Packet Data Evolution


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Packet Data Evolution

  1. 1. Packet Data Evolution S. Wood Nov. 2006 Copyright 2006 Modern Systems Research
  2. 2. Networking Local Area Networks <ul><li>Became popular with LAN’s (Ethernet @ 10Mbit) </li></ul><ul><li>How do you connect 2 LAN’s together? </li></ul><ul><li>Many LAN’s?? </li></ul><ul><li>High Speed?? (100Mbit) </li></ul><ul><li>Internet?? </li></ul><ul><li>Networking Software </li></ul><ul><li> DEC, 3COM, Banyon, Novel, Microsoft </li></ul><ul><li>Bridges, Switches, Routers </li></ul>Copyright 2006 Modern Systems Research
  3. 3. Internet <ul><li>Uses IP routing </li></ul><ul><li>No support for QOS </li></ul><ul><ul><li>QOS assigns priority to certain payloads </li></ul></ul><ul><li>Packet traffic “Bursty” by nature </li></ul><ul><li>Congestion often occurs </li></ul><ul><li>Congestion causes packet loss / delays </li></ul><ul><li>Higher level protocols provide restoration of lost & damaged packets </li></ul>Copyright 2006 Modern Systems Research
  4. 4. Inside the Internet <ul><li>User pays service provider for service </li></ul><ul><li>Service provider pays higher level service provider </li></ul><ul><li>Peering arrangements: </li></ul><ul><ul><li>service providers agree to “share” access to users </li></ul></ul><ul><li>Internet Routing </li></ul>Copyright 2006 Modern Systems Research
  5. 5. IP Routing <ul><li>IP (v.4) Address = 32 bits, 4 bytes </li></ul><ul><li>Static Hierarchal Routing </li></ul><ul><li>Class A (256 sub-address Class Bs) </li></ul><ul><li> Class B (256 sub-address Class Cs) </li></ul><ul><li>Class C (256 Users) </li></ul><ul><li>Users (256) </li></ul><ul><li>Addresses assigned based on agreements between service providers </li></ul><ul><li>Subnet mask on router tells it what block or part of block to look at </li></ul><ul><li>Dynamic Routing: users may move around requiring the network to “look” for a user </li></ul><ul><li>Routing Protocols allows routers to communicate to find the best path to forward packets </li></ul>Copyright 2006 Modern Systems Research
  6. 6. Routing Protocols <ul><li>Allows routers to work together to find the best path to a user or a group of users </li></ul><ul><li>Protocol examples: </li></ul><ul><ul><li>OSPF, RIP, BGP ,IGP, RSVP </li></ul></ul><ul><li>Common attributes: </li></ul><ul><ul><li>Use Static parameters to calculate route </li></ul></ul><ul><ul><li>example: latency based on distance </li></ul></ul><ul><ul><li>Some protocols are “link state” </li></ul></ul><ul><ul><li>Flood network with Link State Advertisements (LSA) </li></ul></ul><ul><li>Routing protocols do NOT take into account dynamic parameters </li></ul>Copyright 2006 Modern Systems Research
  7. 7. Dynamic Parameters <ul><li>Congestion </li></ul><ul><li>Intermittent Nodes & Links </li></ul><ul><li>Packet flows </li></ul><ul><li>QoS </li></ul><ul><li>Policies </li></ul><ul><li>Packet loading </li></ul>Copyright 2006 Modern Systems Research
  8. 8. Congestion control <ul><li>Most internet problems relate to congestion </li></ul><ul><li>Some Solutions: </li></ul><ul><li>Network Traffic Engineering: </li></ul><ul><ul><li>identify the source of the congestion </li></ul></ul><ul><ul><li>provide additional bandwidth to fix specific problem. </li></ul></ul><ul><li>Identify heavy users (e.g. Gamers) and: </li></ul><ul><ul><li>get them to pay for more bandwidth </li></ul></ul><ul><ul><li>apply flow constrictors </li></ul></ul><ul><li>Over provision bandwidth (again and again) </li></ul><ul><li>QOS based routing </li></ul><ul><li>Apply admission controls </li></ul><ul><ul><li>“ Block new traffic until congestion subsides” </li></ul></ul>Copyright 2006 Modern Systems Research
  9. 9. Packet Quality of Service <ul><li>QoS </li></ul><ul><ul><li>Quality of Service </li></ul></ul><ul><ul><li>QoS based routing has been with us for several years </li></ul></ul><ul><ul><li>diff-serv (Differenciated Services) is a QoS Architecture </li></ul></ul><ul><li>Some QoS routers use: </li></ul><ul><ul><li>“ Weighted Fair Queuing (WFQ)” </li></ul></ul><ul><li>Congest means there are too many packets to be transmitted over a given path. </li></ul><ul><li>WFQ provides an orderly means for discarding packets to bring the bandwidth down to what can be transmitted. All sources lose some packets with WFQ. Some sources lose more packets than others </li></ul>Copyright 2006 Modern Systems Research
