTN SGW IP RAN w/ ATM PW or Native IP 3G MGW Core IP 3G RNC Node B 3G SGSN © 2013 Cisco and/or its affiliates. All rights reserved. GGSN Cisco Confidential 42
  43. 43. • Evolved Packet System (EPS) is the technology direction for 3GPP based networks • Long Term Evolution (LTE) is the next generation 3GPP radio access network Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) • System Architecture Evolution (SAE) is the 3GPP next generation standard for mobile networks providing: Increased Bandwidth End-to-End IP Simplified Architecture Support for multiple radio access technologies • Evolved Packet Core (EPC) is the next generation 3GPP packet core Consists of (3) main components (MME, SGW, and PGW) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  44. 44. CS Network GERAN UTRAN E-UTRAN (LTE) Evolved Packet Core (EPC) IP Services / Internet Non-3GPP Access EPS = Evolved Packet System LTE (Long Term Evolution) is the 3GPP WI that defined the E-UTRAN SAE (System Architecture Evolution) is the 3GPP WI that defined the EPC © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  45. 45. • Radio Side (Evolved UTRAN - EUTRAN) Improvements in spectral efficiency, user throughput, latency Simplification of the radio network Efficient support of packet based services: Multicast, VoIP, etc. ) • Network Side (Evolved Packet Core - EPC Improvement in latency, capacity, throughput, idle to active transitions Simplification of the core network Optimization for IP traffic and services Simplified support and handover to non-3GPP access technologies © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  46. 46. • Higher Bandwidth (>100 kbps per user on average) and improved latency Transmission and transition delays <10 & 100ms resp. in unloaded conditions • Service independent and data-only architecture Strict data QoS mechanism with no voice dedicated bearer identifictaion • Always-on model All registered users have a default bearer established used for signalling • IP addressing IPv6 by default with dual stack sessions (IPv4v6) • Support of alternative access technologies 3GPP and non-3GPP architecture, including possible wireline access Local breakout Part of the traffic may be routed directly in the visited network © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  47. 47. Next Generatio n Cell Site Mobility Control Node PDN interconne ct Destination Network Mobility Anchor © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  48. 48. RNC SGSN GGSN PDN/ Internet NodeB RNC MME PGW eNodeB PDN/ Internet SGW • From hierarchical architecture to flat IP topology Open to centralized or distributed deployments • RNC functions distributed between the eNB and the EPC © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  49. 49. • SGSN  MME + Serving GW In the LTE architecture the SGSN functionality is split into MME & Serving GW MME = Control Plane of SGSN Serving GW = Data Plane of SGSN • GGSN  PDN GW The PDN GW has similar function as the GGSN IP Anchor Policy Enforcement Accounting/Charging Deep Packet Inspection © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  50. 50. HSS MME PCRF S1-MME UE eNodeB S-GW Evolved UTRAN (E-UTRAN) NAS PDN-GW Evolved Packet Core (EPC) NAS S1-MME RRC RRC S1-AP PDCP PDCP SCTP RLC RLC IP IP MAC MAC L2 L2 OFDMA OFDMA L1 L1 © 2013 Cisco and/or its affiliates. All rights reserved. S1-AP 36.413 SCTP Cisco Confidential 50
  51. 51. HSS PCRF MME S1-U S5/S8 UE eNodeB Evolved Packet Core (EPC) Evolved UTRAN (E-UTRAN) IP (user) PDCP PDN-GW S-GW S5/S8 S1-U PDCP GTP-U GTP-U GTP-U PMIP 36.414 RLC RLC MAC MAC OFDMA OFDMA GRE PMIP 29.274 (GTP) 29.275 (PMIPv6) GTP-U UDP GRE UDP UDP IP © 2013 Cisco and/or its affiliates. All rights reserved. UDP IP (user) IP IP L2 L2 L2 L2 L1 L1 L1 L1 IP Cisco Confidential 51
  52. 52. HSS PCRF MME X2 UE eNodeB Evolved Packet Core (EPC) Evolved UTRAN (E-UTRAN) X2-AP X2-AP GTP-U SCTP SCTP UDP X2-C IP L2 L1 © 2013 Cisco and/or its affiliates. All rights reserved. GTP-U UDP X2-U IP 36.423 PDN-GW S-GW IP L2 L2 L1 L1 IP 36.424 L2 L1 Cisco Confidential 52
  53. 53. HSS PCRF MME S6a Gx UE eNodeB Evolved UTRAN (E-UTRAN) DIAMETER Evolved Packet Core (EPC) DIAMETER DIAMETER SCTP SCTP SCTP S6a IP © 2013 Cisco and/or its affiliates. All rights reserved. SCTP IP L2 L2 IP L2 29.212 29.272 L1 DIAMETER Gx IP L2 PDN-GW S-GW L1 L1 L1 Cisco Confidential 53
  54. 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
  55. 55. “ Source: www.cisco.com – “Migration to All IP RAN Transport” White Paper © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
  56. 56. Radio Towers RAN Backhaul Network Radio Controller Radio Access Network © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
