SlideShare a Scribd company logo
1 | Infinera Confidential & Proprietary
Network Cost Savings and Service
Differentiation using Priority-driven sub-
50ms Shared Mesh Protection
Soumya Roy (Speaker), Sudhindra A. Kota, Onur Turkcu,
Steven Hand, Krish Verma, Rajan Rao
Infinera Corporation
2 | Infinera Confidential & Proprietary
Resiliency Requirements for Today’s Networks
OpticalNetworksarenowmesh-centric
• Variable performance
• Multiple failure protection
• Recovery via unused
bandwidth lowering cost
Dynamic Re-routing
Optical Cross-Connect Switches
• <50 ms switching
• Protection for 1 failure
• Dedicated protection
bandwidth ($$$$)
1+1 SNCP Protection
DWDM Networks
• Deterministic behavior, within 50
milliseconds
Fast Recovery
• Single failure recovery no longer
sufficient
Multi-failure backups
• Intelligent sharing of backup resources
without losing availability
Network Efficiency
3 | Infinera Confidential & Proprietary
Hardware-accelerated Fast Shared Mesh Protection
Deterministicsub-50msProtection*
• Deterministic behavior, within 50
milliseconds
Fast Recovery
• Single failure recovery no longer
sufficient
Multi-failure backups
• Intelligent sharing of backup resources
without losing availability
Network Efficiency
 Emerging ITU standards
• G.808.3 & G.ODUSMP
 Logical protection paths
• “Virtual” until activated
 Fast activation of protection path
• Hardware acceleration
Provides the advantages of:
 Deterministic, sub-50 ms
performance
 Multiple failure protection
 Shared protection bandwidth for
Better network economics
*W. Wauford et al, ECOC -2013: Novel design of G. ODUSMP to achieve
sub-50 ms performance with shared mesh protection in carrier networks
4 | Infinera Confidential & Proprietary
Shared Mesh Protection (SMP)
MethodOfOperation
Working Path (High Priority Service)
SMP Path (High Priority Service)
SMP Path (Low Priority Service)
Working Path (Low Priority Service)
1. LINK FAILURE
3. SMP PATH
ACTIVATION
2. DATA-PATH
FAILURE
NOTIFICATION
Sharing of Bandwidth
Among Protection Paths
5 | Infinera Confidential & Proprietary
Shared Mesh Protection (SMP)
ServiceDifferentiationwithPre-emption
Working Path (High Priority Service)
SMP Path (High Priority Service)
4. LINK FAILURE
SMP Path (Low Priority Service)
Working Path (Low Priority Service)
1. LINK FAILURE
Sharing of Bandwidth
Among Protect Paths
Msg #7 is only additional message required for pre-emption.
Cross-connect over-ride only, no additional time for protection path activation.
Pre-emption of ‘Extra traffic’ follows same mechanisms.
6 | Infinera Confidential & Proprietary
Simulation Scenario
Objective:EvaluateNetworkCostSavingswithSMPusingServiceDifferentiation
Pan-USA Network
 Traffic Client Rate:
• Mix of 10G, 40G, 100G Clients
• Mix of Data Center, Transcontinental, city-to-city traffic
 50% High Priority and 50% Low Priority Traffic
 100G DWDM with real-world deployment rules
7 | Infinera Confidential & Proprietary
Economics of Deploying Different Protection Schemes
 All SMP mechanisms use significantly lower number of modules compared to 1+1 protection
 With 10% Additional Line Modules compared to zero-protection scenario, strict SLAs are
guaranteed for 50% of traffic (high priority)
% Additional Resources for Different Protection Options
8 | Infinera Confidential & Proprietary
Failure Detection Time and ServiceRecovery Time
 Impacted Demands satisfy sub-50ms
recovery time
 Recovery time does not change with
number of Impacted Demands
*Recovery Time Computed using CSIM integrated with Planning Tool
9 | Infinera Confidential & Proprietary
 Fast Shared Mesh Protection with service priority opens
up new possibilities
• High savings by sharing of resources
• Low cost network while ensuring strict SLAs (sub-50ms recovery) for high
priority traffic only
• Further savings by pre-emption of ‘Extra Traffic’
 Pre-emption of extra traffic/protection traffic has no
impact on recovery time
• Recovery time does not depend on number of impacted demands
• Pre-emption enables protection prioritization in multiple-failure scenarios
Summary
10 | Infinera Confidential & Proprietary
Thank You