  10. 10. Packet QoS (cont) <ul><li>Hard QoS: </li></ul><ul><ul><li>Packets are organized into flows </li></ul></ul><ul><ul><li>Each flow is assigned a class of service </li></ul></ul><ul><ul><li>When congestion occurs, bottom classes are discarded first. Higher classes are unaffected </li></ul></ul><ul><li>Currently 4 classes have been identified </li></ul><ul><ul><li>Voice, Video, Priority data, Best effort </li></ul></ul><ul><li>Today's routers assign QoS based on the port used. All packets arriving at that port share the same class of service. </li></ul><ul><li>Next generation routers assign QoS based on packet flows </li></ul>Copyright 2006 Modern Systems Research
  11. 11. IP Routing – Open Issues <ul><li>Currently includes no QOS guarantees </li></ul><ul><li>IP routing software can crash under heavy congestion </li></ul><ul><li>Latency not deterministic </li></ul><ul><li>No admission control </li></ul><ul><li>No ability to perform load balancing </li></ul><ul><li>Internet routing protocols do not take into account dynamic parameters such as congestion </li></ul><ul><li>Network slow to recognize link or node failures </li></ul>Copyright 2006 Modern Systems Research
  12. 12. Internet Today <ul><li>No QoS </li></ul><ul><li>Congestion takes down network </li></ul><ul><li>Variable Latency </li></ul><ul><li>No TDM Voice </li></ul><ul><li>Network Traffic Engineering needed </li></ul><ul><li>Not Secure </li></ul>Copyright 2006 Modern Systems Research
  13. 13. Security Internet Security Threats <ul><li>Denial of service attacks </li></ul><ul><li>Phishing </li></ul><ul><li>Spam </li></ul><ul><li>Mal ware </li></ul><ul><li>Viruses and worms </li></ul><ul><li>IP networks use in band signaling </li></ul><ul><li>Internet vulnerable to new generation of “Blue Boxes” </li></ul><ul><li>Users can modify internet packets to: </li></ul><ul><ul><li>Upgrade QOS </li></ul></ul><ul><ul><li>Spoof source / destination </li></ul></ul><ul><ul><li>Modify address at will </li></ul></ul>
  14. 14. Next Generation Routing <ul><li>New routers are being developed to correct the issues in current routing protocols </li></ul><ul><li>Flow-based routing: </li></ul><ul><ul><li>Packet flows are groups of similar packets traveling together sequentially </li></ul></ul><ul><li>Examples: </li></ul><ul><ul><li>Voice, Streaming Video, File transport </li></ul></ul><ul><li>Flow based routers must: </li></ul><ul><ul><li>Sort packets into flows </li></ul></ul><ul><ul><li>Buffer each flow </li></ul></ul><ul><ul><li>Implement policy/QoS rules to each flow </li></ul></ul><ul><ul><li>Forward packets </li></ul></ul><ul><li>Examples of companies building next generation routers: </li></ul><ul><ul><li>Caspian Networks, Anagran </li></ul></ul>Copyright 2006 Modern Systems Research
  15. 15. Next Generation Routing: The Hard Part <ul><li>When IP addressed packets arrive at the router, they all look the same. The router must move up the protocol stack to layer 4 sort the packets into flows (Deep Packet Analysis). </li></ul><ul><li>Once sorted, The flows must be ordered and assigned QoS and policy constraints. </li></ul><ul><li>When done properly, the network can give priority to voice or video when congestion occurs. Some technologies such as MPLS already support QoS </li></ul>Copyright 2006 Modern Systems Research
  16. 16. Internet With A Flow Based Router <ul><li>Expensive (Flow Based Routers needed throughout the network) </li></ul><ul><li>Congestion can still take down Packet Switches (must be Traffic engineered) </li></ul><ul><li>Does not support TDM voice </li></ul><ul><li>Not secure </li></ul>Copyright 2006 Modern Systems Research
  17. 17. Label Switching TDM Voice <ul><li>Used in DACS (1980’s) </li></ul><ul><ul><li>DACS is a digital access cross connect </li></ul></ul><ul><ul><li>Uses a time slot interchanger </li></ul></ul><ul><ul><li>Each DS0 (64kb data channel) can be considered as a packet; it has both a payload (8 bits) and an address (from the framing) </li></ul></ul><ul><ul><li>The old address is used to reference the new address in the cross connect. </li></ul></ul><ul><ul><li>Path and setup software ran separately from the cross connect hardware </li></ul></ul>Copyright 2006 Modern Systems Research
