SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
OAM:
Application-driven
Evolution
Yaakov (J) Stein
Chief Scientist
RAD Data Communications




                          OAM: Application-driven Evolution Slide 1
Why do we pay for services ?

 Generally good (and frequently much better than toll quality)
 voice service is available free of charge (Skype, Fring, Nimbuzz…)
So why does anyone pay for voice services ?
Similarly, one can get free
• (WiFi) Internet access
• Email boxes
• File storage and sharing
• Web hosting
• Software services

So why pay ?


                                                          OAM: Application-driven Evolution Slide 2
Paying for QoS

The simple answer is that one doesn’t pay for the
service, one pays for Quality of Service guarantees
In our voice model:
         price
                                 toll quality
                 with mobility




                                                QoS
                          BE
But what does QoS mean and why are we willing to pay
for it ?
To explain, we need to review some history
                                                      OAM: Application-driven Evolution Slide 3
Father of the telephone

Everyone knows that the father of the telephone was
Alexander Graham Bell (along with his assistant Mr.
Watson)
But Bell did not invent the telephone network
Bell and Watson sold pairs of phones to customers


The father of the telephone network was Theodore Vail




                                                OAM: Application-driven Evolution Slide 4
Theodore Vail
Theodore Who?
 • Son of Alfred Vail (Morse’s coworker)
 • Ex-General Superintendent of US Railway Mail Service
 • First general manager of Bell Telephone
 • Father of the PSTN
Why is he so important?
 • Organized PSTN
 • Established principle of reinvestment in R&D
 • Established Bell Telephones IPR division
 • Executed merger with Western Union to form AT&T
 • Solved the main technological problems
       Use of copper wire
       Use of twisted pairs
 • Organized telephony as a service (like the postal service!)
  Vailism is the philosophy that public services should be run as
        closed centralized monopolies for the public good
                                                            OAM: Application-driven Evolution Slide 5
What’s the difference ?

In the Bell-Watson model the customer pays
once, but is responsible for :
• Installation (wires, wiring)
• Operations (power, fault repair, performance
                                                 +
    – distortion and noise)
• Infrastructure maintenance


While the Bell company is responsible only for
providing functioning telephones, In the Vail
model the customer pays a monthly fee but the
provider assumes responsibility for everything
including fault repair and performance
maintenance
  The telephone company owns the telephone
  sets and even the wires in the walls !
                                                 OAM: Application-driven Evolution Slide 6
Service Level Agreements

• In order to justify recurring payments the provider agrees to a
  minimum level of service in an SLA
• SLAs should capture Quality of user Experience (QoE) but this is
  often hard to quantify
• So SLAs usually actually detail measurable network parameters that
  influence QoE, such as :
        Availability (e.g., the famous five nines)
        Time to repair (e.g., the famous 50 ms)
        Information rate (throughput)
        Information latency (delay)
        Allowable defect densities (noise/distortion)
• Availability (basic connectivity) always influences QoE
• It is hard to predict the effect of the other parameters on QoE even
  when there is only one application (e.g., voice)
• When multiple applications are in use – it may be impossible
                                                             OAM: Application-driven Evolution Slide 7
Some Applications
• System traffic
   – Routing protocols, DNS, DHCP, time delivery, system update, OAM,
     tunneling and VPN setup
• Business processes
   – Database access, backup and data-center, B2B, ERP
• Communications – interactive
   – Voice, video conferencing, Telepresence, instant messaging, remote
     desktop, application sharing
• Communications – non-interactive
   – Email, broadcast programming, music
   – Video : progressive download, live streaming, interactive
• Information gathering
   – Http(s), Web 2.0, file transfer
• Recreational
   – Gaming, p2p file transfer
• Malicious
   – DoS, malware injection, illicit information retrieval
                                                                 OAM: Application-driven Evolution Slide 8
What do applications need ?