  57. 57. 78% CAGR 2011–2016 10.8 EB per mo 4.2 EB per mo 1.3 EB per mo 2.4 EB per mo Source: Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast, 2011–2016 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
  58. 58. RAN Architectures Concepts & Evolution © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
  59. 59. Air interface RAN Edge RAN Core IP/MPLS and TDM core BSC MSC T1/E1 BTS G-MSC PSTN ADM SONET SDH BSC T1/E1 BTS ADM Cell site © 2013 Cisco and/or its affiliates. All rights reserved. Aggregation site Core site Cisco Confidential 59
  60. 60. Air interface RAN Edge RAN Core IP/MPLS and TDM core BSC MSC T1/E1 BTS G-MSC PSTN ADM SONET SDH Frame Relay BSC IP/MPLS T1/E1 BTS SGSN GGSN ADM Cell site © 2013 Cisco and/or its affiliates. All rights reserved. Internet Aggregation site Core site Cisco Confidential 60
  61. 61. Air interface RAN Edge RAN Core IP/MPLS and TDM core BSC MGW T1/E1 BTS G-MSC PSTN ADM nxE1 STM1 /OC3 Node B MSC SONET SDH RNC ATM BSC IP/MPLS T1/E1 BTS ADM Node B Cell site © 2013 Cisco and/or its affiliates. All rights reserved. SGSN GGSN nxE1 Internet STM1 /OC3 RNC Aggregation site Core site Cisco Confidential 61
  62. 62. Air interface RAN Edge RAN Core IP/MPLS and TDM core BSC MGW T1/E1 BTS G-MSC PSTN ADM nxE1 STM1 /OC3 Node B MSC SONET SDH RNC ATMoMPLS BSC IP/MPLS T1/E1 BTS ADM Node B nxE1 STM1 /OC3 SGSN GGSN Internet RNC ATMoMPLS – 3G voice and data TDMoMPLS – 2G voice and data Cell site © 2013 Cisco and/or its affiliates. All rights reserved. Aggregation site Core site Cisco Confidential 62
  63. 63. Air interface RAN Edge RAN Core IP/MPLS and TDM core BSC MSS MGW T1/E1 MGW PSTN BTS G-MSC RNC Node B ATMoMPLS Pseudo wire BSC IP/MPLS T1/E1 BTS Node B SGSN GGSN Internet RNC ATMoMPLS – 3G voice and data TDMoMPLS – 2G voice and data Cell site © 2013 Cisco and/or its affiliates. All rights reserved. Aggregation site Core site Cisco Confidential 63
  64. 64. Mobile Backhaul © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
  65. 65. • Common & Cheap Transport • Generation & Service Independent • Traffic Type Awareness & Prioritization (QoS) • Scalability (GE, 10GE, etc.) • Service Resiliency • Clock Distribution Mechanism • Large Scale Provisioning & Visibility • Interface Support (Legacy, Current, & Future) • Security © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
  66. 66. Converged Customer Premise Cell Site Mobile Provider Managed MTSO / MSC Mobile POP Central Offices Wireline Telco Managed Mobile Provider Managed 2G BTS Carrier Ethernet IP/ MPLS Transport TDM T1 / E1 CPE U-PE Access ATM T1/E1 3G Aggregation Node Aggregation Node U-PE Access MTSO Aggregation 2G BSC CH-OCn Distribution Node OCn ATM 3G RNC Ethernet Ethernet NodeB CE Transport Access Options: Ethernet / IP Ethernet, EoCu, EoTDM Cell-Site Hut TDM ATM © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
  67. 67. Mobile Edge Access Aggregation Edge Gateway / Policy GGSN/PDSN CSG2 Clock Source CH T1/E1 TDM PWE - Clock NodeB ATM / TDM PWE NodeB ATM 2G BSC CHOC3-TDM Ethernet MWR 7600 CHOC3-ATM 7600 7600 7600 3G RNC CH T1/E1 NodeB ATM / TDM PWE NodeB ATM VCx ATM VCx ATM ONS 15454 © 2013 Cisco and/or its affiliates. All rights reserved. MSTP/MSPP Cisco Confidential 67
  68. 68. • Service Provider Best practices for box-level security: Management plane hardening (lock-down VTYs, disable unused services, telnet/SSH, AAA, Netflow, NTP, password management, etc.). Control plane & data plane hardening (disable unused services under interfaces, ICMP, Proxy ARP, etc.) • Protection from cell-site router hijack IP/MAC ACLs on aggregation routers Control Plane Policing, hardware-based Rate-limiter on aggregation routers • Eavesdropping 3GPP has recommended using IPSEC security for signaling © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
  69. 69. • Latency –time taken for a packet to reach its destination • Jitter –change in inter-packet latency within a stream over time i.e. variation of latency • Packet loss –measure of packet loss between a source and destination • QoS provides: Congestion Avoidance Congestion Management • Prioritize critical traffic over best-effort • Signaling and Clocking <-> Voice <-> Real-time <-> Data © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
  70. 70. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
  71. 71. ITIL® eTOM FCAPS © 2013 Cisco and/or its affiliates. All rights reserved. IT Infrastructure Library Enhanced Telecom Operations Map Fault, Configuration, Accounting, Performance, and Security Cisco Confidential 71
  72. 72. FCAPS Functions and Purpose © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