  18. 18. Label Switching Frame Relay (early 1980’s) <ul><li>WAN Data Network service offered by telecommunications carriers </li></ul><ul><li>Desirable, since it was tarriffed for less money than voice services </li></ul><ul><li>Typically used T1’s </li></ul><ul><li>Each pack was variable length and had a short label </li></ul><ul><li>Used bits to encode priority on each packet (congestion control) </li></ul><ul><li>Slower and less efficient than later IP routing </li></ul>Copyright 2006 Modern Systems Research
  19. 19. Label Switching ATM (mid 1990’s) <ul><li>Stands for Asynchronous Transfer Mode </li></ul><ul><li>Considered next level for ISDN </li></ul><ul><li>Supported both Voice and several data formats </li></ul><ul><ul><li>AAL1 through AAL5 </li></ul></ul><ul><li>Uses 53 byte cells (5 byte address, 48 byte payload) </li></ul><ul><li>Intended to be used on SONET </li></ul><ul><li>Fundamental Switching very simple, Transport and setup become complex </li></ul><ul><li>Supports hard QOS. Switching very reliable. Adopted by most carriers </li></ul><ul><li>Went out of favor with the introduction of gigabit Ethernet </li></ul>Copyright 2006 Modern Systems Research
  20. 20. Label Switching MPLS <ul><li>Stands for Multi Protocol Label Switching </li></ul><ul><li>4 byte label, variable length payload </li></ul><ul><li>Used with SONET up to 40 Gbit/S </li></ul><ul><li>Considered very reliable since switching is done by hardware </li></ul><ul><li>Uses internet routing protocols </li></ul><ul><li>Considered next transport technology for carriers </li></ul>Copyright 2006 Modern Systems Research
  21. 21. What is MPLS? <ul><li>MPLS: Multi-Protocol Label Switching </li></ul><ul><li>A short 20 bit label is attached to the front of each packet. A label is good for one hop only! </li></ul><ul><li>When a packet is forwarded by a Label Switch Router (LSR), the next hop is assigned and the label is updated. </li></ul><ul><li>LSR’s are very fast, some even operate at 40Gbit/sec rate. </li></ul><ul><li>Labels can be stacked; A MPLS packet can have it’s label stack “pushed” or “popped” instead of simply being translated at each LSR. </li></ul><ul><li>The path taken by the labeled packets is called a “label Switched Path” or LSP </li></ul><ul><li>The path is fixed and can traverse several nodes. </li></ul>Copyright 2006 Modern Systems Research
  22. 22. LSP Programming <ul><li>Label Switched Paths are usually built from the destination to the source. </li></ul><ul><li>A special protocol called LDP (Label Distribution Protocol) exists for this purpose. </li></ul><ul><li>IP routing protocols are used to determine the best path and build the LSP. </li></ul><ul><li>Building LSP’s this way can be problematical and slow. </li></ul><ul><li>Many carriers choose to use network Traffic Engineering to build and manage LSP’s </li></ul>Copyright 2006 Modern Systems Research
  23. 23. What is Network Traffic Engineering? <ul><li>Network Traffic Engineering is the computer simulation of a data network in order to ensure that congestion is avoided and the best links are chosen to carry the data flows between nodes. </li></ul><ul><li>Part of Network Traffic Engineering is to set up redundant paths if a priority path was to fail </li></ul>Copyright 2006 Modern Systems Research
  24. 24. Why do Network Traffic Engineering? <ul><li>Large carriers have found that engineered networks are more efficient and robust </li></ul><ul><li>Most carriers use MPLS on backbone systems. </li></ul><ul><li>MPLS works best when engineered. </li></ul><ul><li>The internet bubble generated a glut of bandwidth. Consequently only a minor amount of engineering is needed. </li></ul><ul><li>Automatic path allocation software supplied by vendors does not do an adequate job. </li></ul><ul><li>Now that extra bandwidth has been used up and engineering must be done to avoid network crashes </li></ul>Copyright 2006 Modern Systems Research
  25. 25. What is Done? <ul><li>Network Traffic Engineering is often done by outside firms. </li></ul><ul><li>Special network simulation software has been developed for this purpose. </li></ul><ul><li>Network engineers collect data from carrier on nodes, links, policy preferences, existing LSP’s, estimated bandwidth needs for each LSP, latency between nodes, customer contract requirements, etc. </li></ul><ul><li>Engineers enter collected data into simulation program. </li></ul><ul><li>Program produces a map with traffic loading and latency for all nodes </li></ul>Copyright 2006 Modern Systems Research
