Backbone Modeling for Carrying Local Content and Over-the-Top Traffic



Similar documents
MPLS Network Design & Monitoring

Enterprise Network Simulation Using MPLS- BGP

Sprint Global MPLS VPN IP Whitepaper

RSVP- A Fault Tolerant Mechanism in MPLS Networks

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

HP Networking BGP and MPLS technology training

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Forecasting Traffic Growth and Impact with Cisco MATE Design

Business Case for Cisco SDN for the WAN

SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014

Exterior Gateway Protocols (BGP)

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

Traffic Engineering. Traffic Engineering

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

IP Traffic Engineering over OMP technique

Using the Border Gateway Protocol for Interdomain Routing

Multi Protocol Label Switching (MPLS) is a core networking technology that

Router and Routing Basics

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Designing and Developing Scalable IP Networks

Project Report on Traffic Engineering and QoS with MPLS and its applications

Cisco Configuring Basic MPLS Using OSPF

Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics

Best Practices for Eliminating Risk from Routing Changes

Introducing Basic MPLS Concepts

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Table of Contents. Cisco How Does Load Balancing Work?

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Border Gateway Protocol (BGP)

Route-Flow Fusion : Integrated NetFlow and IP Route Analysis

MPLS L2VPN (VLL) Technology White Paper

RFC 2547bis: BGP/MPLS VPN Fundamentals

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Juniper Networks NorthStar Controller

Backbone Capacity Planning Methodology and Process

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

MPLS Concepts. Overview. Objectives

Quality of Service for VoIP

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Introduction to Routing

for guaranteed IP datagram routing

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Masterkurs Rechnernetze IN2097

software networking Jithesh TJ, Santhosh Karipur QuEST Global

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM)

Border Gateway Protocol BGP4 (2)

IPv6 over IPv4/MPLS Networks: The 6PE approach

Junos MPLS and VPNs (JMV)

Understanding Route Redistribution & Filtering

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

KT The Value Networking Company

IP/MPLS Networks for Public Safety

Comparative Analysis of Mpls and Non -Mpls Network

Overlay Networks and Tunneling Reading: 4.5, 9.4

Kingston University London

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

Testing VoIP on MPLS Networks

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

ICTTEN4215A Install and configure internet protocol TV in a service provider network

Multi-protocol Label Switching

Implementing VPN over MPLS

How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

The Next Generation of Wide Area Networking

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Provisioning Cable Services

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

Testing & Assuring Mobile End User Experience Before Production. Neotys

BGP Best Path Selection Algorithm

Cisco IP Solution Center MPLS VPN Management 5.0

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications

Cisco Change Management: Best Practices White Paper

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Enhancing Network Monitoring with Route Analytics

Border Gateway Protocol Best Practices

How To Understand The History Of Mpls

BGP Link Bandwidth. Finding Feature Information. Contents

Recovery Modeling in MPLS Networks

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Real-Time Traffic Engineering Management With Route Analytics

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

How NWSTG FOS Customers Can Connect To The OPSnet Multi-Protocol Label Switching System (MPLS) Network. Table of Contents

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Disjoint Path Algorithm for Load Balancing in MPLS network

Transcription:

White Paper Backbone Modeling for Carrying Local Content and Over-the-Top Traffic Decision-Making Criteria Using Cisco MATE Collector and Cisco MATE Design and Their Impact on Backbone Design What You Will Learn The combination of over-the-top (OTT) traffic with locally sourced content is presenting new challenges in backbone design and maintenance. Many business rules must be considered when customers are legitimately receiving content from competitors beyond the scope of policy rules in traditional routing protocols, such as Border Gateway Protocol (BGP). Delivering your own content as well as content that originates outside your network increases the complexity of planning the backbone. This combination also presents a greater need to consider the dynamics of shifting traffic patterns under worst-case and failure conditions. Business relationships and their impact on backbone design are leading to a heightened interest in business intelligence (BI) because you need to know the clear cost of peering - beyond just ingress and egress traffic. In addition, you need to be able to model potential traffic and derive traffic engineering solutions when unexpected traffic enters your network. These requirements can be met only after you understand the traffic matrix behavior, topology, and infrastructure. This essential information is uniquely available with the Cisco MATE Collector. Supported by an accurate traffic matrix and a set of actionable information, Cisco MATE Design s infrastructure analysis can help identify misplaced traffic, and accurate optimization tools can be used to develop traffic engineering solutions when needed. Network Modeling Workflow To model networks so they can assist with business and technical issues requires building a holistic network view that addresses the needs of operators, network engineers, and business stakeholders. The elements that must be gathered to create this view include an up-to-date traffic matrix, automated infrastructure discovery, and accurate topology information. To take action based on this abstracted network requires a business model that ties together the traffic, infrastructure, and commercial frameworks. The process of network discovery using Cisco MATE Collector software includes gathering topology information from interior gateway protocols, such as Intermediate System-to-Intermediate System (ISIS) and Open Shortest Path First (OSPF), as well as other protocol information derived from BGP and multicast databases. Traffic from Simple Network Management Protocol (SNMP)-polled interface statistics, Flow Collection information, and other management databases is also gathered to provide a current snapshot of the infrastructure. Figure 1 illustrates a three-step continual process that includes information gathering and simulation activities in capacity planning. First, Cisco MATE Collector gathers the traffic demands, the physical and logical topologies, and the network configuration. This information is run through a routing model in Cisco MATE Design. When the network is reprovisioned, the process starts again. 1 1 For more information, see the white paper Best Practices in Core Network Capacity Planning at http://www.cisco.com/ 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 1