• Some applications only require availability
• Some also require minimum available
  throughput
• Some require delay less then some end-
  end (or Real Time) delay
• Some require packet loss ratio (PLR) less
  than some percentage
   – And these parameters are not necessarily
     independent
For example, TCP throughput drops with                  1000 B packets
                                                        50 ms RTT
PLR



                                                OAM: Application-driven Evolution Slide 9
Some rules of thumb

• Mission Critical (and life critical) applications require high
  availability
• If there are any MC applications then system traffic requires high
  availability too
• MC applications do not necessarily require strict throughput but
  always indirectly require
   – A certain minimal average throughput
   – Bounded delay
• If the MC application uses TCP then it requires low PLR
• Real-time applications require sufficient throughput
   – But not necessarily low PLR (audio and video codecs have PLC)
• Interactive applications require low RT delay
   – It may be more scalable for a SP to measure 1-way delays



                                                                OAM: Application-driven Evolution Slide 10
Monitoring an SLA
• The Service Provider’s justification for payment is the
  maintenance of an SLA
• To ensure SLA compliance, the SP must :
   – Monitor the SLA parameters
   – Take action if parameter is dropping below compliance levels
But how does the SP verify/ensure that the SLA is being met ?
• Monitoring is carried out using Operations, Administration,
  Maintenance (OAM)
• The customer too may use OAM to see that the SP is compliant !
Technical note: OAM is a user-plane function but may influence control
and management plane operations, for example:
   – OAM may trigger protection switching, but doesn’t switch
   – OAM may detect provisioned links, but doesn’t provision them


                                                                    OAM: Application-driven Evolution Slide 11
Operations, Administration,
Maintenance
Traditionally, one distinguishes between 2 OAM functionalities :
1. Fault Monitoring: Required for maintenance of basic connectivity
   (availability)
   •   OAM runs continuously/periodically at required rate
   •   Detection and reporting of anomalies, defects, and failures
   •   Used to trigger mechanisms in the
              Control plane (e.g. protection switching) and
              Management plane (alarms)
1. Performance Monitoring: Required for maintenance of all other
   QoE attributes
   •   OAM run :
              Before enabling a service
              On-demand or
              Per schedule
   •   Measurement of performance criteria (delay, PDV, etc.)
                                                              OAM: Application-driven Evolution Slide 12
Early OAM

• Analog channels and 64 kbps digital channels did not have
  mechanisms to check signal validity and quality, thus:
  – Major faults could go undetected for long periods of time
  – Hard to characterize and localize faults when reported
  – Minor defects might be unnoticed indefinitely
• As PDH networks evolved, more and more OAM was
  added on:
  –   Monitoring for valid signal
  –   Loopbacks
  –   Defect reporting
  –   Alarm indication/inhibition
• The OAM overhead started to explode in size !
• When SONET/SDH was designed bounded overhead was
  reserved for OAM functions
                                                          OAM: Application-driven Evolution Slide 13
OAM for Packet Switched
Networks

• OAM is more complex for Packet Switched Networks
• In addition to the previous defects :
  – Loss of signal
  – Bit errors
• We have new defect types:
  – Packets may be lost
  – Packets may be delayed
  – Packets may delivered to the wrong destination
• The first PSN-like network to acquire OAM was ATM
  (I.610)
  – Although technically ATM is cell-based, not packet-based




                                                               OAM: Application-driven Evolution Slide 14
What about Ethernet ?

• Carrier Ethernet has replaced ATM as the default layer 2
• Ethernet is by far the most widespread network interface
  – Ethernet has some advantages as compared to ATM
  – It has network-wide unique addresses
  – It has a source address in every packet
• But some aspects make Ethernet OAM more difficult
  –   Connection-Less (CL)
  –   Multipoint to multipoint
  –   Overlapping layering – need OAM for operator, SPs, customer
  –   Some specific problematic ETH behaviors (flooding, multicast …)




                                                            OAM: Application-driven Evolution Slide 15
What’s the problem with CL ?