  26. 26. What is Done? (cont) <ul><li>A maximim traffic loading value is assigned to each node (usually 70%) </li></ul><ul><li>Engineers use program to build new LSP’s or change existing LSP’s to conform to latency and traffic requirements </li></ul><ul><li>Stress tests are performed on simulated network to find failures and maximum loading </li></ul><ul><li>Redundant LSP’s are added as a result of the previous tests. </li></ul><ul><li>When finished, recommendations are made to carriers </li></ul><ul><li>Carriers provision new LSP’s </li></ul>Copyright 2006 Modern Systems Research
  27. 27. Internet Reliability <ul><li>Internet reliability is linked to each router </li></ul><ul><li>Router Reliability (MTBF) </li></ul><ul><ul><li>Computer Logic 100,000 hrs </li></ul></ul><ul><ul><li>Power Supply 200,000 hrs </li></ul></ul><ul><ul><li>Routing Software 10,000 hrs </li></ul></ul><ul><ul><li>AC power 40,000 hrs </li></ul></ul><ul><li>Clearly, the routing software reliability is the weakest link </li></ul><ul><li>This is evidenced by the system “crashes” that occur when the network is overloaded. The network relies on the routing protocols to bypass effected routers. Because of the delays involved, these crashes will cause dropped VOIP calls </li></ul><ul><li>MPLS switches are more reliable because the actual switching is done in hardware. </li></ul><ul><li>Adding QoS can worsen the reliability as it can slow the software making it easier to crash. </li></ul>Copyright 2006 Modern Systems Research
  28. 28. Internet Availability <ul><li>An Internet outage is measured in time. This outage is often shown as Mean Time To Repair or MTTR. </li></ul><ul><li>1 – MTTR = Internet Availability generally expressed as a percentage. </li></ul><ul><li>The availability requirement for the PSTN is that it is available 99.999% of the time. It can only be out of service a total of 5.25 minutes a year! </li></ul><ul><li>To achieve this Telcos had to do several improvements over traditional designs over time: </li></ul><ul><ul><li>Redundant Power (dual 48V battery plants) </li></ul></ul><ul><ul><li>Transmission tests through switch matrix before call cut-through </li></ul></ul><ul><ul><li>Redundant processor and software throughout </li></ul></ul><ul><ul><li>Verification of connection paths before setup </li></ul></ul><ul><ul><li>Mechanized Loop Testing (MLT) </li></ul></ul><ul><ul><li>All links redundant with hot standby </li></ul></ul><ul><ul><li>Triple Redundant Switching Control Processor for SS7 network </li></ul></ul><ul><li>As can be seen, we have a long way to go before we abandon the PSTN in favor of whatever appears to be cheaper! </li></ul>Copyright 2006 Modern Systems Research
  29. 29. Toward Reliable VOIP Copyright 2006 Modern Systems Research
  30. 30. Next Gen Network Design Objectives <ul><li>Make network capable of carrying all forms of data </li></ul><ul><ul><li>TDM Voice </li></ul></ul><ul><ul><li>High Speed Streaming Video </li></ul></ul><ul><ul><li>Internet traffic with QoS </li></ul></ul><ul><li>Make switching function hardware-based </li></ul><ul><ul><li>Speed </li></ul></ul><ul><ul><li>Reliability </li></ul></ul><ul><ul><li>Deterministic throughtput </li></ul></ul><ul><li>Include path building and control in switching functions </li></ul><ul><li>Provide a simple request – grant (layer 4) user interface </li></ul><ul><li>Make a mesh network immune to node and link failures </li></ul>Copyright 2006 Modern Systems Research
  31. 31. Next Gen Network Design Objectives (cont) <ul><li>Network Plug and Play </li></ul><ul><ul><li>Network can operate with no provisioning </li></ul></ul><ul><ul><li>Provisioning can be added to establish policies and QoS </li></ul></ul><ul><li>Self route each path based on : </li></ul><ul><ul><li>Packet flow requirements: (latency, QoS, bandwidth) </li></ul></ul><ul><ul><li>Available nodes / links that meet the requirements </li></ul></ul><ul><ul><li>Service provider policies </li></ul></ul><ul><li>Support Enhanced Services </li></ul><ul><ul><li>Multicasting (Branching & Merging) </li></ul></ul><ul><ul><li>Redundant paths </li></ul></ul><ul><li>OA&M Support (Operation, Administration and Maintenance) </li></ul><ul><ul><li>Direct control of network setup by network engineers </li></ul></ul><ul><ul><li>Real-time network stress testing </li></ul></ul><ul><ul><li>Control alarms for node, link, path failures or congestion </li></ul></ul>Copyright 2006 Modern Systems Research