Implications of super channels on CDC ROADM architecturesAnuj Malik
OFC 2014 Presentation
This study proposes CDC ROADM architecture compatible with emerging DWDM super-channel technology. A real world network model is used to quantify that this architecture requires fewer network components leading to less capital and operational costs.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
Implications of super channels on CDC ROADM architecturesAnuj Malik
OFC 2014 Presentation
This study proposes CDC ROADM architecture compatible with emerging DWDM super-channel technology. A real world network model is used to quantify that this architecture requires fewer network components leading to less capital and operational costs.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
The session begins with an overview on the basic impairments in a fiber based optical network. It will then cover what technologies are available to alleviate these linear and non-linear impairments. The fundamental components of DWDM (ie filters, optical amplifiers, lasers, & receivers) will also be covered. The basic design principles that go into designing DWDM networks will be discussed. Converged platforms based on OTN infrastructures have been introduced into the transport network recently and this will be covered. Lastly, innovations in DWDM transport such as 200G transmission, Flex Spectrum ROADM and control plane integration will be summarized.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
The session begins with an overview on the basic impairments in a fiber based optical network. It will then cover what technologies are available to alleviate these linear and non-linear impairments. The fundamental components of DWDM (ie filters, optical amplifiers, lasers, & receivers) will also be covered. The basic design principles that go into designing DWDM networks will be discussed. Converged platforms based on OTN infrastructures have been introduced into the transport network recently and this will be covered. Lastly, innovations in DWDM transport such as 200G transmission, Flex Spectrum ROADM and control plane integration will be summarized.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
Invited paper at ACP 2014 in Shanghai - Introduction to raman amplification and its applications and benefits in terrestrial, submarine unrepeatered and repeatered optical communications for long haul and high capacity DWDM systems
Ausgrid is investing more than $1 billion in the Sydney CBD electricity network over five years to 2014. Ausgrid's Sydney CityGrid project involves constructing new substations, replacing and upgrading high-voltage cables and constructing a new tunnel to link into our existing network of CBD cable tunnels. These tunnels connect to form an 8 km ring under Sydney's CBD that interconnects Ausgrid's substations.
To provide a GRN P-25 coverage solution into these tunnels for Ausgrid's maintenance staff presented a challenge. Coverage is provided by utilising 'radio over fibre' repeater technology which rebroadcasts the NSW Government Radio Network from two dedicated base station sites located in two of Ausgrid's substations. Radiating cable, fixed to the ceiling of the tunnel, distributes the radio signals to the user in the tunnel, providing a method of communications deep underneath Sydney's CBD, where previously there was no way of communicating with the outside world.
Steve Harvey, Engineering Manager, Distributed Coverage and Capacity Solutions (DCCS), CommScope
Ausgrid is investing more than $1 billion in the Sydney CBD electricity network over five years to 2014. Ausgrid's Sydney CityGrid project involves constructing new substations, replacing and upgrading high-voltage cables and constructing a new tunnel to link into our existing network of CBD cable tunnels. These tunnels connect to form an 8 km ring under Sydney's CBD that interconnects Ausgrid's substations.
To provide a GRN P-25 coverage solution into these tunnels for Ausgrid's maintenance staff presented a challenge. Coverage is provided by utilising 'radio over fibre' repeater technology which rebroadcasts the NSW Government Radio Network from two dedicated base station sites located in two of Ausgrid's substations. Radiating cable, fixed to the ceiling of the tunnel, distributes the radio signals to the user in the tunnel, providing a method of communications deep underneath Sydney's CBD, where previously there was no way of communicating with the outside world.
Steve Harvey, Engineering Manager, Distributed Coverage and Capacity Solutions (DCCS), CommScope
Benefits of multi layer bandwidth management in next generation core optical ...Anuj Malik
OFC 2013 Presentation
This preso evaluates multi-layer switching architecture vs. all-optical and all-digital switching architectures. Further, the value of incorporating super-channels is evaluated to determine benefit. A real world network model is utilized to quantify and compare results.
you can be friend with me on orkut
"mangalforyou@gmail.com" : i belive in sharing the knowledge so please send project reports ,seminar and ppt. to me .