• OAM makes a lot of sense in Connection Oriented
  environments
  – Connections last a relatively long amount of time
  – There is some SLA at the connection level
• For CL networks, the network path is neither known nor
  pinned, so it doesn’t really make sense to talk about FM
  – What does continuity mean if when a link goes down, the
    network automatically reroutes around the failure ?
• The Ethernet CL problem is solved by overlaying CO
  functionality :
  – Flows, or
  – EVCs



                                                        OAM: Application-driven Evolution Slide 16
Ethernet OAM

For many years there was no OAM for Ethernet (LANs don’t need
OAM), now there are two incompatible ones!
• Link layer OAM – 802.3 clause 57 (EFM OAM, 802.3ah)
   – Single link only
   – Slow protocol, limited functionality
   – Some management functions
• Service OAM – Y.1731, 802.1ag (CFM)
   – Any network configuration
   – Multilevel OAM functionality
• In some cases one may need to run both, while in others only service OAM
  makes sense
• Link layer OAM is only for a single link, which is necessarily CO
• Service OAM is most frequently used for infrastructure networks,
  which are also CO
                                                               OAM: Application-driven Evolution Slide 17
MEPs and MIPs




                OAM: Application-driven Evolution Slide 18
What about MPLS ?

• The other L2 used today is MPLS
• OAM mechanisms that work well for Ethernet can not be used
  as-is for MPLS. This is because :
   –   MPLS does not use absolute addresses
   –   MPLS packets do not carry source addresses
   –   when using LDP MPLS is not pure CO
   –   LSPs are unidirectional entities
• The IETF has defined LSP ping that provides basic OAM
   – Continuity
   – Trace route
• The ITU defined Y.1711, but it has not seen widespread use
• The MPLS community is now working on MPLS-TP which is
  basically MPLS + strong OAM (FM + PM)
   – And functionalities dependent on OAM, such as protection
     switching
                                                                OAM: Application-driven Evolution Slide 19
What about IP ?

• It makes sense to monitor IP (IPv4/IPv6) performance as
  well
   – IP is the most popular end-to-end protocol
   – IP connectivity can be purchased (although perhaps not
     widely with SLAs)
• But from the OAM point of view, IP is the hardest of all
   – the IP protocol suite does not define anything beneath L3
   – IP is always pure Connection-Less
• In certain cases it may make more sense to jump directly
  to application flows



                                                           OAM: Application-driven Evolution Slide 20
IP OAM

• For IP, one usually talks about OAM between end-points

• The IETF defines an all-purpose OAM + control protocol :
  – ICMP (Internet Control Message Protocol)
• A protocol for FM :
  – BFD (Bidirectional Forwarding Detection)
• And two sophisticated protocols for PM :
  – OWAMP (One Way Active Measurement Protocol)
  – TWAMP (Two Way Active Measurement Protocol)
OWAMP and TWAMP are the only OAM protocols
with full security features !




                                                      OAM: Application-driven Evolution Slide 21
Summary

• It is advantageous to run networks as provided services
• Service provider income depends on SLA compliance
• SLA compliance requires OAM – FM and PM
• OAM protocols now exist for all relevant technologies :
  –   TDM – SDH
  –   Ethernet
  –   MPLS
  –   IP
• Ethernet is leading in OAM functionality, but MPLS-TP is
  rapidly catching up
• IP can not have FM tools as robust as Ethernet/MPLS, but
  already has more sophisticated PM ones

                                                      OAM: Application-driven Evolution Slide 22
Thank You
For Your
Attention

                 www.rad.com

            OAM: Application-driven Evolution Slide 23

Más contenido relacionado

La actualidad más candente

01 lte radio_parameters_lte_overview_rl1
01 lte radio_parameters_lte_overview_rl101 lte radio_parameters_lte_overview_rl1
01 lte radio_parameters_lte_overview_rl1Md.Akm Sahansha
 
Cygnotel Prueba 01
Cygnotel Prueba 01Cygnotel Prueba 01
Cygnotel Prueba 01cygnotel
 
NSN A-1210 Product_flyer
NSN A-1210 Product_flyerNSN A-1210 Product_flyer
NSN A-1210 Product_flyerMoshe Elkobi
 
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PROIDEA
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-aluMilind Gunjan
 
Voip over-wireless-network-wipro-technologiesbangalore2161
Voip over-wireless-network-wipro-technologiesbangalore2161Voip over-wireless-network-wipro-technologiesbangalore2161
Voip over-wireless-network-wipro-technologiesbangalore2161Trung Phan
 
