A "Policy-driven" approach of SLA Management

Size: px
Start display at page:

Download "A "Policy-driven" approach of SLA Management"

Transcription

1 A "-driven" approach of SLA Management Olivier Poupel, Arnaud Gonguet ALCATEL Route de Nozay, F Marcoussis Cedex, France. RÉSUMÉ Depuis plusieurs années, le monde des réseaux connaît deux évolutions majeures. L une, technique, due à la convergence des réseaux voix et données et au développement des applications communicantes qui requièrent une capacité, une disponibilité et une qualité croissante pour la transmission des informations. La deuxième évolution marque un changement dans l utilisation des réseaux : les flux des services circulant sur les réseaux ont chacun des contraintes différentes. Les opérateurs orientent donc leur gestion de réseaux vers la gestion des services. Parallèlement, apparaissent différentes approches «-driven» de gestion de réseaux. Le but de cet article est de montrer en quoi une approche «-driven» peut aussi servir à gérer des services. ABSTRACT. Since several years, the network area is going through two main evolutions. The first, technical, due to the convergence of the voice and data networks, and to the new communicating applications which require increasing capacity, availability and quality for the transmission of information. The second evolution is a new usage of networks: service flows transmitted over the networks each have different and specific constraints. Operators are now turning the network management to the management of services. At the same time, several -driven approaches of network management are looming on. This article aims at showing how a -driven approach can also be used to manage services. MOTS-CLÉS : Contrat de Niveau de Service (SLA), Gestion de SLA,, Gestion "driven", Modèle informationel de KEYWORDS: SLA, Service Level Agreement, SLA Management,, -based management, information model.

2 2 GRES, Décembre 2001, Marrakech. Introduction Since several years, the network area is going through two main evolutions. The first, technical, due to the convergence of the voice and data networks, puts operators in front of new network management problem. Moreover, the new communicating applications, more and more appreciated by end users, require increasing capacity, availability and quality for the transmission of information. The second evolution is a new usage of networks: service flows transmitted over the networks each have different and specific constraints that have to be taken into account in order to ensure the quality of the services. Operators are now turning the network management to the management of services. At the same time, several -driven approaches of network management are looming on. Since several years, standardization bodies have launched actions in this way. This article, structured on fifth parts, aims at showing how a driven approach can also be used to manage services. The first part introduces principles of network management by policies, through the works done in different standardization bodies. A service can be described thanks to an SLA (Service Level Agreement), which is a contract linking a client and a service provider, precisely defining rights and duties of each concerned parties. Several types of SLA exist depending on the type of the client (end user, operator, ) and services. The second part of this article details the way to formalize the definition of a service with an SLA. Managing a service is equivalent to managing the associated SLA. Operators, end users and equipments vendors have expressed requirements for service management. These are summarized in the third part. The fourth part shows how the network management -driven approach can be worthwhile applied to SLA management inside an IP network, answering the expressed requirements. The last part looks at the policy-driven approach with a critical point of view. What are the pros and cons of this new managing method? A new way to manage network... Managing a network means at least configuring and controlling the equipments in order to gain the maximum from the available resources. The different approaches developed to ensure the communication with the network elements are now showing restrictions. Telnet and CLI (Command Line Interface) are dependent of the underlying platform, have a complex syntax and nearly no semantic. The use of SNMP (Simple Network Management Protocol) to browse network elements MIBs

3 A "-driven" approach of SLA Management 3 (Management Information Base) and PIBs ( Information Base) is subject to frequent errors. Moreover, the proliferation of private MIBs and PIBs defeats interoperability. These restrictions have motivated standardization bodies like the DMTF (Distributed Management Task Force) and the IETF (Internet Engineering Task Force) to lay the foundations of the policy-based management of networks. The main idea of the -driven approach is to describe the principles of the network management with rules that are then specialized and disseminated towards the network elements. The works at the IETF started by the creation of the Framework working group whose first meeting occurred in Orlando in December The first policy information model document (PCIM: Core Information Model) has been definitely published in February 2001 [1]. This document is mainly inspired by the work done by the DMTF on the CIM (Common Information Model) [2] [3]. Today, the interest for this technique is growing. An extension to PCIM is about to be standardized [4], and several other information models are under study: the quality of service (QPIM: QoS Information Model) [5], security for IP networks (ICIM: IPSec Configuration Model) are the most achieved but works on MPLS (Multi-Protocol Label Switching) and layer three virtual private networks are on progress. The TMF (TeleManagement Forum) is also very interested by the policy-based management and has created a working group on this subject during the TeleManagement World event in Nice (France) in May This work is planned to be used in Catalyst Projects (multi-technologies, multi-vendors). Policies are in general written by operators and have a more or less abstract level. For example, a policy could be written like this: The traffic generated by the Research and Development department has priority on the traffic generated by people surfing the web during lunch hours. Policies are written using rules: If <Condition> then <Do Actions>. The details of the conditions and actions are described in the policy information models. They precise how to represent a rule, how to group elementary conditions to make a more complex condition, and the links between conditions and actions. The simplified architecture related to network policy-based management (Figure 1) is made of four elements [6]: The Manager, user interface for editing rules, manager of the Repository, and responsible for the notification of the presence or update of new rules to the Decision Points The Repository, database where rules to be applied on the network are stored