The DWDM passive Mux Demux modules deliver the benefits of a Dense Wave Division Multiplexer in a fully passive solution. They are designed for long-haul transmission where wavelengths are packed tightly together over the C-band range of wavelengths, up to 48 wavelengths in 100GHz grid(0.8nm) and 96 wavelengths in 50GHz grid(0.4nm).
This slide deck presents a user case by Microsoft (Mark Filer) for a 100G DWDM alternative to Coherent systems <80km using the PAM-4 approach. Fujitsu (Muhammed Sarwar) and Finisar (Gert Sarlet) present the case for Coherent. Inphi (Radha Nagarajan) and ADVA (Joerg-Peter Elbers) present the case for the PAM-4 approach. IEEE (John D'Ambrosia) weighs in from the standards perspective.
Dense wavelength division multiplexing (DWDM) is a technology that puts data from
different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength.
2015 06 23 the most advanced repeater wdm nice 2015 originalXtera Communications
Following a short update on the latest developments for unrepeatered subsea cable systems (150 x 100G on 410 km, 100G on 607 km), this presentation describes the genesis and the development of the industry’s most advanced subsea repeaters, with innovative electrical, optical and mechanical designs. This Raman-based repeaters was deployed by Xtera in May 2015, an industry’s first. This presentation was delivered at WDM & Next Generation Optical Networking EMEA 2015 conference (22-25 June 2015 – Nice, France).
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
3. Juniper Confidential
Topics to Cover
• What is WDM?
• Optical Transmission Challenges
• Grey and Colored Optics
• Receive Power
• Dispersion
• Multiple Wavelengths
• Amplifiers
• ROADMs
• Transponders and Muxponders
4. Juniper Confidential
What is WDM?
• With Wavelength division multiplexing (WDM) technology, several wavelengths, or light
colors, can be simultaneously multiplexed over a strand of fiber.
• No need to lay new fiber, the effective capacity of existing fiber plant can be increased
by a factor 40, 96, and 128
• The term wavelength is used instead of the term frequency to avoid confusion with
other uses of frequency. Wavelength is often used interchangeably with lambda and
channel
Transmitter Receiver
Combiner
(Mux)
Separator
(Demux)
5. Juniper Confidential
Optical Transmission Challenges
• Attenuation
• decay of signal strength, or loss of light power, as the signal propagates through the fiber
• Chromatic dispersion
• spreading of light pulses as they travel down the fiber
• Nonlinearities
• cumulative effects from the interaction of light with the material through which it travels,
resulting in changes in the lightwave and interactions between lightwaves
7. Juniper Confidential
Receive Power
40km
• Receiver needs to be able to distinguish 1 from 0
• 3 key parameters have to be within the tolerance of the receiver
• Rx Power, Dispersion, and Optical Signal to Noise Ratio (OSNR)
• dB : relative measurement
• dBm : an absolute value
-1 dBm -11 dBm
Fiberloss = 0.25 dB/km x 40km = 10 dB
Sample SFP Tx/Rx Spec
Tx Power -1 to 2 dBm
Rx Power -22 dBm
Dispersion Tolerance 1600 ps/nm
OSNR 20dB
Site A Site B
8. Juniper Confidential
Dispersion
40km
• Not all the photons have exactly the same wavelength
• Different wavelength photons will travel at a slightly different
rate down the fiber
• Causes pulse broadening which makes it difficult to
discriminate 1 from 0 pulses
Dispersion = 17 ps/nm/km x 40km = 680 ps/nm
Sample SFP Tx/Rx Spec
Tx Power -1 to 2 dBm
Rx Power -22 dBm
Dispersion Tolerance 1600 ps/nm
OSNR 20dB
0 ps/nm 680 ps/nm
1 0 1 0 1 1 1 1
Site A Site B
9. Juniper Confidential
Multiple Wavelengths
• C-Band or L-Band is where we transport multiple
wavelengths
• Wavelengths are combined using Optical Mux/Demux
Modules
• 8-32ch, 40ch, 96ch
• Spacing of the wavelengths or channels is usually 100GHz or
50GHz
• Mux/Demux have insertion loss
Sample SFP Tx/Rx Spec
Tx Power -1 to 2 dBm
Rx Power -22 dBm
Dispersion Tolerance 1600 ps/nm
OSNR 20dB
Optical Mux Optical Demux
-1 dBm
-7 dBm
-17 dBm
-23 dBm
40km
Site A Site B
10. Juniper Confidential
Amplifiers
• Amplifiers or EDFAs work in the C & L Bands, not the whole
CWDM spectrum
• Typically 3-types of Amplifiers
• Post-Amp (Booster) – Lower gain with best output power
• Pre-Amp – High gain with best receiver sensitivity
• Line-Amp – Multi-stage combining Pre & Post amplifiers
• EDFAs are not 100% efficient; amplify both the signal and the
noise
Post-Amplifier
or Booster Line Amplifier Pre-Amplifier
l
EDFA
The signal is amplified but Amplified
Spontaneous Emissions (ASE) noise is also
added.