Figure 1. Modeling the Core Network for Capacity Planning 2 With an accurate traffic matrix and predictable failure rules, a continual simulation, rapid simulation analysis, optimization tools, and an archive of past results for comparison provide you with an arsenal to correct problems when they occur. Importance of the Traffic Matrix A traffic matrix is a list of demands, where a single demand represents a potential flow of traffic from a source through to a destination. Generating and maintaining an accurate traffic matrix is a key part of planning, designing, and monitoring efficient and effective IP/Multiprotocol Label Switching (MPLS) networks. However, generating a traffic matrix is also difficult for a variety of reasons. Traditional means of creating traffic matrices can often be inaccurate in the following circumstances. If BGP neighbors do not follow conventional routing rules (longest/shortest exit). If nodes are trimmed so the traffic you have better matches the network you are modeling. This strategy can affect the accuracy of the model, because the traffic you have collected is for a larger and different network than the one you are modeling. If an autonomous system pushes ingress traffic on your network in unexpected locations. Most traffic collectors have a steep learning curve and are complex to administer and expensive to scale. How Content Delivery Networks Affect Traffic Traffic patterns are changing because of large-scale content delivery network (CDN) aggregation. Traditional methods of resolving peering arrangements in these situations, such as longest exit (respect BGP Multi-Exit Discriminator [MEDs]), are typically not enough. Other localization methods are often brought into the mix, such as BGP communities, IP address geo-location, DNS resolution, and static mappings. With this battery of tools, steady-state operations are usually fine, but surprises can inevitably occur under failure. 2 Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice, John Evans, Clarence Filsfils, and Morgan Kaufmann, ISBN 0-123-70549-5; reproduced with kind permission of Elsevier/Morgan Kaufmann Elsevier 2007. 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 7

OTT video consumes an unpredictable amount of external bandwidth, and it is not uncommon for port utilization to increase from 50 to 90 percent in a short period of time. As the popularity of OTT increases, use of these services will correspondingly increase. Service providers carrying content, especially a combination of their own and OTT, need to be wary of what might happen under a failure state. In addition, they must be prepared if a CDN chooses not to localize content. Because most major networks now have CDNs, delivery of this traffic becomes a key factor for service providers, in terms of both the CDN cost and the network cost. Effective network planning involves considering the effects of failure analysis and creating a network that can absorb short-term growth. The increase in these hybrid models of local and elsewhere-originated content is making forecasting more difficult during initial buildouts. Planning and designing difficulties get even more severe as product offerings in the form of cloud-based applications evolve more rapidly. It s hard for the network augmentation cycle to keep pace. And if peak traffic between multiple content sources coincides, as they might with second-screen viewing technology, predictability is that much tougher. MATE Collector Flow Collection Among traffic, topology, and infrastructure, traffic has been the most difficult to characterize. To address this challenge, Cisco MATE Collector introduces the Flow Collection option, which builds a demand traffic matrix for IP and MPLS network planning and traffic engineering. Flow Collection maps a flow s source and destination IP addresses to ingress and egress routes in the network. Figure 2 shows the workflow for collecting flow data from the external network and the Flow Collection server. Figure 2. Flow Collection in MATE Collector 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 7