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) BP Tiwari
 
1.training lte ran kpi & counters rjil
1.training lte ran kpi & counters rjil1.training lte ran kpi & counters rjil
1.training lte ran kpi & counters rjilSatish Jadav
 
Munendra Singh Jadon LTE Optimization (1)
Munendra Singh Jadon LTE Optimization (1)Munendra Singh Jadon LTE Optimization (1)
Munendra Singh Jadon LTE Optimization (1)Munendra singh jadon
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
 
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTEAIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTEAIRCOM International
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
 
3g-lte-oss-performance-management
3g-lte-oss-performance-management3g-lte-oss-performance-management
3g-lte-oss-performance-managementvishal123
 
RCS Service Monitoring - 1-to-1 Chat
RCS Service Monitoring - 1-to-1 ChatRCS Service Monitoring - 1-to-1 Chat
RCS Service Monitoring - 1-to-1 ChatJose Gonzalez
 
Training wcdma rf optimization gsm to umts
Training wcdma rf optimization gsm to umtsTraining wcdma rf optimization gsm to umts
Training wcdma rf optimization gsm to umtsAbed Abed
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introductionRay KHASTUR
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Canada
 
Analysis of lte_radio_parameter_in_diffe
Analysis of lte_radio_parameter_in_diffeAnalysis of lte_radio_parameter_in_diffe
Analysis of lte_radio_parameter_in_diffeMd.Akm Sahansha
 

La actualidad más candente (20)

01 lte radio_parameters_lte_overview_rl1
01 lte radio_parameters_lte_overview_rl101 lte radio_parameters_lte_overview_rl1
01 lte radio_parameters_lte_overview_rl1
 
Cygnotel Prueba 01
Cygnotel Prueba 01Cygnotel Prueba 01
Cygnotel Prueba 01
 
NSN A-1210 Product_flyer
NSN A-1210 Product_flyerNSN A-1210 Product_flyer
NSN A-1210 Product_flyer
 
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
PLNOG 8: Alessandro Fiaschi - The Edge-Core Networks
 
LTE handover
LTE handoverLTE handover
LTE handover
 
5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu5.2 qos priority_preemption-alu
5.2 qos priority_preemption-alu
 
Voip over-wireless-network-wipro-technologiesbangalore2161
Voip over-wireless-network-wipro-technologiesbangalore2161Voip over-wireless-network-wipro-technologiesbangalore2161
Voip over-wireless-network-wipro-technologiesbangalore2161
 
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
 
1.training lte ran kpi & counters rjil
1.training lte ran kpi & counters rjil1.training lte ran kpi & counters rjil
1.training lte ran kpi & counters rjil
 
Munendra Singh Jadon LTE Optimization (1)
Munendra Singh Jadon LTE Optimization (1)Munendra Singh Jadon LTE Optimization (1)
Munendra Singh Jadon LTE Optimization (1)
 
What LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and OptimizedWhat LTE Parameters need to be Dimensioned and Optimized
What LTE Parameters need to be Dimensioned and Optimized
 
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTEAIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
AIRCOM LTE Webinar 6 - Comparison between GSM, UMTS & LTE
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 
3g-lte-oss-performance-management
3g-lte-oss-performance-management3g-lte-oss-performance-management
3g-lte-oss-performance-management
 
RCS Service Monitoring - 1-to-1 Chat
RCS Service Monitoring - 1-to-1 ChatRCS Service Monitoring - 1-to-1 Chat
RCS Service Monitoring - 1-to-1 Chat
 
Training wcdma rf optimization gsm to umts
Training wcdma rf optimization gsm to umtsTraining wcdma rf optimization gsm to umts
Training wcdma rf optimization gsm to umts
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introduction
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
 
Lte kpis
Lte kpisLte kpis
Lte kpis
 
Analysis of lte_radio_parameter_in_diffe
Analysis of lte_radio_parameter_in_diffeAnalysis of lte_radio_parameter_in_diffe
Analysis of lte_radio_parameter_in_diffe
 