  73. 73. Standards body ITU (http://www.itu.int) Active since 1865 (as CCITT; reorganized as ITU-T in 1993) 189 states Members 640+ sector members (service providers, research, regulators) 92 associates (vendors, consulting) Focus Main deliverables © 2013 Cisco and/or its affiliates. All rights reserved. High-quality standards and recommendations covering multiple aspects of telecommunications 1997–04 TMN functions (FCAPS) (M.3400) Large number of management recommendations by Study Group 4 (http://www.itu.int/ITU-T/studygroups) Cisco Confidential 73
  74. 74. Management Functional Areas (MFAs) Management Function Set Groups Fault Quality assurance, alarm surveillance, fault localization, fault correction, testing, trouble administration Configuration Network Planning and engineering, installation, service planning and negotiation, provisioning, status and control Accounting Tariffing/pricing, usage measurement, collections and finance, and enterprise control Performance Quality assurance, performance monitoring, performance control, and performance analysis Security Prevention, detection, containment and recovery, and security administration © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
  75. 75. BML F C A P S SML Customers, services, other service providers, and vendors NML Network, nodes, links, and end-toend management EML NEL © 2013 Cisco and/or its affiliates. All rights reserved. Business knowledge, people, goals, and policies Control of a subset of network elements Network elements and other resources Cisco Confidential 75
  76. 76. ITIL and Service Management © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
  77. 77. • Information Technology Infrastructure Library or IT Infrastructure Library Developed by UK government, now owned by Office of Govt. Commerce (OGC) Framework (concepts and policies) applicable to improving network management practices Infrastructure management Development Operations • ITIL is published in a series of books, each on an IT management practice • Other frameworks exist—Enterprise Computing Institute’s library, Framework for ICT Technical Support (FITS), IBM Tivoli Unified Process Model (ITUP), COBIT, etc. • With increased focus on application availability and performance and the Network Operation Center (NOC) transitioning to an Integrated Operations Center (IOC), ITIL provides an applicable framework © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
  78. 78. ITIL v1 • Collection of books each covering a specific practice in service management • Grew to over 30 volumes, unmanageable and unaffordable ITIL v2 • First two of eight books for service management Service Delivery Service Support • Five books for operational guidance and an implementation planner • Ninth book added for ITIL Small-Scale Implementation © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
  79. 79. • ITIL v3 (current) consists of five volumes AKA ITIL Refresh Project Desig n Five phases of a life cycle • Some vocabulary is critical, most has morphed as people wrote books, provided training, etc. tion Opera No phase (practice) can stand alone Service Strategy ion sit ran T Will emphasize areas where proper usage is critical © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
  80. 80. • Services—way to deliver value to customers by achieving outcomes they want without ownership of costs and risks Dry cleaning, Internet services, car wash, hair salon • Service management—set of specialized organizational capabilities for providing services Function—teams or groups of people and their tools to perform a process or activity Roles—responsibilities defined in a process and assigned to a person or team Process—structured set of activities designed to meet a specific objective Process owner—accountable for quality of a service Service owner—accountable for delivery of a service © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
  81. 81. • Most projects fail because of lack of planning and management… • … and management sometimes forgets that it is people who run businesses © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
  82. 82. Five Practices (Phases) with Processes as Second Priority Desi gn tion Opera Service Strategy ion sit an Tr © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
  83. 83. • An official introduction and five books, each a core phase Service strategy Service design Service transition Service operation Service continual improvement • Every service goes through all five phases during its lifecycle New (initial launch) Additions (enhancements) Deletions (sunset) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
  84. 84. Enhanced Telecom Operations Map (eTOM) © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