4 4 GRES, Décembre 2001, Marrakech. The Decision Point (PDP), in charge of retrieving rules in the Repository, of managing the Enforcement Points and ensuring the application of the rules by taking the necessary decisions The Enforcement Points (), in charge of applying the rules and decisions received from the PDP and notifying the results to the PDP. Manager LDAP, SQL, COPS, Repository LDAP, SQL, PDP COPS, Telnet/CLI, SNMP, Figure 1: Architecture of network policy-based management The protocols recommended by the IETF for policy-based network management are COPS (Common Open Service) for the communications between the PDP and s, and LDAP (Lightweight Directory Access Protocol) for the communication with the Repository. Other protocols, like SNMP or SQL (Structured Query Language) that are widely used within the Internet can also be used for the communications between the components described above. And a new way to describe services. The deregulation of the telecommunications world has given rise to lots of changes in the market. The appearance of SLAs is one of the most important. By

5 A "-driven" approach of SLA Management 5 allowing the simple and strict description of a service, the SLA allows new service providers to assert the conscientiousness of their proposals and to win market shares by attracting new clients encouraged to use new technologies and new services they correctly understand and overcome [7]. Operators and service providers experience the need to present a unified portfolio of services. An operator whose services are laying on a common base, an SLA for example, presents a coherent offer to customers that will be able to better express the services they need. Quality, methods for measurement, events reporting and notifications in case of violation of the agreements will be better understood by the two parties. The SLA can be defined as a contractual document between a customer and a service provider, setting the terms and conditions in which a transport service has to be subscribed and delivered. It contains administrative and technical information. The latter, data about the concerned part of the network and the flows to be treated, parameters describing the quality of service to be delivered, schedule for the activation of the service, means used to ensure that the service will correctly work, and security considerations, are part of the SLS (Service Level Specification) [8] [9]. The administrative terms, names of the parties involved in the transaction, designation of the service, pricing and penalties in case of one of the two parties infringes the clauses of the contract, are used to clarify the legal aspects of the agreement. The part of the network over which the service has to be delivered is specified with the ingress and egress points of the network: input/output cards of routers for example. The number and location of the input and output interfaces of the network define the model of communication of the transport service: pipe for point to point communications, hose for point-multipoint communications and funnel for multipoint-point communications. The customer provides relevant information to identify the flows that are concerned by the service. In the case of IP networks which enable differentiation of services, this can be achieved by a combination of source and destination addresses, port numbers of the application, DSCP field (Differentiated Services Code Point) and protocol used. Not only identifying the flow corresponding to a specific service, the SLA also specifies the profile the flow will have to respect to take advantage of the planned quality of service: transmission delay, jitter, packets loss and throughput. This profile, also called envelop, may be characterized by data like mean rate, peak rate, minimal size of packets, or a mixed of this data. Some flows are said to be conform and others non-conform. By changing the parameters describing the traffic envelop, more than two conformance levels can be defined. The SLA also specifies the treatment of the packets belonging to each level. Some packets, in general those from the lower conformity level, may be dropped. In a differentiated services enabled