Destacado

[Tripo] 輕鬆架站使用 twamp
[Tripo]   輕鬆架站使用 twamp[Tripo]   輕鬆架站使用 twamp
[Tripo] 輕鬆架站使用 twamptripocom
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshootingSam Van Loon
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeADVA
 
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsSitha Sok
 
Passive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overviewPassive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overviewLuc De Heyn
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceJohn Loughney
 
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big VideoZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big VideoSitha Sok
 
Fso free space optic
Fso free space optic Fso free space optic
Fso free space optic Abel Ngetich
 
Microwave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multibandMicrowave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multibandSitha Sok
 
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and TransmissionEmerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and TransmissionSitha Sok
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 
Broadband quality of service thirumurthy
Broadband quality of service thirumurthyBroadband quality of service thirumurthy
Broadband quality of service thirumurthynirmalis
 
Free Space Optical Communication
Free Space Optical CommunicationFree Space Optical Communication
Free Space Optical CommunicationRomil Shah
 

Destacado (20)

[Tripo] 輕鬆架站使用 twamp
[Tripo]   輕鬆架站使用 twamp[Tripo]   輕鬆架站使用 twamp
[Tripo] 輕鬆架站使用 twamp
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
 
FTTH
FTTHFTTH
FTTH
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communicationsZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
ZTE COMMUNICATIONS No.2 2016 : Optical wireless communications
 
Passive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overviewPassive infrastructure of FTTH networks: an overview
Passive infrastructure of FTTH networks: an overview
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task Force
 
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big VideoZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
ZTE TECHNOLOGIES No.3 2016 - Special topic: Big Video
 
Fso free space optic
Fso free space optic Fso free space optic
Fso free space optic
 
Microwave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multibandMicrowave backhaul gets a boost with multiband
Microwave backhaul gets a boost with multiband
 
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and TransmissionEmerging Technologies of Future Multimedia Coding, Analysis and Transmission
Emerging Technologies of Future Multimedia Coding, Analysis and Transmission
 
Broadband Cellular Communication (Vol 2 Issue 2)
Broadband Cellular Communication (Vol 2 Issue 2)Broadband Cellular Communication (Vol 2 Issue 2)
Broadband Cellular Communication (Vol 2 Issue 2)
 
Fso
FsoFso
Fso
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
free space optics
free space opticsfree space optics
free space optics
 
Broadband quality of service thirumurthy
Broadband quality of service thirumurthyBroadband quality of service thirumurthy
Broadband quality of service thirumurthy
 
Free space optics communication
Free space optics communicationFree space optics communication
Free space optics communication
 
Free Space Optical Communication
Free Space Optical CommunicationFree Space Optical Communication
Free Space Optical Communication
 
Introduction To Fso Technology
Introduction To Fso TechnologyIntroduction To Fso Technology
Introduction To Fso Technology
 

Similar a Ethernet OAM evolution

IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Transport SDN @ OIF
Transport SDN @ OIFTransport SDN @ OIF
Transport SDN @ OIFCPqD
 
Can today’s Internet protocols deliver URLLC?
Can today’s Internet protocols deliver URLLC?Can today’s Internet protocols deliver URLLC?
Can today’s Internet protocols deliver URLLC?3G4G
 
Blasting Out of the Past with OSGi - Keith McFarlane
Blasting Out of the Past with OSGi - Keith McFarlaneBlasting Out of the Past with OSGi - Keith McFarlane
Blasting Out of the Past with OSGi - Keith McFarlanemfrancis
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA WebinarBrian Ray
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...Javier Gonzalez
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesBrian Ray
 
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir
 
IMS and WebRTC Workshop from Alan Quayle
IMS and WebRTC Workshop from Alan QuayleIMS and WebRTC Workshop from Alan Quayle
IMS and WebRTC Workshop from Alan QuayleAlan Quayle
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11nswathi b
 
Advanced Troubleshooting in a DOCSIS 3.0 Plant
Advanced Troubleshooting in a DOCSIS 3.0 PlantAdvanced Troubleshooting in a DOCSIS 3.0 Plant
Advanced Troubleshooting in a DOCSIS 3.0 PlantThe Volpe Firm, Inc.
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPDai Yang
 

Similar a Ethernet OAM evolution (20)

IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Transport SDN @ OIF
Transport SDN @ OIFTransport SDN @ OIF
Transport SDN @ OIF
 
Can today’s Internet protocols deliver URLLC?
Can today’s Internet protocols deliver URLLC?Can today’s Internet protocols deliver URLLC?
Can today’s Internet protocols deliver URLLC?
 