  85. 85. • Developed as part of the NGOSS program from the TeleManagement™ Forum • Provides a business process (i.e., ITIL functions) framework to guide the development and management of key processes for a telecom services provider • Offers a catalog of industry-standard names and descriptions • Started as TOM in 1995, focused on just operational process needs • Added strategic, marketing, and product lifecycle planning as part of eTOM • Aid the end-to-end automation of information and communications services using the holistic eTOM process framework © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
  86. 86. (Process Layering vs. Lifecycle View) Desi gn tion Opera Service Strategy ion sit an Tr © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
  87. 87. eTOM ITIL Context Business process framework for SPs (product providers), in the information, communications, and entertainment sectors. Products (services) to their customers, consumer internally of ITIL services Concentrates on IT service mgmt, independent of the business or industry sector Objectives Provides a business process blueprint for SPs to streamline their end-to-end processes Enables effective communications and common vocabularies within the SP and with customers and supplier Aligns IT services with current and future needs of business and customer Improves the quality of IT services delivered Reduces long-term cost of service provision Scope Provides a top-down hierarchical view of business processes across the SP Focuses on identifying commonality among processes for similar services (e.g., telephony, HSD, mobiles) Focuses on service delivery to external customers Represents flows in a number of key operational areas Offers advice/guidance on the implementation and continued delivery of service management Focuses on serving internal IT customers and external customers © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
  88. 88. eTOM ITIL Adoption Adopted by ITU International Standards for the Telecom Sector and used by many SPs Used as a set of best practices by over 10,000 companies including some SPs Used by many SPs for incident management and service desks Implementation Implemented differently by each SP as it is a framework Supported by TMF/NGOSS specifications Also a framework Provides implementation guidelines in v3 as earlier versions did not provide guidelines or ways to assess maturity Compliance Achieved through the TMF/NGOSS Compliance Program with certification on tools, not on organizations and processes No such thing as “ITIL compliant” as ITIL is not a standard nor a set of regulations. Processes and organizations, not tools, can be assessed and certified against ISO/BS 15000, the IT Service Management Standard based on ITIL. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
  89. 89. • TMF/eTOM team formed in mid-2004 to develop guidelines to relate the two programs Provide information on mapping from one view to the other Focus initially on the ITIL incident management area Published a TMF Technical Report, An Interpreter’s Guide for eTOM and ITIL Practitioners Terminology comparisons Mapping between processes Business benefits of a combined approach Published TMF TR 143, Building Bridges: ITIL and eTOM (August 2008) • SPs able to show compliance with ITIL without using the ITIL processes • Frameworks are complementary © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
  90. 90. • ITIL moved from government support to IT Service Management Forum (ITSMF) Push to formalize ITIL from its current set of loose and sometimes inconsistent verbal definitions Drive for convergence with the TMF NGOSS community Projected in 2005 that ITIL would be more consistent, formal, and better fitted to support operational management technologies in a year (changes did not happen) • Reality is that some knowledge of eTOM is likely required to talk with SPs You will see ITIL processes for service operation ITIL processes will be mapped within eTOM SPs will be conversant in eTOM ITIL is NOT just for enterprise © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
  91. 91. • The best mix of both! © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