6 6 GRES, Décembre 2001, Marrakech. IP network, some packets could be remarked with a new DSCP field, and some could be shaped by limiting the bandwidth or by being delayed. But it is still possible to treat these packets as the conform level ones with degraded performances. The schedule indicates when the service has to be available. This can be done by specifying starting and ending moments (dates and hours), or by more complex forms like each Monday from 8:00AM to 8:00PM, or the last day of the each months between 0:00AM and 2:00AM. An operator has to be able to guarantee the availability of the service it delivers. The mean time between failures (MTBF), the mean downtime per year (MDT) and the mean time to repair (MTTR) are classical data. The maximum number of failures per year and per access point, for example, can be added. More than the availability, the means the operator makes use of to guarantee the service can be specified in the SLA. The provider has to offer the choice of measurement methods, periods of measure, points of measure and reporting modes used to monitor the network. Several kinds of SLAs can be contracted at different technological levels of description of the network, or different interfaces. [10] details this diversity depending on the customers, the providers and the technological differences between the networks. Some expectations Until recently, IP networks used to share the resources between concurrent flows without taking care of the expected services. It is turning out that this best effort behavior is no more sufficient regarding the increase and diversification of traffic and services. IP network operators are evolving toward the management of networks according to the carried flows. In order to be able to provide services personalized according to the customers needs, information have to be exchanged between equipment and operating centers of the network [9]: SLAs are one of the main part of this new management architecture. Time to market. Users are looking for new services, cheaper and more quickly available. Operators are looking for innovative services, which performances can be ensured, and which are profitable enough to seek after investments [7]. The requirements expressed by users and operators have participated in the development of SLA management. Optimizing service deployment. Nowadays, implementing a new service on a network can take several months. Operators are looking for solutions to optimize the deployment of services. This can be done by using a database including the method of implementation of the services, the current and future trends of network load, the topology, and the SLA describing the service, in order to quickly generate the implementation of a new service (Figure 2). This automation of the implementation has two main consequences. First of all, the reduction of human activities during the

7 A "-driven" approach of SLA Management 7 configuration phase, lowering transcription errors possibilities. Then a better use of the physical resources of the network improves profitability thanks to the definition of priorities between customers. In case of problems coming up from the network or caused by a new service to provision, the service provider will prefer to favor the one whose penalties are the lowest. SLA Database of Services Trends of network usage SLA analysis Synchronisation with billing and accounting Assurance Analysis of the state of the network Provisioning of the network Tests Network Figure 2 : Deployment of new service Choice of an operator. The emergence of new operators and the specialization of some service providers do not simplify the end users choice upon a more and more significant and often vague offer. By improving both the transparency of the offer, the means operators use to implement the proposed services and their capabilities for monitoring and assuring them, SLA management is a way to ease the customers choice of a service provider. Moreover, it encourages concurrence. Service negotiation. The choice of an operator, also called negotiation phase, can be automated and occurs between two computers, at least for the definition of the service. The part dedicated to the pricing negotiation is still within the competence of the operator and the customer. But, it s possible to imagine that preliminary agreements between a service provider and an end user allow a simplified contract negotiation.

8 8 GRES, Décembre 2001, Marrakech. Detection of service degradation. A requirement, mainly expressed by the service providers, is to be able to detect when a service is deteriorating. To achieve that, they have to correlate data coming from the network, measurements and alarms, with the needs of the services to be delivered by the network. A graduated assessment of the impact of the data on services, more precise than a simple binary relation service available, service unavailable, is strongly requested. In some cases the network does not present any particular problems, but the quality of the service is deteriorating. It becomes necessary to manage SLAs, in parallel with the network, to be able to forecast the failures of the networks and to implement alternative solutions. The cost of such operations limits its use to high revenue services. End to end services. Nowadays most of the services are using the resources of several networks belonging to one or more operators and of different technologies. An appropriate management of SLAs and standard SLAs are then necessary to ensure that the quality required by an end user is applied over all the crossed networks. The authors refer the reader to [10] for more details on the management of end-to-end services. Finally, SLA management is a key differential for operators in their portfolio, and customers are more and more looking at the quality of this feature before choosing a service provider. Some solutions On one hand there are requirements on SLA management expressed by operators, service providers, end users and equipment vendors, and on the other hand the concept of policy-based network management. How does this concept could be extended to the management of services, hence SLAs, and answer the expectations expressed above? Policies are a mean to allocate resources according to business decisions. A service described by an SLA can itself be considered as a whole of resources reservation. The way to define policies with existing information models [1] [4] [5] allows to describe the service and networking management actions with a sufficient abstracted level. Moreover, works currently in progress in standardization bodies aim at defining new policy information models dedicated to the description of services, like IP virtual private networks for example. All the information models are more or less specialized for a given domain but are linked and expressed in similar ways. This feature allows the easy definition of specific rules by preserving interoperability. Here is the way to commonly express the way to manage areas which were previously separated and even incompatible. Here is also the mean for an operator to present a unified portfolio of services thanks to the different parts of the SLA which are each dedicated to specific areas: security,