The Cisco MATE Collector tools integrate with an external configuration table and a state-recording snapshot process. The end result is a Cisco MATE plan file containing flow-based demands. 3 Use Case: Balancing Content from Multiple Networks Planning backbone networks can be incredibly difficult when ingress traffic is unpredictable. You can use Cisco MATE Design and MATE Collector to identify when, where, and in what quantities ingress traffic originates from a CDN. For example, a Europe-based service provider consists of a backbone network and four regional delivery networks: Northwest, Northeast, Southwest, and Southeast. An external CDN peers with this network from locations in Istanbul, Madrid, Moscow, and Stockholm. Each peering location is supposed to source the nearest regional network. This network and the peering locations are shown in Figure 3. Figure 3. View of Service Provider Backbone Network (Left) and CDN Peering Locations (Right) Handling Internal Failures That Affect Multiple Networks A fiber cut between Istanbul and Cairo has occurred. Because fiber cuts can take several days or more to repair, traffic engineering is needed in the meantime. The backbone network has been designed to withstand a fiber cut, and simulation of this failure has determined that the network can continue to uphold all service requirements. Some interfaces are running warm, and no core interface is more than 82 percent utilized (Figure 4). Figure 4. Service Provider Fiber Cut Between Istanbul and Cairo 3 For more information, see the MATE Collector data sheet at http://www.cisco.com/en/us/prod/collateral/wireless/ps11035/ps12971/data_sheet_c78-726637.html 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 7

Identifying Peers Not Upholding Agreements One hour later, the interface between Istanbul and Rome suddenly reaches a utilization level past 100%, indicating probable packet loss (Figure 5). Figure 5. Fiber Cut Between Istanbul and Cairo with High Interface Utilization What caused this increased congestion? Using Cisco MATE Design, you can quickly identify the interface from the content provider in Istanbul (Figure 6). Figure 6. Interface from CDN to Service Provider Backbone Network Looking at past plan files, you can see that the content provider usually sources the Northeast and Southeast regional networks from Istanbul (Figure 7). Figure 7. Usual Demands from CDN on Istanbul Interface However, after viewing the demands on the interface, it is evident that the peer is now sourcing demands to the Southwest regional location as well, probably because it is responding to latency increases caused by the fiber cut (Figure 8). 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 7

Figure 8. Actual Demands from CDN on Istanbul Interface A network operations team could be confounded by this sudden congestion. Network operations often ends up chasing traffic to develop on-the-spot traffic engineering solutions without addressing the underlying issues of unauthorized ingress traffic. Traditional methods of solving congestion involve Interior Gateway Protocol (IGP) metrics or Label Switched Path (LSP) optimization. However, by changing metrics or optimizing LSPs, operations might unknowingly place other areas of the network at risk. The actual service provider issue is dialogue with the CDN. If a service provider knew ahead of time where the CDN was pouring excess traffic into the network, the amount of traffic, and the traffic location, traffic engineering solutions could be developed much more readily. Direction of Business Intelligence for Inter-Provider Communication Figure 9 illustrates the CDN s change in peering locations. The former demand path is shown with a solid blue arrow, and the new demand path is shown with a dashed arrow. Figure 9. CDN Causing Congestion and Increasing the Distance the Backbone Carries Traffic Not only has the content provider caused congestion on the service provider s backbone network, it has also caused the backbone network to carry the traffic a much greater distance, as reflected in the Path Metric column in Figure 8. The CDN should be contacted immediately to negotiate a new peering agreement. After renegotiating the agreement, the network will now maintain service-level agreements (SLAs), even in the event of a fiber cut. Figure 10 shows the network s worst-case circuit analysis, with no interfaces increasing beyond 100 percent utilization. 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 7

Figure 10. Backbone Network After Renegotiating the Peering Agreement In the near future, infrastructure software-defined networking (SDN) solutions will allow a quicker centralized resolution to traffic issues, particularly with the ability to orchestrate changes based on the global network view provided by Cisco MATE Design. Conclusion Service providers face several challenges regarding ingress traffic from CDNs. Cisco MATE Collector with Flow Collection and MATE Design make it easier for you to identify and manage unexpected ingress traffic from CDNs and develop equitable peering arrangements. Cisco MATE portfolio is the industry leader, with business solutions for profitability, planning, collection, and monitoring solutions for today s global networks. Printed in USA C11-728720-00 06/13 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 7