More Related Content

What's hot

01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
Directorate of Information Security | Ditjen Aptika
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
Kazuhiko Kato
 
Cresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPGCresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPG
Thorne & Derrick International
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
Editor Jacotech
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
Hussein Elmenshawy
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
 
Reengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighterReengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighter
jchapin
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
CIMCO MPLS
CIMCO MPLSCIMCO MPLS
CIMCO MPLS
Sara Webb
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environmentASBIS SK
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
Sai Sirisha
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
Jitendra s Rathore
 

What's hot (17)

01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
 
Week14
Week14Week14
Week14
 
Cresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPGCresatech CuTS ZM & LV Presentation NPG
Cresatech CuTS ZM & LV Presentation NPG
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Reengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighterReengineering the GIG to support the warfighter
Reengineering the GIG to support the warfighter
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
CIMCO MPLS
CIMCO MPLSCIMCO MPLS
CIMCO MPLS
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 

Similar to Network cost savings and service differentiation using priority driven sub-50ms shared mesh protection - soumya

Unified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networkingUnified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networking
Anuj Malik
 
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less CostFastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
Infinera
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center Networking
Infinera
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
Rebekah Rodriguez
 
Agile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huaweiAgile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huawei
Commonwealth Telecommunications Organisation
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
SyedShaharyaarHussai
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Alidu Abubakari
 
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
Edge AI and Vision Alliance
 
Capacity and Availability for Maximum Performance
Capacity and Availability for Maximum PerformanceCapacity and Availability for Maximum Performance
Capacity and Availability for Maximum Performance
Don Talend
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0PHIL110
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
UtkarshMishra600872
 
6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architectureCPqD
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...
Anuj Malik
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
3G4G
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
indonesiabelajar
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport Networks
Infinera
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
narmada alaparthi
 
IoT and Smart Grids II
IoT and Smart Grids IIIoT and Smart Grids II
IoT and Smart Grids II
Justin Hayward
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Deepak Shankar
 

Similar to Network cost savings and service differentiation using priority driven sub-50ms shared mesh protection - soumya (20)

Unified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networkingUnified subsea terrestrial mesh networking
Unified subsea terrestrial mesh networking
 
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less CostFastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
FastSMP: Next Generation Approach to Protection: More Reliable, Less Cost
 
Next Generation Inter-Data Center Networking
Next Generation Inter-Data Center NetworkingNext Generation Inter-Data Center Networking
Next Generation Inter-Data Center Networking
 
Chapter02
Chapter02Chapter02
Chapter02
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Agile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huaweiAgile network agile world, tayo ashiru, huawei
Agile network agile world, tayo ashiru, huawei
 
NOMA in 5G Networks
NOMA in 5G NetworksNOMA in 5G Networks
NOMA in 5G Networks
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
“Using a Neural Processor for Always-sensing Cameras,” a Presentation from Ex...
 
Capacity and Availability for Maximum Performance
Capacity and Availability for Maximum PerformanceCapacity and Availability for Maximum Performance
Capacity and Availability for Maximum Performance
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture6 lte-a challenges and evolving lte network architecture
6 lte-a challenges and evolving lte network architecture
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...
 
Critical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technologyCritical networking using mesh Wi-SUN technology
Critical networking using mesh Wi-SUN technology
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
 
The Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport NetworksThe Optical Reboot: Radical Changes in Service Provider Transport Networks
The Optical Reboot: Radical Changes in Service Provider Transport Networks
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
 
IoT and Smart Grids II
IoT and Smart Grids IIIoT and Smart Grids II
IoT and Smart Grids II
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Network cost savings and service differentiation using priority driven sub-50ms shared mesh protection - soumya