l
Site A Site B
11. Juniper Confidential
FOADMs
• FOADM : Fixed Optical Add/Drop Multiplexor
• Required manually patching at transit site
• Manual adjust optical power is required
45km
10km
30km
Pass Thru
Add/Drop
Drop
Site A
Site B
Site C
12. Juniper Confidential
ROADMs
• ROADM : Reconfigurable Optical Add/Drop Multiplexor
• Allows one to control which channels are add/dropped and
which channels are passed thru
• Power management and balancing to avoid non-linear effects
2-degree
3-degree
4-degree
45km
10km
30kmPass Thru
Add/Drop
Drop
2-degree
Site A
Site B
Site C
15. Juniper Confidential
Juniper/BTI End-to-End Solution Portfolio
BTI7000 product line BTI7800 product line
IP/Ethernet Platforms
Optical Solutions
ACX Series MX Series
MX Integrated Transponders
10G DWDM 100G DWDM
Network
Management/Applicati
ons proNX Service ManagerJunos Space/CSD
SDN
NorthStar SDN Controller
proNX SLA Portal
QFX Series
16. Juniper Confidential
High-level product specifications
GE,FC, 10GE, OC192,
STM64, 10G DWDM, FC
BTI7000
C/DWDM, 4ch/8ch/40ch/96ch
2D ROADM, 4D ROADM
800 Series, ACX Series, MX Series
10GE, 100GE
100G Coherent, 200G Coherent
2D ROADM
ACX Series, MX Series
96 Ch DWDM
BTI7800
T1/E1, OC3/STM1, FE, GE, 10GE
BTI7000/ BTI7800
CE 2.0, Full IP/MPLS
BTI7000/ BTI7800
ACX Series MX Series
GE, 10GE, 40GE, 100GE
10G DWDM, 100G Coherent
CE 2.0, Full IP/MPLS
BTI7000/ BTI7800
BTI7000/ BTI7800
ROADM
Optical
Packet Platforms/Features
Interfaces
QFX Series
10GE, 40GE, 100GE
, 100G Coherent
CE 2.0, Full IP/MPLS
BTI7000/ BTI7800
BTI7000/ BTI7800
17. Juniper Confidential
Packet Optical Solution Options
• IP/Ethernet aggregation function provided via ACX and MX
platforms including Ethernet OAM, QoS, reliability, CE2.0 services
• P2P, Mesh, Ring topologies
IP/Ethernet
• Integrated 10G DWDM: MX Series
• Integrated 100G Coherent: MX Series
• Disaggregated 10G : BTI800/ ACX/ MX + BTI7000
• Disaggregated 100G: ACX/MX + BTI7801/7802/7814
Optical
• CSD for E2E service provisioning
• PSM for E2E Optical domain management
EMS/NMS
• End-to-end network solutions capability
• Solution flexibility: Integrated and Disaggregated solution options
• Services flexibility, L2/L3 VPN services, IP services,
• Open solutions enabling best of breed, interop and easy of integration
Benefits
10G Disaggregated Solution
MX Series
MX Series MX Series
BTI7800
ACX Series
MX Series
ACX Series
BTI 7000 BTI 7000
BTI7800
100G Coherent DWDM Integrated Solution
MX Series MX Series
BTI7800 BTI7800
100G Disaggregated Solution
BTI800 line BTI800 Lline
18. Juniper Confidential
Disaggregated Transponder solution • Enables end-to-end Juniper
solution with high capacity
10G & 100G DWDM transpor
• BTI7000 supports 10G/100G
Transponders and
Muxponders
• Compact design w/ flexible
chassis options (1/2/14 RU)
• Up to 9.6 Tbps capacity;
19.2T (Q4 2016)
• Supports Point-to-point &
Ring topologies
• 2D ROADM, In-line Amplifiers
• PSM + CSD for
comprehensive Packet
Optical management
• A-Z provisioning for MPLS
LSP’s
10G Solution
BTI7000 BTI7000
BTI7800 BTI7800
100G Solution
MX Series
