1 / 16

Association of Communications Engineers

Association of Communications Engineers. Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas. Association of Communications Engineers. Using Packet Shapers in Networks. Presented by: Greg Johnson, CCIP Finley Engineering Company, Inc. greg.johnson@fecinc.com.

caelan
Download Presentation

Association of Communications Engineers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas

  2. Association of Communications Engineers Using Packet Shapers in Networks Presented by: Greg Johnson, CCIP Finley Engineering Company, Inc. greg.johnson@fecinc.com HTTP GET: www.google.com S: 208.4.1.9 D: 12.201.11.5 TCP 80

  3. What is “Traditional” Packet Shaping? • Packet Shaping is the process of optimizing performance for certain network flows at the expense of other flows when the network becomes congested. • A Packet Shaper can improve: • Latency • Jitter • Packet Loss

  4. What is “Traditional” Packet Shaping? • Traditional IP routers do packet shaping based on QOS technology built into the router. These routers usually classify traffic based on the layer-2 and/or layer-3 headers: • 802.1p • IP Precedence or DSCP • Traffic is classified, marked at the edge and then shaped and/or policed throughout the routing domain.

  5. What is a Deep Packet Inspection (DPI)? • DPI is the ability of a network device to evaluate layer-2 through layer-7: • Network visibility by the service provider • Packet forwarding decisions (queuing, shaping, policing) L1 L5 L6 L7 L2 L4 L3 <html><body> . . </body> </html>> Src IP: 192.168.1.1 – Dst IP: 172.16.1.1 Src MAC: 5c26:0a4a:0260 – Dst MAC: ca00:1464:0008

  6. How DPI Identifies Traffic? • Packet Shaping works by inspecting the “payload” of IP packets: • Tracks “state” information • Looks for certain traffic type signatures (e.g. peer-to-peer traffic, denial-of-service attacks, SIP, MGCP, RTP, OTT video) • Can track bandwidth consumption and packet flow rate

  7. How DPI Associates Traffic with a Subscriber? • Packet Shapers can associate traffic to a subscriber by monitoring: • RADIUS Auth/Start/Stop Records • DHCP Option-82 data (associate subscriber with a DSLAM/OLT Port) • MSISDN in mobile wireless networks • The above methods are used to associate a subscriber with an IP address.

  8. DPI for Network Monitoring • The Deep Packet Inspection (DPI) function of a Packet Shaper is a valuable tool for Network Operators: • Bandwidth trends analysis • Customer bandwidth troubleshooting • Virus, Worm and DDOS attack recognition

  9. DPI as a “Sales and Marketing” Tool • A DPI device can capture and retain historical usage data that can be used to: • Up-sell a subscriber to a faster speed service (packet shaper used to police subscriber data service) • Up-sell a subscriber to a premium service where traffic is prioritized and queued based on content type (e.g. voice, video and web traffic)

  10. DPI for Equal Access to Network Resources • DPI devices can be used to enhance or add queuing strategies for legacy and over-subscribed networks: • Many legacy BRAS devices lack the queue depth to implement equal access queuing (e.g. WFQ) • Many legacy access devices (e.g. DSL and fixed wireless) can be overwhelmed by frame/packet rates before bandwidth saturation ever occurs

  11. DPI in a Mobile Network • Characteristics of a wireless mobile network: • Bandwidth is a finite resource (even in the 4G/LTE world) • Smart phones, tablets and new applications are increasing the demands on the network • Bandwidth demands will always outpace the bandwidth that a wireless network can provide

  12. DPI in a Mobile Network • Uses of Packet Shaping/DPI in the Wireless Network: • Bandwidth usage accounting • Rate limiting based on subscriber packages • “On network – Off network” identification and restrictions • Portal redirection for service upsells

  13. Evolution of DPI DPI functionality was originally a dedicated appliance “bump in the wire” that was transparent to the rest of the network. It was typically deployed as a layer-2 Ethernet device that sat between the access networks and an Internet edge router.

  14. Evolution of DPI Router, switch and access equipment vendors are now starting to build DPI functionality into their network devices. • Provides network visibility closer to the subscriber • Provide custom networking QOS on the subscriber loop (or RF connection)

  15. Why DPI is a Critical Tool for the Service Provider • Networks are becoming more “service and application centric” – “Building the Smart Network” • Network visibility at the application layer is critical • SLAs and Cloud Computing are placing QOS requirements on the Service Provider

  16. DPI, Privacy and Net Neutrality • Consideration should be given to current Net Neutrality rules when policing and queuing subscriber data • Your posted privacy policy should describe how you will use data that is collected and retained from DPI functions in your network • Questions on this?......Consult your Attorney!

More Related