  • 1. 1 | Infinera Confidential & Proprietary Network Cost Savings and Service Differentiation using Priority-driven sub- 50ms Shared Mesh Protection Soumya Roy (Speaker), Sudhindra A. Kota, Onur Turkcu, Steven Hand, Krish Verma, Rajan Rao Infinera Corporation
  • 2. 2 | Infinera Confidential & Proprietary Resiliency Requirements for Today’s Networks OpticalNetworksarenowmesh-centric • Variable performance • Multiple failure protection • Recovery via unused bandwidth lowering cost Dynamic Re-routing Optical Cross-Connect Switches • <50 ms switching • Protection for 1 failure • Dedicated protection bandwidth ($$$$) 1+1 SNCP Protection DWDM Networks • Deterministic behavior, within 50 milliseconds Fast Recovery • Single failure recovery no longer sufficient Multi-failure backups • Intelligent sharing of backup resources without losing availability Network Efficiency
  • 3. 3 | Infinera Confidential & Proprietary Hardware-accelerated Fast Shared Mesh Protection Deterministicsub-50msProtection* • Deterministic behavior, within 50 milliseconds Fast Recovery • Single failure recovery no longer sufficient Multi-failure backups • Intelligent sharing of backup resources without losing availability Network Efficiency  Emerging ITU standards • G.808.3 & G.ODUSMP  Logical protection paths • “Virtual” until activated  Fast activation of protection path • Hardware acceleration Provides the advantages of:  Deterministic, sub-50 ms performance  Multiple failure protection  Shared protection bandwidth for Better network economics *W. Wauford et al, ECOC -2013: Novel design of G. ODUSMP to achieve sub-50 ms performance with shared mesh protection in carrier networks
  • 4. 4 | Infinera Confidential & Proprietary Shared Mesh Protection (SMP) MethodOfOperation Working Path (High Priority Service) SMP Path (High Priority Service) SMP Path (Low Priority Service) Working Path (Low Priority Service) 1. LINK FAILURE 3. SMP PATH ACTIVATION 2. DATA-PATH FAILURE NOTIFICATION Sharing of Bandwidth Among Protection Paths
  • 5. 5 | Infinera Confidential & Proprietary Shared Mesh Protection (SMP) ServiceDifferentiationwithPre-emption Working Path (High Priority Service) SMP Path (High Priority Service) 4. LINK FAILURE SMP Path (Low Priority Service) Working Path (Low Priority Service) 1. LINK FAILURE Sharing of Bandwidth Among Protect Paths Msg #7 is only additional message required for pre-emption. Cross-connect over-ride only, no additional time for protection path activation. Pre-emption of ‘Extra traffic’ follows same mechanisms.
  • 6. 6 | Infinera Confidential & Proprietary Simulation Scenario Objective:EvaluateNetworkCostSavingswithSMPusingServiceDifferentiation Pan-USA Network  Traffic Client Rate: • Mix of 10G, 40G, 100G Clients • Mix of Data Center, Transcontinental, city-to-city traffic  50% High Priority and 50% Low Priority Traffic  100G DWDM with real-world deployment rules
  • 7. 7 | Infinera Confidential & Proprietary Economics of Deploying Different Protection Schemes  All SMP mechanisms use significantly lower number of modules compared to 1+1 protection  With 10% Additional Line Modules compared to zero-protection scenario, strict SLAs are guaranteed for 50% of traffic (high priority) % Additional Resources for Different Protection Options
  • 8. 8 | Infinera Confidential & Proprietary Failure Detection Time and ServiceRecovery Time  Impacted Demands satisfy sub-50ms recovery time  Recovery time does not change with number of Impacted Demands *Recovery Time Computed using CSIM integrated with Planning Tool
  • 9. 9 | Infinera Confidential & Proprietary  Fast Shared Mesh Protection with service priority opens up new possibilities • High savings by sharing of resources • Low cost network while ensuring strict SLAs (sub-50ms recovery) for high priority traffic only • Further savings by pre-emption of ‘Extra Traffic’  Pre-emption of extra traffic/protection traffic has no impact on recovery time • Recovery time does not depend on number of impacted demands • Pre-emption enables protection prioritization in multiple-failure scenarios Summary
  • 10. 10 | Infinera Confidential & Proprietary Thank You