ACX Series
BTI800 line
MX Series
ACX Series
BTI800 line
MX Series
MX Series
Includes Txp, Mxp, Mux/Demux/ ILA, ROADM
Includes Txp, Mxp, Mux/Demux/ ILA, ROADM
Grey
10GE/100GE
interfaces
n x 10G DWDM
n x 100G DWDM
Grey 10GE interfaces Grey 10GE interfaces
Grey
10GE/100GE
interfaces
19. Juniper Confidential
Integrated Transponder solution
• Integrated Packet Optical
solution enabling better
economics
• Reduced TCO due to less
optics and network elements
• Integrated 24 x 10G DWDM
(tunable sfp+)
• Integrated 1 x 100G Coherent
DWDM (Cordoba MIC)
• Increased reliability due to
optical layer visibility e.g. Pre-
FEC FRR
• PSM + CSD for
comprehensive Packet
Optical management
• A-Z provisioning for LSP’s
MX480
BTI7800 BTI7800
Integrated 100G Coherent DWDM Solution
BTI7000 BTI7800 BTI7000/BTI7800
Integrated 10G DWDM Solution
MX Series
MX Series
MX960
Integrated Coherent
100G Transponder Integrated Coherent
100G Transponder
Integrated 10G
Transponder
Integrated 10G
Transponder
Includes Txp, Mxp, Mux/Demux/ ILA, ROADM
Includes Txp, Mxp, Mux/Demux/ ILA, ROADM
n x 10G DWDM
n x 100G DWDM
20. Juniper Confidential
FRR BASED ON OPTICAL PERFORMANCE
Packet-optical integration enables L1 to L3 visibility
50 ms
TXP
Router
Post-FECBER
0
Loss of frame
Protection path
established
Pre-FECBER
FEC limit
Optical layer protection in
today’s networks
Router
Pre-FECBERPost-FECBER
0
Small performance hit
during FRR*
Transport-aware FRR in
converged packet-optical
networks
FEC limit
FRR threshold
* Depends on FRR
threshold and
allocated margin.
Visibility of packet layer resilience mechanisms to the optical performance improves overall
network resilience.
22. Juniper Confidential
MX Edge Portfolio + Integrated 10G/100G Transponders
One TRIO Architecture
One UNIVERSAL EDGE
MX240 MX480 MX960 MX2010 MX2020
Max system
Switching
Capacity (1/2
duplex)
1.92Tbps 5.1Tbps 10Tbps 40Tbps 80Tbps
Height (RU) 6 8 16 34 45
Slots 2 6 11 10 20 1 x 100G DWDM MIC
100G Transponder
20 x 10G DWDM
10G Transponder
24 x 10G DWDM
23. Juniper Confidential
1 x 100G Coherent DWDM MIC
2nd Generation 100G Coherent Technology
• 1 x 100G Coherent Interface
Pluggable CFP2-ACO optics
• Modulation Type: DP-QPSK
• Tunability: 100 Channel (ITU-T C-band)
• 1528.773 – 1568.362
• Spacing: 50GHz spacing
• Rx Power range: -18 to 0
FEC Modes:
• GFEC (G.709)
• HG-FEC
• SD-FEC
CMD Tolerance
• +/- 40,000 ps/nm
OSNR (Typical): 14.2 dB
Supported on MX240, MX480, MX960, MX2010, MX 2020
• Requires MPC3E or MPC3E-NG
Distance: Up to 2000km
Software Release: 15.1F5
TCFP2-100G-C
Now
Available
MIC3-100G-DWDM
24. Juniper Confidential
Juniper-BTI 7800 Series Portfolio
Platform Scale Evolution From 400G to 1Tbps/Slot
BTI 7802
400G
per slot
TODAY
800G
per slot
1Tbps
per slot
BTI 7814
BTI 7801
Model Capacity (bps) Slot
s
10GE Capacity 100GE
Capacity
Rank Units Multi-Chassis
7801 400Gbps 1 40 4 1 H/W Ready
7802 800Gbps 2 80 8 3 Yes
7814 5.6Tbps 14 560 56 14 Yes
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
25. Juniper Confidential
Juniper-BTI 7814 Platform Overview (14RU)
Carrier grade. Flexible. Scalable.
