After this lecture you should know. Service Level Agreement - SLA



Similar documents
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

November Defining the Value of MPLS VPNs

WAN Traffic Management with PowerLink Pro100

Bandwidth Management in MPLS Networks

Cisco Which VPN Solution is Right for You?

Welcome to Today s Seminar!

Internet Protocol: IP packet headers. vendredi 18 octobre 13

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

MPLS and IPSec A Misunderstood Relationship

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

4 Internet QoS Management

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Small Business Server Part 2

WHITE PAPER: Broadband Bonding for VoIP & UC Applications. In Brief. mushroomnetworks.com. Applications. Challenge. Solution. Benefits.

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Quality of Service (QoS)) in IP networks

WAN Data Link Protocols

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Secured Voice over VPN Tunnel and QoS. Feature Paper

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Chapter 9. IP Secure

Voice over IP Networks: Ensuring quality through proactive link management

White Paper: Virtual Leased Line

Network Services Internet VPN

Ranch Networks for Hosted Data Centers

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Internetworking II: VPNs, MPLS, and Traffic Engineering

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Mesh VPN Link Sharing (MVLS) Solutions

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Site2Site VPN Optimization Solutions

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Course Description. Students Will Learn

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

Optimize your network for voice.

Protocols with QoS Support

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

IVCi s IntelliNet SM Network

Truffle Broadband Bonding Network Appliance

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

NetFlow/IPFIX Various Thoughts

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

Unverified Fields - A Problem with Firewalls & Firewall Technology Today

WAN Optimization in MPLS Networks- the Transparency Challenge!

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Assuring Your Business Continuity

Lecture 17 - Network Security

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

High Availability Private Network (HAPN ) Network Upgrade Case Study

MPLS/IP VPN Services Market Update, United States

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

18: Enhanced Quality of Service

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Multi Protocol Label Switching (MPLS) is a core networking technology that

OS/390 Firewall Technology Overview

Security Design.

How To Provide Qos Based Routing In The Internet

SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT

Overview. Protocols. VPN and Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services.

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Technology Overview. Class of Service Overview. Published: Copyright 2014, Juniper Networks, Inc.

Course 4: IP Telephony and VoIP

Introducing Basic MPLS Concepts

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Computer Networking. Definitions. Introduction

Provisioning Cable Services

Fundamentals of MPLS for Broadcast Applications

Broadband Network Architecture

Transcription:

Service Level greement - SL Lecture for S-38.3192, 2.3.2006 Mika Ilvesmäki Goals of this lecture fter this lecture you should know What a SL is and what it contains? What network s are and what other s an ISP might offer? What options the ISP has for traffic differentiation? How different types of s should be measured? Networking laboratory Service Level greement - definition SL is a contract that describes the provided and the cost of the. ontract has two parties ustomer End-user Enterprise Home user Or a provider as a client to another ISP Service provider SL Palvelun tarjoaja siakas SL Palvelun tarjoaja Service Level greement - general The task of the SL is to clearly define the roles, rights and oblications of contract parties at the interface The contents of the contract depend upon the type and structure offered to the customer Network (=ISP) pplication (=SP) The contract should contain only those s/applications over which the SP/ISP has direct control 1

Service Level greement -details ontract defines Service(s) offered ost of the offered Methods to control the l level Procedures to follow in case of network malfunction The definition of should contain all areas of the and related performance and quality parameters Network s pplication and other value-add s Support s Service Level greement - Examples Examples of measured performance and quality parameters: Network capacity is x bps and its usability is y % over time z. The webpage usability is a % measured over time b. The download capacity is c bps and the response time is less than d ms. The complete data is backed up every f days/weeks/months. ustomer VPN is offered a capacity of m bps with maximum end-to-end delay of n ms Service Level greement - usability Service availability (or usability) indicates the time that the is available (or usable). ommon terms and definitions with availability/usability are MTF - Mean Time etween Failures MTI - Mean Time etween Interuptions MTTR - Mean Time To Recover These define the availability slightly better than just plain percentage values. Not a vague definition over time t Not just one long break in the Epäkunnossa Käytettävyys Per vuosi Per viikko 90% 36,5 pv 16,85h 95% 18,25 pv 8,42h 98% 7,3 pv 3,37h 99% 3,65 pv 1,68h 99,5% 1,83 pv 50,54min 99,8% 17,52 h 20,22min 99,9% 8,76 h 10,11min 99,95% 4,38 h 5,05min 99,99% 52,56 min 1,01min 99,999% 5,26 min 6,06s Service Level greement costs of ISP The level of SL parameters defines the cost of offering the (for the ISP) Key objective: im for high utilization! Exact knowledge of traffic profile and behavior Or accept the fluctuation of the level (because of statistical multiplexing) Low level of utilization increases the unit cost (significantly) Example: 99.99% usability over one week period means a that is unusable for less than a minute (within that same week) This does not make it possible even to maintain the equipment without redundancy Redundant equipment (and access to the network) 99% usability enables the maintenance without contract violation 2