Blasting Out of the Past with OSGi - Keith McFarlane
Blasting Out of the Past with OSGi - Keith McFarlaneBlasting Out of the Past with OSGi - Keith McFarlane
Blasting Out of the Past with OSGi - Keith McFarlane
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
10 fn s44
10 fn s4410 fn s44
10 fn s44
 
10 fn s44
10 fn s4410 fn s44
10 fn s44
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slides
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile GatewaysLahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir - Massively Scaleable Mobile Gateways
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
IMS and WebRTC Workshop from Alan Quayle
IMS and WebRTC Workshop from Alan QuayleIMS and WebRTC Workshop from Alan Quayle
IMS and WebRTC Workshop from Alan Quayle
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
Advanced Troubleshooting in a DOCSIS 3.0 Plant
Advanced Troubleshooting in a DOCSIS 3.0 PlantAdvanced Troubleshooting in a DOCSIS 3.0 Plant
Advanced Troubleshooting in a DOCSIS 3.0 Plant
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IP
 
Bluetube
BluetubeBluetube
Bluetube
 

Más de Nir Cohen

Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration SolutionsNir Cohen
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deploymentsNir Cohen
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationNir Cohen
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-complianceNir Cohen
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsNir Cohen
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsNir Cohen
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networksNir Cohen
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guideNir Cohen
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationNir Cohen
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperNir Cohen
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationNir Cohen
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcationNir Cohen
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challengesNir Cohen
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Nir Cohen
 
Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Nir Cohen
 

Más de Nir Cohen (18)

Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentation
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networks
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guide
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
 
Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Ethernet OAM evolution

  • 1. OAM: Application-driven Evolution Yaakov (J) Stein Chief Scientist RAD Data Communications OAM: Application-driven Evolution Slide 1
  • 2. Why do we pay for services ? Generally good (and frequently much better than toll quality) voice service is available free of charge (Skype, Fring, Nimbuzz…) So why does anyone pay for voice services ? Similarly, one can get free • (WiFi) Internet access • Email boxes • File storage and sharing • Web hosting • Software services So why pay ? OAM: Application-driven Evolution Slide 2
  • 3. Paying for QoS The simple answer is that one doesn’t pay for the service, one pays for Quality of Service guarantees In our voice model: price toll quality with mobility QoS BE But what does QoS mean and why are we willing to pay for it ? To explain, we need to review some history OAM: Application-driven Evolution Slide 3
  • 4. Father of the telephone Everyone knows that the father of the telephone was Alexander Graham Bell (along with his assistant Mr. Watson) But Bell did not invent the telephone network Bell and Watson sold pairs of phones to customers The father of the telephone network was Theodore Vail OAM: Application-driven Evolution Slide 4
  • 5. Theodore Vail Theodore Who? • Son of Alfred Vail (Morse’s coworker) • Ex-General Superintendent of US Railway Mail Service • First general manager of Bell Telephone • Father of the PSTN Why is he so important? • Organized PSTN • Established principle of reinvestment in R&D • Established Bell Telephones IPR division • Executed merger with Western Union to form AT&T • Solved the main technological problems Use of copper wire Use of twisted pairs • Organized telephony as a service (like the postal service!) Vailism is the philosophy that public services should be run as closed centralized monopolies for the public good OAM: Application-driven Evolution Slide 5
  • 6. What’s the difference ? In the Bell-Watson model the customer pays once, but is responsible for : • Installation (wires, wiring) • Operations (power, fault repair, performance + – distortion and noise) • Infrastructure maintenance While the Bell company is responsible only for providing functioning telephones, In the Vail model the customer pays a monthly fee but the provider assumes responsibility for everything including fault repair and performance maintenance The telephone company owns the telephone sets and even the wires in the walls ! OAM: Application-driven Evolution Slide 6
  • 7. Service Level Agreements • In order to justify recurring payments the provider agrees to a minimum level of service in an SLA • SLAs should capture Quality of user Experience (QoE) but this is often hard to quantify • So SLAs usually actually detail measurable network parameters that influence QoE, such as : Availability (e.g., the famous five nines) Time to repair (e.g., the famous 50 ms) Information rate (throughput) Information latency (delay) Allowable defect densities (noise/distortion) • Availability (basic connectivity) always influences QoE • It is hard to predict the effect of the other parameters on QoE even when there is only one application (e.g., voice) • When multiple applications are in use – it may be impossible OAM: Application-driven Evolution Slide 7
  • 8. Some Applications • System traffic – Routing protocols, DNS, DHCP, time delivery, system update, OAM, tunneling and VPN setup • Business processes – Database access, backup and data-center, B2B, ERP • Communications – interactive – Voice, video conferencing, Telepresence, instant messaging, remote desktop, application sharing • Communications – non-interactive – Email, broadcast programming, music – Video : progressive download, live streaming, interactive • Information gathering – Http(s), Web 2.0, file transfer • Recreational – Gaming, p2p file transfer • Malicious – DoS, malware injection, illicit information retrieval OAM: Application-driven Evolution Slide 8
  • 9. What do applications need ? • Some applications only require availability • Some also require minimum available throughput • Some require delay less then some end- end (or Real Time) delay • Some require packet loss ratio (PLR) less than some percentage – And these parameters are not necessarily independent For example, TCP throughput drops with 1000 B packets 50 ms RTT PLR OAM: Application-driven Evolution Slide 9
  • 10. Some rules of thumb • Mission Critical (and life critical) applications require high availability • If there are any MC applications then system traffic requires high availability too • MC applications do not necessarily require strict throughput but always indirectly require – A certain minimal average throughput – Bounded delay • If the MC application uses TCP then it requires low PLR • Real-time applications require sufficient throughput – But not necessarily low PLR (audio and video codecs have PLC) • Interactive applications require low RT delay – It may be more scalable for a SP to measure 1-way delays OAM: Application-driven Evolution Slide 10
  • 11. Monitoring an SLA • The Service Provider’s justification for payment is the maintenance of an SLA • To ensure SLA compliance, the SP must : – Monitor the SLA parameters – Take action if parameter is dropping below compliance levels But how does the SP verify/ensure that the SLA is being met ? • Monitoring is carried out using Operations, Administration, Maintenance (OAM) • The customer too may use OAM to see that the SP is compliant ! Technical note: OAM is a user-plane function but may influence control and management plane operations, for example: – OAM may trigger protection switching, but doesn’t switch – OAM may detect provisioned links, but doesn’t provision them OAM: Application-driven Evolution Slide 11