Leveraging Best of Breed Commercial Building Blocks For High Performance and Rapid Time to
Market
FRONT VIEW REAR VIEW
Advanced Power System
AC and DC options
6kW protected
Rear Air Exhaust
Auxiliary fan accessFront Fan Access and LCD
Quick access to system health
Redundant fans (4)
Front-Rear Airflow
Designed for future
generations of modules
High Capacity Service Slots (14)
Universal forwarding modules
Optical modules
Application modules
240G 1T/slot
Cable Management
Above and below service modules Management Modules (2)
64-bit Linux / x86 / distributed
architecture
HA software framework
Multi-chassis scalability
In-service software upgrades
Secure protocols
Advanced Chassis Design
Backplane, cooling and thermals support
future generations of service modules
Industry-leading packet-optical density
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
26. Juniper Confidential
Juniper-BTI 7802 Platform Overview (3RU)
Fan
Power modules
Management modulesPower (AC shown) CMM B
CMM A
CAP
Cooling unit
With air filter
Slot 2
Slot 1
Fiber manager
• Common software, management modules & forwarding modules
• New chassis, fans & power supplies (AC and DC)
• Supports multi-chassis up to 4; Slot capacity up to 1Tbps/slot
• Ideal for colocation environments
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
27. Juniper Confidential
Juniper-BTI 7801 Single Slot Chassis (1RU)
Optimized for Space Constrained Applications
• Newest member of BTI 7800 Series
• Based on proven BTI 7800 technology
shipping since 2013
• Common software, O/S, management
modules and service modules
• Managed by BTI proNX
• CLI, NETCONF/YANG and SNMP
• Stand-alone or managed as a virtual slot of a
BTI 7814
• Field replaceable management module (without
losing configuration)
• Provides space and power efficiency
• Low start up costs
• Easy installation, turn up, maintenance
Form factor of a pizza-box without sacrificing modularity/extensibility
1RU
Front Rear
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
28. Juniper Confidential
Universal Forwarding Modules (UFM)
Flexibility Enabled by Universal Forwarding Modules
• 14 Universal Slots – Transport and Packet Capable
• Universal Forwarding Modules
• BTI Interface Cards (BICs)
– 12x 10G, 1x 100G
• CLI, NETCONF, PSM & REST
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
30. Juniper Confidential
Juniper-BTI 7800 Series - 400G UFM
• Supported in BTI 7814, 7802 and 7801
• Supports either transponder or muxponder connectivity
• 10x QSFP clients (4 combo ports)
– 10G, and 100G protocols
– Router discovery option via LLDP
– QSFP+ and QSFP28 optics
• 2x 200G coherent line
– 16QAM modulation
– OTU4 protocol
– Soft decision FEC
– Electronic dispersion compensation
– Tunable, 50GHz spaced, compatible with 96ch mux/demux
10x QSFP
2x 200G
(16QAM)
4x combo
(10G/100G)
31. Juniper Confidential
Juniper BTI7000 Product Line Optical Portfolio
Transponders
Muxponders
PacketVX
ROADM
Optical
Reclaim Fiber from legacy low rate
SONET/SDH
GE / Fiber Channel Price Line svs
Sub-wavelength Services
Metro-E Infrastructure
Ethernet Business Services
Mobile Backhaul
Dynamic Optical Layer
10G/100G Wave Services
2.5G and 10G Wave Services
High Capacity Data Center
Interconnect
BTI7200 (7RU, 20 Service Slots)
BTI7060 (2RU, 6 Service Slots)
BTI7020 – (1RU, 2 Service Slots)
Passive
Scalable from 6 to 60 service slots
Same software & management system
32. Juniper Confidential
Scalability to address Growing Needs
7200706072007060 7060
7060
7060
7060