9 A "-driven" approach of SLA Management 9 accounting, quality (Figure 3). This common definition meets the requirement of optimization and rapidity of service deployment. Each package showed in the Repository (Figure 3) considered as an area of rules, is a part of the SLA contracted between the customer and the service provider. These business rules are independent of the underlying network. It allows to adapt them as close as possible to the needs of the users. The first step is the translation of the business rules in order to conform to the transmission technology. The second step is the adaptation of the result to the specificity of the network elements: functionality, version, protocol supported are taken into account at this stage (Figure 3). Repository Accounting Authentic. Security Routing Quality LDAP / SNMP Negotiation High Level Status PDP Provisioning Decisions Element-independent Level Packets Flow Network element Packets Flow Network Figure 3 : Levels of abstraction of policies This high level specification can be extended to lower levels. At the beginning, the spirit of policy-based management was that a PDP had to be able to take all kind of decisions. Now, it seems that PDP are developed inside more restricted areas. Among a single network, several PDPs can co-exist: one for security, and an other for activating differentiated services principles for example. Of course, the operator has to implement the co-existence and co-operation of several PDPs within its own domain.

10 10 GRES, Décembre 2001, Marrakech. The negotiation of SLA between one or several administrative domains with the same technology can be handled by a single PDP, as PDPs have the knowledge of transport technology dependent rules. It is necessary to add an other PDP in charge of the authentication of the parties of the negotiation. In fact, the negotiation process can be described with rules and the usually used protocols known by PDPs, COPS for example, are suitable for such an activity. In case of a negotiation between domains of different technologies, or straight with the end user or the computer entity in charge of the negotiation, the Manager is more adapted to this operation because it is aware of each part of the SLA. Customers can make several negotiations in parallel to different service providers in an automatic way. Such a process permits to save time and money. With some pros and cons. -driven approach in service management is innovative. But, the question is to know if meeting the requirements expressed by the main actors of networks and services management is sufficient? -based management introduces new protocols. Interfaces and protocols stacks are not all developed and implemented in equipments. Moreover, there is no compatibility between legacy and new protocols. There are the same problems with the new functionalities of policy-based networking. For example, policy enabled routers not only forward the packets as configured in the routing table, they allow more sophisticated ways of structuring the flows: accept or reject packets depending on the moment for example. The process of translation of the rules from the most abstract level, business rules, to the provisioning of the s of the network is made of two main steps. The steps of translation are network technology dependent and network element dependent. This can be a source of errors, whatever the mean used to achieve the translation: automatic or human. Moreover, operators usually use several equipment vendors to build their networks. The last step of the translation is different for each vendor and can even be different within equipments of the same vendors. The sources of errors and wrong configurations increase accordingly. On the other hand, the description of behaviors with rules that can have a high level of abstraction allows non-specialists in networks and services management to understand the processes. A policy telling that top priority will be given to the traffic of customers which had subscribed the Video-conference service, is easier to understand than a rule like If <IP address = > then <DSCP field=25>. Moreover, thanks to the specificities of the different policy information models (quality of service, security, MPLS ), specific PDPs are developed. This allows the definition of complex and efficient functionalities, which will be able to meet all the needed requirements for the definition of services.