  • 12. Operations, Administration, Maintenance Traditionally, one distinguishes between 2 OAM functionalities : 1. Fault Monitoring: Required for maintenance of basic connectivity (availability) • OAM runs continuously/periodically at required rate • Detection and reporting of anomalies, defects, and failures • Used to trigger mechanisms in the Control plane (e.g. protection switching) and Management plane (alarms) 1. Performance Monitoring: Required for maintenance of all other QoE attributes • OAM run : Before enabling a service On-demand or Per schedule • Measurement of performance criteria (delay, PDV, etc.) OAM: Application-driven Evolution Slide 12
  • 13. Early OAM • Analog channels and 64 kbps digital channels did not have mechanisms to check signal validity and quality, thus: – Major faults could go undetected for long periods of time – Hard to characterize and localize faults when reported – Minor defects might be unnoticed indefinitely • As PDH networks evolved, more and more OAM was added on: – Monitoring for valid signal – Loopbacks – Defect reporting – Alarm indication/inhibition • The OAM overhead started to explode in size ! • When SONET/SDH was designed bounded overhead was reserved for OAM functions OAM: Application-driven Evolution Slide 13
  • 14. OAM for Packet Switched Networks • OAM is more complex for Packet Switched Networks • In addition to the previous defects : – Loss of signal – Bit errors • We have new defect types: – Packets may be lost – Packets may be delayed – Packets may delivered to the wrong destination • The first PSN-like network to acquire OAM was ATM (I.610) – Although technically ATM is cell-based, not packet-based OAM: Application-driven Evolution Slide 14
  • 15. What about Ethernet ? • Carrier Ethernet has replaced ATM as the default layer 2 • Ethernet is by far the most widespread network interface – Ethernet has some advantages as compared to ATM – It has network-wide unique addresses – It has a source address in every packet • But some aspects make Ethernet OAM more difficult – Connection-Less (CL) – Multipoint to multipoint – Overlapping layering – need OAM for operator, SPs, customer – Some specific problematic ETH behaviors (flooding, multicast …) OAM: Application-driven Evolution Slide 15
  • 16. What’s the problem with CL ? • OAM makes a lot of sense in Connection Oriented environments – Connections last a relatively long amount of time – There is some SLA at the connection level • For CL networks, the network path is neither known nor pinned, so it doesn’t really make sense to talk about FM – What does continuity mean if when a link goes down, the network automatically reroutes around the failure ? • The Ethernet CL problem is solved by overlaying CO functionality : – Flows, or – EVCs OAM: Application-driven Evolution Slide 16
  • 17. Ethernet OAM For many years there was no OAM for Ethernet (LANs don’t need OAM), now there are two incompatible ones! • Link layer OAM – 802.3 clause 57 (EFM OAM, 802.3ah) – Single link only – Slow protocol, limited functionality – Some management functions • Service OAM – Y.1731, 802.1ag (CFM) – Any network configuration – Multilevel OAM functionality • In some cases one may need to run both, while in others only service OAM makes sense • Link layer OAM is only for a single link, which is necessarily CO • Service OAM is most frequently used for infrastructure networks, which are also CO OAM: Application-driven Evolution Slide 17
  • 18. MEPs and MIPs OAM: Application-driven Evolution Slide 18
  • 19. What about MPLS ? • The other L2 used today is MPLS • OAM mechanisms that work well for Ethernet can not be used as-is for MPLS. This is because : – MPLS does not use absolute addresses – MPLS packets do not carry source addresses – when using LDP MPLS is not pure CO – LSPs are unidirectional entities • The IETF has defined LSP ping that provides basic OAM – Continuity – Trace route • The ITU defined Y.1711, but it has not seen widespread use • The MPLS community is now working on MPLS-TP which is basically MPLS + strong OAM (FM + PM) – And functionalities dependent on OAM, such as protection switching OAM: Application-driven Evolution Slide 19
  • 20. What about IP ? • It makes sense to monitor IP (IPv4/IPv6) performance as well – IP is the most popular end-to-end protocol – IP connectivity can be purchased (although perhaps not widely with SLAs) • But from the OAM point of view, IP is the hardest of all – the IP protocol suite does not define anything beneath L3 – IP is always pure Connection-Less • In certain cases it may make more sense to jump directly to application flows OAM: Application-driven Evolution Slide 20
  • 21. IP OAM • For IP, one usually talks about OAM between end-points • The IETF defines an all-purpose OAM + control protocol : – ICMP (Internet Control Message Protocol) • A protocol for FM : – BFD (Bidirectional Forwarding Detection) • And two sophisticated protocols for PM : – OWAMP (One Way Active Measurement Protocol) – TWAMP (Two Way Active Measurement Protocol) OWAMP and TWAMP are the only OAM protocols with full security features ! OAM: Application-driven Evolution Slide 21
  • 22. Summary • It is advantageous to run networks as provided services • Service provider income depends on SLA compliance • SLA compliance requires OAM – FM and PM • OAM protocols now exist for all relevant technologies : – TDM – SDH – Ethernet – MPLS – IP • Ethernet is leading in OAM functionality, but MPLS-TP is rapidly catching up • IP can not have FM tools as robust as Ethernet/MPLS, but already has more sophisticated PM ones OAM: Application-driven Evolution Slide 22
  • 23. Thank You For Your Attention www.rad.com OAM: Application-driven Evolution Slide 23