Compact | High Capacity | Scalable
7200
7200
Application
Software
ControlSoftwareIntelligentNetworkInfrastructure
BTI proNX Service Manager
BTI proNX Dashboard BTI proNX SLA Portal Other Applications
RESTful APIs
NETCONF, SNMP, OpenFlow
BTI 7000 Series BTI 800/700 SeriesBTI 7800 Series 3rd Party Network Nodes
REST
Open SDN ControllersBTI proNX Control
33. Juniper Confidential
BTI 7000 Series - C/DWDM Network Multiplexing
DWDM Scalable
8 to 32 channels
DWDM High Capacity
40 channels
All sub-wavelength plan network multiplexing modules have
Expansion Ports to enable scaling as demand grows
Drop the full 40 – 96 DWDM Channels
CWDM
Scalable
from 4 to 16
Channels
Day One: Channels 1-8 Initially
Day Two: Add Channels 9-16
Day Five: Add Channels 17-24
Day Ten: Add Channels 23-32
Day One: Channels 1-4 Initially
Day Two: Add Channels 5-8
Day Five: Add Channels 9-12
Day Ten: Add Channels 13-16
To Dark Fiber
DWDM Ultra High Capacity
96 channels
34. Juniper Confidential
Dual 2.5G Multiprotocol Transponder
Client 1 Line 1
Client 2 Line 2
Client
Line W
Line P
Transponders High Capacity Transport
Dual 10G Multiprotocol Transponder
Dual 4G Multiprotocol Transponder
● ● ●
2.5G 4G 10G
Line
Rate
Extend services across the WAN with high capacity connectivity over
dedicated wavelengths
BTI7000 Series 10G Transponders
• Single Slot (1W x 1H)
• 2 Multiprotocol Client XFP Ports
– 10GE LAN PHY, WAN PHY, OC192, STM64,
10G FC
• 2 10Gbps Line XFP Ports
– 850nm, 1310nm, 1550nm, WDM
• Client Mapping
– Transparent
– Section Regen (OC-192, STM-64 clients)
– G.709 OTU2
• Network Configurations
– Unprotected: supporting 2 clients
– Protected: OTN 1+1 WAN protection
– Regenerator for TPR, DTPR, MXP, PVX
• Performance monitoring on all ports
• FEC and enhanced FEC
• In-band management: OTN GCC
35. Juniper Confidential
Client 1
Line
GbE 1
GbE 2
…
Client 10
Line
2-port GbE Muxponder
8-port Multiprotocol Muxponder
10-port Multiprotocol Muxponder
● ●
1G 2.5G 4G 10G
Muxponders Efficient λ Aggregation
Line
Rate
Aggregate multiple services onto a shared wavelength with dedicated
bandwidth per service
BTI7000 Series 10G Muxponders
• 10 Multiprotocol Client SFPs
– 1G FC, 2G FC, 4G FC, GbE, OC-N, STM-N
– 1310nm, 1550nm, and WDM
• 2x10G Line XFPs
– STM-64, OC-192, OTU-2 mapping
– 850nm, 1310nm, 1550nm, WDM
• Full rate & Sub rate GbE transport
• Resilient timing references using Basic SSM
• SNCP/UPSR, OTN-based 1+1 Line protection
• Client Encapsulation via GFP/VCAT/CCAT:
– FC, GbE: GFP-T/VCAT/CCAT
– GbE: GFP-F/VCAT/CCAT
• Line Mapping
– STM-64/OC-192
– STM-64/OC-192 OTU-2
– 4x ODU-1 OTU-2
• Performance Monitoring on all ports
• In Band management: G.709 OTN GCC
37. Juniper Confidential
Agenda
• PSM Intro
• Lab Setup
• PSM Configuration
• Optical Service Management (DOL, BTI 7000, and BTI 7800)
• Summary
• Q & A
38. Juniper Confidential
proNX Service Manager (PSM)
Large Scale Deployments & Rapid Service Extensions
• Packet-optical portfolio management
– One system for end-to-end management
– Fault, Configuration, Accounting, Performance,
and Security (FCAPS)
• Complementary Java and Web Clients
• Open Interfaces (SNMP, REST)
– OSS/BSS integration and Flow Thru
Provisioning
– Layered SDN Controller integration
Analytics
SDN Orchestrator
Network Optimization
Bandwidth On Demand
39. Juniper Confidential
proNX Service Manager (PSM)
Highly Intuitive User Experience
• Auto-created Multi-Layer Network Topology
• Point & Click management through complete
network lifecycle
– Devices, Cards, Ports, Amps, etc.