11 A "-driven" approach of SLA Management 11 Lastly, the independency of the policies regarding the transport technologies and the equipments of the network will permit to use a single management system whatever the underlying equipments are. All the translation activities will be transparent for the operator. Conclusion Service management is a growing area within the telecommunications world. In parallel, techniques based on policy are evolving in standardization bodies and among operators. The application of the -driven approach to the management of SLAs has a lot of advantages and offers operators a key differentiation in a portfolio of services. Customers can also use it to orientate their choices. As a young technology, policy-based management needs more studies and development to become a main actor in networks and services management. Even if policy-based management is a promising technology, some issues still have to be targeted: scalability, standardization of interfaces and capabilities of description available in the current and future policy information models. By leading research activities in SLA definition and SLA management, Alcatel actively contributes to the development of tomorrow tools which will allow to deliver next generation services requesting optimization and reliability of next generation networks. References [1] IETF-RFC 3060, Core Information Model -- Version 1 Specification, B. Moore, E. Ellesson, J. Strassner, A. Westerinen, February 2001 [2] DMTF, DMTF Technologies : CIM Standards << CIM Schema : Version 2.4, [3] DMTF, Common Information Model (CIM) Specification, version 2.2, June 1999, [4] IETF-draft, Core Information Model Extensions, draft-ietf-policy-pcim-ext- 04.txt, B. Moore, L. Rafalow, Y. Ramberg, Y. Snir, A. Westerinen, R. Chadha, M. Brunner, R. Cohen, J. Strassner, September 2001, work in progress, expire in March 2002 [5] IETF-draft, QoS Information Model, draft-ietf-policy-qos-info-model-03.txt, Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, April 2001, work in progress, expire in November 2001

12 12 GRES, Décembre 2001, Marrakech. [6] IETF-RFC 2753, A Framework for -based Admission Control, R.Yavatkar, D. Pendarakis, R. Guerin, January 2000 [7] TeleManagement Forum, GB 917, SLA Management Handbook, June 2001 [8] IST TEQUILA, D1.1 : Functional Architecture Definition and Top Level Design, September 2000 [9] EURESCOM-P1008, Specification of Inter-domain Quality of Service Management Interfaces, May 2001 [10] GRES 01, Impact on Telecom research focus of business and industrial requirements for Service Level Agreement management, E. Marilly O. Martinot, S. Betgé-Brezetz, GRES 2001, Gestion de REseau et de Service, December st, 2001, Marrackech, Morocco

A Policy Information Model for RFC2547-like IP VPNs

A Policy Information Model for RFC2547-like IP VPNs A Policy Information Model for RFC2547-like IP VPNs Arnaud GONGUET / Olivier POUPEL ALCATEL Route de Nozay - 91460 Marcoussis - France Arnaud.Gonguet@alcatel.fr / Olivier.Poupel@alcatel.fr Tel.: +33 (0)1

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Management Services and Mobility Customer in IP Network

Management Services and Mobility Customer in IP Network Management Services and Mobility Customer in IP Network O. Chahbouni, A. Belangour, A. Namir Hassan2-Mohammedia University B.P 7955, Sidi Othman, Casablanca, Morocco ABSTRACT We describe in this article

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol

Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol Adam Burke, Neco Ventura Department of Electrical Engineering, University of Cape Town,

More information

Quality of Service for IP Videoconferencing Engineering White Paper

Quality of Service for IP Videoconferencing Engineering White Paper Engineering White Paper Subha Dhesikan Cisco Systems June 1 st, 2001 Copyright 2002 Cisco Systems, Inc. Table of Contents 1 INTRODUCTION 4 2 WHY QOS? 4 3 QOS PRIMITIVES 5 4 QOS ARCHITECTURES 7 4.1 DIFFERENTIATED

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the

Voice over IP, or VoIP for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Internet. Several solutions exist to make VoIP: Some use

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,

More information

Service Assurance Tools

Service Assurance Tools Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Nowadays telecommunications networks are based on different technologies in order to convey data, telephony, videoconferences and other services. These networks usually have extremely

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

The Basics. Configuring Campus Switches to Support Voice

The Basics. Configuring Campus Switches to Support Voice Configuring Campus Switches to Support Voice BCMSN Module 7 1 The Basics VoIP is a technology that digitizes sound, divides that sound into packets, and transmits those packets over an IP network. VoIP

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS: Key Factors to Consider When Selecting Your MPLS Provider White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com

More information

Preside. Increasing deregulation in the telecommunications

Preside. Increasing deregulation in the telecommunications Portfolio Brief Nortel Networks Preside Solutions for IP Networks and Services Dial Access Management Overcome outsourcing challenges, capture the richness of call details and manage multiple RAS-enabled

More information

GN1 (GÉANT) Deliverable D13.2

GN1 (GÉANT) Deliverable D13.2 Contract Number: IST-2000-26417 Project Title: GN1 (GÉANT) Deliverable 13.2 Technology Roadmap for Year 3 Contractual Date: 31 July 2002 Actual Date: 16 August 2002 Work Package: WP8 Nature of Deliverable:

More information

WHITE PAPER. Hybrid Networking. Managed Network Services Buyers Guide

WHITE PAPER. Hybrid Networking. Managed Network Services Buyers Guide WHITE PAPER Hybrid Networking Managed Network Services Buyers Guide A global network is a company s central nervous system that influences the overall health and performance of a business and it s critical

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Requirements for Service Level Agreement Management

Requirements for Service Level Agreement Management Requirements for Level Agreement Management Emmanuel Marilly, Olivier Martinot, Stéphane Betgé-Brezetz, Gérard Delègue ALCATEL CIT Route de Nozay, 91460 Marcoussis, France e-mail: {Emmanuel.Marilly, Olivier.Martinot,

More information

SERVICE LEVEL AGREEMENTS: A MAIN CHALLENGE for Next Generation Networks

SERVICE LEVEL AGREEMENTS: A MAIN CHALLENGE for Next Generation Networks SERVICE LEVEL AGREEMENTS: A MAIN CHALLENGE for Next Generation Networks Authors: Emmanuel MARILLY ALCATEL, Research and Innovation Department Route de Nozay, 91460 Marcoussis, France Tel: 33 1 69 63 14

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac. ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service

More information

The Elusive QoS. XiPeng Xiao, Ph.D. Director of Product Management Riverstone Networks (now part of Lucent & Alcatel) XiPeng@ieee.

The Elusive QoS. XiPeng Xiao, Ph.D. Director of Product Management Riverstone Networks (now part of Lucent & Alcatel) XiPeng@ieee. The Elusive QoS XiPeng Xiao, Ph.D. Director of Product Management Riverstone Networks (now part of Lucent & Alcatel) XiPeng@ieee.org Agenda The status quo of QoS Challenges of the existing QoS model A

More information

Quality of Service for VoIP

Quality of Service for VoIP Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

OSS for Telecom Networks

OSS for Telecom Networks Kundan Misra OSS for Telecom Networks An Introduction to Network Management Springer Preface Acknowledgements v vii 1 Introduction 1 1.1 End-to-end Management and Unified Management 2 1.2 Standardisation

More information

Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience.

Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience. Service assurance for communications service providers White paper Improve service quality and enhance the customer experience. December 2007 2 Contents 2 Overview 2 Move to a competitive business model

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

Voice over IP is Transforming Business Communications

Voice over IP is Transforming Business Communications White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support

More information

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

CARRIER MPLS VPN September 2014

CARRIER MPLS VPN September 2014 CARRIER MPLS VPN September 2014 SERVICE OVERVIEW The International MPLS IP-VPN service provides a full range of VPN connectivity solutions, including: Carrier MPLS IP VPN: dedicated to operators looking

More information

Requirements & Reference Models for ADSL Access Networks: The SNAG Document

Requirements & Reference Models for ADSL Access Networks: The SNAG Document Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 24 CHAPTER This chapter describes how to configure quality of service (QoS) by using standard QoS commands. With QoS, you can give preferential treatment to certain types of traffic at the expense of others.

More information

Ensuring End-to-End QoS for IP Applications. Chuck Darst HP OpenView. Solution Planning chuck_darst@hp.com 970-898-2064

Ensuring End-to-End QoS for IP Applications. Chuck Darst HP OpenView. Solution Planning chuck_darst@hp.com 970-898-2064 Ensuring End-to-End QoS for IP Applications Chuck Darst HP OpenView Solution Planning chuck_darst@hp.com 970-898-2064 filename\location Page 1 Agenda Service Level Management review QoS End-to-End across

More information

Quality of Service (QoS) on Netgear switches

Quality of Service (QoS) on Netgear switches Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected

More information

A process-driven methodological approach for the design of telecommunications management systems

A process-driven methodological approach for the design of telecommunications management systems A process-driven methodological approach for the design of telecommunications management systems Thierry FRAIZE, Julio VILLENA, Jean-Daniel GUEDJ TELECOM ARGENTINA Av Dorrego 2520 (1425) Buenos Aires Argentina

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Service Quality Management for multidomain network services. Pavle Vuletić, AMRES edupert videoconference, 20 July 2015

Service Quality Management for multidomain network services. Pavle Vuletić, AMRES edupert videoconference, 20 July 2015 Service Quality Management for multidomain network services Pavle Vuletić, AMRES edupert videoconference, 20 July 2015 What is Service Quality Management? Resource Performance Management (RPM) provides

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

Integrated management information in utilities

Integrated management information in utilities Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.