  92. 92. SP Business Process Needs Strategy, Infrastructure & Product Strategy & Commit Infrastructure Lifecycle Mgmt IT Good Practice Needs Operations Product Lifecycle Mgmt Operations Support & Readiness Marketing & Offer Management Fulfillment Assurance Billing Customer Relationship Management Service Development & Management Strategy, Infrastructure & Product Desig n Service Management & Operations Resource Management & Operations (Application, Computing & Network) Supply Chain Development & Management Supplier/Partner Relationship Management tion Opera Resource Development & Management (Application, Computing and Network) n itio ns Tra Enterprise Management Strategic & Enterprise Planning Enterprise Risk Management Financial & Asset Management Enterprise Effectiveness Management Stakeholder & External Relations Management Service Strategy Knowledge & Research Management Human Resources Management eTOM Process Flows eTOM Business Flows that Deliver ITIL Good Practice Services ITIL Best Practices Filter & Reconcile © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
  93. 93. • Improved time to resolve through cause identification • Productivity improvement for fault diagnosis • Improved visibility in real time • Proactively manage impact to the business (IT calls the business) • Event management process and systems can be leveraged for security management • A recent study of 200+ Cisco customers showed that fault management was important © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
  94. 94. How important are the following network management capabilities? Using a scale from 1 to 5, where 1=unimportant and 5=very important. % Saying Very Important 74% 79% Security and risk management 63% 54% Fault detection/root cause analysis 61% 54% Performance management Network optimization/capacity planning Ability to manage multi-vendor network hardware Configuration management Traffic bottleneck analysis Inventory and asset management Enterprise Mid-market 57% 52% Base: All Enterprise/Midmarket respondents (n=275) 56% 47% 55% 41% 54% 54% 52% 49% Source: Cisco NMTG Market Intelligence and Enterprise Management Associates © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
  95. 95. Which are the three most time consuming network management tasks within your organization? % Saying in Top 3 Enterprise Mid-market Most Time Consuming Tasks Diagnosis/troubleshooting fault problems 50% 48% 47% Diagnosis/troubleshooting traffic congestion Diagnosis/troubleshooting security problems 42% 26% 27% Capacity planning Learning to use new mgmt software 21% Controlling user access 21% Maintaining usernames & passwords Base: All Enterprise respondents (n=185) 0% 48% 35% 34% Updating new devices w/ new OS & new config parameters Adding new devices 63% 13% 34% 31% 18% 16% 19% 10% 20% 30% 40% 50% 60% 70% Source: Cisco NMTG Market Intelligence and Enterprise Management Associates © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
  96. 96. Common SP Organizational Structures © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
  97. 97. SP Network Organization Architecture Engineering Network Operations Network Engineering Solution Designers (Presales) Support Engineers Tier 1 Infrastructure Architects Architecture © 2013 Cisco and/or its affiliates. All rights reserved. Tier 2/3 NOC Engineering Implementation Engineers Network Cisco Confidential 97
  98. 98. • The organization can be broadly broken down into three areas of responsibility: Architecture Network Network Operations Security Engineer Implementation Engineer Field Engineer Network Management Engineer NOC Support Technician Tier 2 NOC Support Engineer Tier 2 NOC Support Engineer Technology Specialist Advanced NOC Support Engineer Tier 3 Solution Design Engineer Infrastructure Architect Capacity Planning Engineer 98 Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. Network Engineering Network Operations Architecture Engineering
  99. 99. Network Management Engineer NOC Support Technician – Tier 1 NOC Support Engineer – Tier 2 NOC Support Engineer – Technology Specialist Advanced NOC Support Engineer – Tier 3 Architecture Engineering Network Engineering Security Engineer Implementation Engineer Field Engineer Network Management Engineer NOC Support Technician Tier 2 NOC Support Engineer Tier 2 NOC Support Engineer Technology Specialist Advanced NOC Support Engineer Tier 3 Solution Design Engineer Infrastructure Architect Capacity Planning Engineer © 2013 Cisco and/or its affiliates. All rights reserved. Network Operations Cisco Confidential 99
  100. 100. Solution Design Engineer Security Engineer Infrastructure Architect Implementation Engineer Capacity Planning Engineer Field Engineer Security Engineer Implementation Engineer Field Engineer Network Management Engineer NOC Support Technician Tier 2 NOC Support Engineer Tier 2 NOC Support Engineer Technology Specialist Advanced NOC Support Engineer Tier 3 Solution Design Engineer Infrastructure Architect Capacity Planning Engineer 100 Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. Network Engineering Network Operations Architecture Engineering
  101. 101. Thank you.

×