• Point & Click activation of end-to-end
connections and services
– Path calculation & provisioning end-to-end
– Optical: Dynamic ROADM & Static Optical
connections
– MEF Ethernet: Circuit monitoring, protection and route
visualization
– Pseudo Wire Services
• Network and Service visualization end-to-end
40. Juniper Confidential
Widely Deployed @ Scale Worldwide
Leverage Industry Standard Components
• Market-leading OS: Red Hat Enterprise Linux / CentOS
• Bare Metal** or Virtualized deployment
• Scales to many users, hundreds of elements, thousands
of services
• High Availability and Reliability through Clustering
• Comprehensive Fault Management
• Historical and Real-Time Performance Data Collection
and Reporting
• Centralized User Management and Single Sign On
• Network OAMP functions: Upgrade, DB
Backup/Restore, Logs
41. Juniper Confidential
Service Activation and Visualization
Connecting Multiple Layers
• Links and Link-Status graphically displayed
• ROADM, Layer-1 (OTN), Ethernet, PW, etc. services shown end-to-end
• Complementary multi-layer views provided via Java and Web clients
42. Juniper Confidential
High Availability Clustering
Redundancy & Scale
• Two or more instances clustered
• Hot Standby solution
• Simultaneous monitoring of full network OR
segment by region/market/technology
– User privileges can be unique between region/market
• Instances can be geographically separated for
regional access
• One server instance can be used as backup
when needed
43. Juniper Confidential
• Java client
• Complete feature coverage
• Clients downloadable from server for easy distribution
• Dashboard Web client: https://<IPadd>:9000
• Focus on NOC personnel tasks; monitoring, reporting, etc.
• Responsive design for flexible and remote access
• Common Client-Server interface = REST
• Includes common user AAA
• Expanding perspectives using common centralized data
• Trends; Responsiveness; Capacity
Complementary Java and Web Clients
Flexible Distribution of Operational Roles
44. Juniper Confidential
PSM relative to existing Juniper applications
Continuing PSM’s Architectural Evolution
• Existing REST APIs are used to integrate these applications
– eg. PSM native REST APIs, IETF draft-ietf-teas-yang-te-topo
• Applications typically provide overlapping common capabilities
– eg. HA, Security, Scheduling, Topology, Fault Management, etc.
REST APIs
NorthStar Controller
proNX Service Manager (PSM)
Connectivity Services Director
End-to-end packet-optical
management plus FCAPS
management for legacy BTI
components
FCAPS management
for all Juniper
components
IP services
management
LSP provisioning and
optimization
45. Juniper Confidential
How does PSM fit in an SDN architecture?