The aim of the ISP is To increase incoming cash flow Higher unit price to s with higher priority Utilize network infrastructure to the fullest Statistical multiplexing Ensure market position ISP ideal Optimal network state - offered load is high enough to cause increase in the delay, yet the utilization (offered capacity) is still high - Only fraction of the traffic is offered any guarantees on the level Delay apacity offered Network s private access ccess s Private access is based on the control of the customer s access line (and control of the attached closed network) Fixed lines» xdsl or DOSIS-technologies for home users» ny symmetrical technology in enterprise usage Dial-in access to ISDN/PSTN ISPs may offer differentiated access s based on customer s access bit rate. xdsl, PDH and TM based access lines make it easy to change access bit rate Offered traffic Network s public access ccess Public access is based on customer/transit contracts made by the ISP with other ISPs If a customer uses this he/she/it is offered Global IP-addresses (no NT, no private IP-addresses) ccess point from where traffic is routed onwards. ISP controls the performance and level of the access. Network s - transit Transit Enable the networking of ISPs Small ISPs are customers to larger ISPs Large ISPs forward the traffic as their customer traffic Equal size ISPs work together as partners Each are other s customers Mutual contracts contain mainly restrictions regarding the forwarded traffic. 3

Value add s ll supportive s that support network traffic are referred to as value add s Virtual network s (VPN) Operating application s (email, web hosting, ) Managing name s (and their integrity) (DNS) ontrolling and managing customer equipment (DHP on the very basic level) Separate s L1-leased line lackfiber, customer has full access to the physical layer (the fiber) ustomer operates the fiber and everything on it olorfiber, customer gets only the logical access Physical operating based on line technology and on ISP responsibility Logical operation on customer responsibility L2-leased line Parts of operator capacity on layer 2 apacity may be changed as needed (and possible) Separate s L3-leased line ustomer is offered IP tunnels between access points. Service is based on IP-tunneling» Secure (IPSec) or unsecure (PPTP, GRE)» Service controlled with IP management L2+ tunneling (MPLS)» apacity and routing separate from other network Differentiating traffic - QoS Traditional concept of QoS is based on fulfilling commonly accepted parameters For instance PSTN call blocking should be less than 2% There is no differentiation of traffic based on QoS IP-networks and related business is heavily competed ISPs aim to offer network level QoS (and thus stand out from other ISPs) Performance values are attached to network level s These values must be able to be measured Other s of the ISP are evaluated with quantitative measures Quality certificates etc. 4

ringing life to QoS ISPs have limited methods and power to offer quality differentiated s More hardware, faster hardware, Traffic shaping Usage based billing Differentiated Services (DiffServ) Multiprotocol Label Switching (MPLS) More hardware Overdimension the network (with proper gusto) ll customer traffic can be carried in any situation True utilization will notably low On average there is a lot of unused capacity (waiting that the any situation will happen). Faster hardware Multiprotocol Label Switching Differentiation is achieved by ctively shaping traffic at user access point apacity ustomer is offered a certain capacity and customer traffic is shaped/buffered to this capacity More traffic, more delay illing users according to offered traffic ustomer controls traffic based on what she/he is willing to pay. Slow reaction time (depending on the billing system) Delay MPLS builds virtual connections based on information from IP routing (on top of any L2 technology) onnection identifiers within the L2-header or between L2 and L3 headers Enables end-to-end virtual networks :10.50.0.5/24 5 Label IP header os S TTL L2 header :10.20.0.38/24 Label policy * Target: 10.20.0.0/16 -> FE 1 Routing table: * Target: 10.20.0.0/16, FE 1 -> Interface 2, Label 5 Label router Label edge router 5

Differentiated Services DiffServ is a method to build logically separate IPnetworks into one physical IP-network Logical network is identified with IP-header DSP / ToS - field Each logical network is treated individually and separate from others lthough, the resources used by one logical network have an effect on the other logical networks Version IHL ToS / DSP Length Identification Flags Offset TTL Protocol hecksum Source Port Options Source ddress Destination ddress Destination Port Padding What do you sell with SLs? Managed s Including (Differentiate) network Value add s Email WWW Security s uilt upon The know how and equipment of the ISP overing ISPs own network Outside of ISPs network only a limited set of s are offered Home user asic Internet asic email Email transfer Email Home user Home office Home office PROInternet Internet Web Hosting Web Hosting Dial-in pages server Web Hosting Small enterprise Enterprise Enterprise Internet Internet Fixed access Enterprise VPN Firewall (xdsl) access ccess Security Measuring quality When defining quality measure, remember to measure only that what is quantitative Measured value should be defined in the SL so that they can be measured by the operator and customer alike. Do not attach any qualitative or otherwise unexact values (no feelings of good network level ) Vague definitions lead to controversy that most probably lead to a sensation of unsatisfying (total) quality of. "ollective effect of performances which determine the degree of satisfaction of a user of the " [ITU-T E.800] 6

Measuring level Quantitive level (measure) Describes the performance on different (protocol) levels Defined unambiguously Service logic illustrated as flow chart Numerical values of performance attached an be measured Qualitative level (based customer experience) Illustrates the level/ response experienced by the customer The response depends on factors that can not be measured mbiguous definition an not be measured Measuring level It is in the best interest of the customer to control that the contract (=SL) is fulfilled. Measure the parameters mentioned in the SL with the best applicable practise (that could also be documented in the SL) Service is measured where is used ustomer premises, workstations, access points From the transit point towards the ISP value add point. Typically measured between the transit points Service guarantees reach to these points but not beyond. Measuring level Measuring VPN- t the ends of VPN-tunnels or measurement points within the customer network Independent measurements between all points IPSec VPN päätepiste 7

pplication measurements The SO has measurement points within its network. The usability is checked from these points Placed at least to transit points 8