More information

Huawei esight Brief Product Brochure

Huawei esight Brief Product Brochure Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service

More information

Policy-Based Network Management in an Integrated Mobile Network

Policy-Based Network Management in an Integrated Mobile Network Policy-Based Network Management in an Integrated Mobile Network José Luís Oliveira 1, Pedro Gonçalves 1, Wojciech Dziunikowski 2, Jacek Wszolek 2 Sonny Rasmussen 3, Rui P. Lopes 4, Vítor Roque 5 1 University

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

ETSI TR 101 303 V1.1.2 (2001-12)

ETSI TR 101 303 V1.1.2 (2001-12) TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

convergence: preparing the enterprise network

convergence: preparing the enterprise network hp procurve networking business january 2003 convergence: preparing the enterprise network business white paper protecting investments with the hp procurve adaptive EDGE architecture table of contents

More information

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS?

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS? In: New Developments in Distributed Applications and Interoperable Systems: 3rd IFIP International Working Conference (DAIS 2001), Cracow, Poland Kluwer Academic Publishers, September 2001 SERVICE ORIENTED

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

ehealth and VoIP Overview

ehealth and VoIP Overview ehealth and VoIP Overview Voice over IP (VoIP) configurations can be very complex. Your network could contain a variety of devices, applications, and configuration capabilities to support voice traffic.

More information

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

DOMINO Broadband Bonding Network

DOMINO Broadband Bonding Network 2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

Bandwidth Management in MPLS Networks

Bandwidth Management in MPLS Networks School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: dragoss@eeng.dcu.ie

More information

CONDIS. IT Service Management and CMDB

CONDIS. IT Service Management and CMDB CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...

More information

MPLS Management using Policies

MPLS Management using Policies MPLS Management using Policies M. Brunner, J. Quittek C&C Research Laboratories, NEC Europe Ltd. Adenauerplatz 6, 69115 Heidelberg, Germany [brunner quittek]@ccrle.nec.de Abstract Multi-Protocol Label

More information

The need for automating the supervision

The need for automating the supervision INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2004; 14: 351 364 (DOI: 10.1002/nem.532) Self-aware management of IP networks with QoS guarantees By Francine Krief*, Self-aware management

More information

Capacity Management in Multimedia Networks. Presented at SCTE Emerging Technologies 2005

Capacity Management in Multimedia Networks. Presented at SCTE Emerging Technologies 2005 Capacity Management in Multimedia Networks Ben Ben Bekele Bekele Jason Jason Schnitzer Schnitzer Senior DOCSIS Engineer Chief OSS Architect Principal Cox Cox Communications YAS Broadband Applied Ventures

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

SDN CENTRALIZED NETWORK COMMAND AND CONTROL SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,

More information

A Model for Access Control Management in Distributed Networks

A Model for Access Control Management in Distributed Networks A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

D6.1: Service management tools implementation and maturity baseline assessment framework

D6.1: Service management tools implementation and maturity baseline assessment framework D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)

More information

Connectivity. SWIFTNet Link 7.0. Functional Overview

Connectivity. SWIFTNet Link 7.0. Functional Overview Connectivity SWIFTNet Link 7.0 Functional Overview December 2010 SWIFTNet Link 7.0 Table of Contents 1 Introduction... 3 2 Enhancements and features... 4 2.1 Message and File Copy... 4 2.2 Message and

More information

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while

More information

Testing VoIP on MPLS Networks

Testing VoIP on MPLS Networks Application Note Testing VoIP on MPLS Networks Why does MPLS matter for VoIP? Multi-protocol label switching (MPLS) enables a common IP-based network to be used for all network services and for multiple

More information

IP videoconferencing solution with ProCurve switches and Tandberg terminals

IP videoconferencing solution with ProCurve switches and Tandberg terminals An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and

More information

Policy-based Management for Enterprise and Carrier IP Networking

Policy-based Management for Enterprise and Carrier IP Networking UDC 621.395.74:681.32 Policy-based Management for Enterprise and Carrier IP Networking VTakeo Hamada VPeter Czezowski VTakafumi Chujo (Manuscript received September 15, 2000) Policy-Based Management (PBM)

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination

More information

Service & Network Management

Service & Network Management Peter.Fellows@certis.co.uk Service & Network Management Introduction Content Requirements and Expectations. Telecommunications Network Management (TMN) Theory and Reality Pressures for change: causes and

More information