• Open APIs for ease of integration
• NETCONF/YANG Southbound; REST Northbound
• As a Domain Controller, integrating with a Global Controller/Orchestrator
• Tight integration with customers’ existing operations and business systems
• Existing REST API provides flexible set of functions enable a variety
of applications; examples:
• Ethernet Self Service Portal: proNX SLA Portal; Interxion, Epsilon
• OSS integration for Optical Service Provisioning: APAC customer
• API extension to IETF TEAS Optical Topology for integration with
NorthStar
53. Juniper Confidential
Network Discovery
Network Element Discovery Process
– Enter the IP address, or a range of IPs
– Optionally enter a Domain name
– Specify an SNMP write community
string
Note:
– BTI7000 7.1.x (and higher)
provides default SNMP community
strings
(public:read, private:write)
– For earlier releases this must be
configured manually
54. Juniper Confidential
Network inventory
Retrieve Full Network Inventory
– Formatting options:
• Sort the table by clicking any column header
• Right-click columns or click button at the far-
right to select the displayed columns
55. Juniper Confidential
Network Wide Logs
On-Demand log collection
– Select ‘View->Network->
Log Collection
– Add Filters (optional)
– Click ‘Perform Query’
– Use buttons and text
fields at the bottom to
page through the
collected logs
58. Juniper Confidential
NE Upgrade
Select ‘Software Upgrade’ from Right-
click menu of Single network element,
user group, or topology icon
In Software Upgrade window:
Select FTP Server
Browse to the software file to
upload from server to NEs
Options:
– Check: Verifies upgrade file is
valid
– Check/Load: Also uploads file to
NEs
– Check/Load/Invoke: Also invokes
upgrade
– Check/Load/Invoke/Commit:
Performs the full upgrade
59. Juniper Confidential
Node Controller Configuration
You can configure NEs using the Node Controller from within PSM
First you configure PSM to point to the correct version of proNX 900
Once configured, PSM launches the correct version of proNX 900 if the
version is installed locally
61. Juniper Confidential
Adding Customer
PSM allows you to add, modify and delete data about your
customers. Including:
– Company name
– Company reference
– A list of employees
– Primary and
maintenance contact, and
– Notes
63. Juniper Confidential
Dynamic Optical Layer
DOL = Reconfigurable optical add/drop multiplexing,
reach extension, and end-to-end service- and path-
centric management.
– Simplified operations and enhanced automation
– Touchless and modular nature of the DOL architecture
simplifies the design, installation, operation and
optimization of service delivery networks.
– 2 Degree/ 4 Degree ROADM-on-a-Blade (ROB)
– DWDM Line Amplifier (DLA)
64. Juniper Confidential
Optical Service Activation
Activate new Optical Service
Activate service for
customer sites
Activate multiple paths for
services
View service details
65. Juniper Confidential
Optical Service Activation (cont’d)
Activate new Optical Service
Activate service for
customer sites
Activate multiple paths for
services
View service details
67. Juniper Confidential
Optical Power PM Display
Provide a simple way to initiate
or halt real-time PMs collection
for an optical service
Optical PM data widget will be
used to retrieve and display the
current PM statistics
– Example of OSC PM collection
for a selected service
– Example of Optical Data
Widget for All channels on a
port
68. Juniper Confidential
Optical Power PM Display (cont’d)
Power level PMs for all Wavelengths/Services per Port
– When viewing all channels, each port has a new tab, with each channel passing over that
port shown in one graph
72. Juniper Confidential
Activate Optical Service for BTI 7800
Select Tools > Service Activation > Optical
– Select Fixed vs Dynamic
Enter Site A details and select interface type
– Enter Site B details
Activate and check
75. Juniper Confidential
• proNX Service Manager (PSM) = Comprehensive full service solution
• Flexible deployment options to suit all customer needs
• Scale, reliability, extensibility
• Ease of integration with SDN and traditional architectures
• Comprehensive plan for Juniper integration
Summary
76. Juniper Confidential
Recap of the first half of the BTI Workshop
• Metro packet optical market for DCI and Service Provider are growing and Juniper
is well positioned to help customers take advantage of the opportunities
• We covered the primary solutions and best fit applications for Juniper’s Packet
Optical Platforms
• The BTI Series has a modular, flexible, pay-as-you-grow architecture, it supports a
broad range of interfaces, including 10, 100, and 200Gbps
• proNX software makes service deployment and management easy
• Juniper provides a comprehensive packet + optical solution to beat the
competition
• Software licensing has been adjusted to reflect common Juniper pricing models
and practices
Optical transport technologies for high-bandwidth metro and DCI networking