Cloud Metro: Architecture, Use Cases, Customer Case Studies
Why is Cloud Metro such a big deal?
The acceleration of digitalization opens the door to incredible opportunities—and new challenges. This session offers a look into Cloud Metro architecture, providing architectural details for different use cases including MEF (Business Ethernet) services, backhauling for residential subscriber management services, network slicing, and more.
You’ll learn
Architectural details for a traditional and emerging metro use cases
Cloud Metro for mobile 4G/5G transport
Customer case studies based on Cloud Metro architecture
Who is this for?
Host
Transcript
00:05 [Music]
00:11 so let me introduce myself i'm christoph
00:12 sharkovich i'm principal product manager
00:15 but actually working in some solution
00:17 groups as uh so we have some solution
00:19 architecture team uh working on the
00:22 transport architectures focusing on the
00:24 mobile transport architecture
00:26 specifically undertake a cloud so
00:30 so we will be talking about cloud metro
00:32 uh
00:33 architecture so including you know cloud
00:35 metro for the business a customer
00:36 especially for inspection subscribers
00:39 and cloud metro for the
00:40 mobile transport
00:43 so going to more details
00:46 so okay lego described at the beginning
00:48 so i will be talking as well about some
00:50 roadmap items and the juniper is you
00:53 know they're free to change these
00:55 roadmaps what we can tell you what will
00:57 be actually implementing nothing
00:59 inventing so some legal disclaimer
01:01 disclaimer about that
01:03 and the agenda for this short
01:05 presentation is um we'll discuss the
01:07 cloud metro overview in general
01:09 what kind of use cases we have for the
01:12 cloud metro and then
01:14 we'll go in more specific to different
01:16 areas of the cloud metrics as mentioned
01:18 business services is the first area that
01:20 we'll be discussing residential services
01:23 is a segment area and here we as well
01:26 discussing more data's unified pond
01:27 solutions
01:28 and the mobile 4g 5g transport this is
01:31 three areas of the cloud metro that
01:33 we're going to discuss and of course at
01:35 the end some case studies from the real
01:37 customers without naming the customers
01:39 of course that's something that we we
01:41 are working with with their customers
01:43 so what is cloud metro yes for
01:46 traditional and emerging material use
01:47 cases so we divide cloud metro
01:49 applications
01:50 or architectures into three
01:52 free kind of
01:54 use cases that we are addressing
01:56 one use case is business services so we
01:58 have a cloud metro architecture for the
02:00 business services so here we are talking
02:02 about the internet business services so
02:04 some sort of meth defined services like
02:07 e-line ilan
02:09 is or ethernet and npls high capacity
02:12 and as well some isolated free services
02:14 like ipvp and ip services then sd1 and
02:18 cloud connect so interconnect the cloud
02:20 and here we are talking about you know
02:22 additional
02:23 services the required features required
02:25 like telemetry a ptp and so on
02:29 then the second bigger use case for use
02:31 case groups is residential services so
02:33 here we are talking about fiber to the
02:35 home so fttx in general aggregation and
02:38 again this aggregation could be using
02:40 some inline elan service so based on
02:42 internet mpls so it could be vpn or vpls
02:46 and as well so you know important here
02:48 is the multicast as well because we need
02:49 to deliver typically to residential
02:51 services residential subscribers we need
02:53 to deliver iptv so so multicast
02:56 capabilities required and ptp as well
02:59 the jeep on so we here will turkey more
03:01 data later about juniper unified
03:03 solutions so how we how we implement
03:06 that gpu how we unify that and there's
03:08 as well some cable yes what happens in
03:10 the cable space
03:12 when it goes to the cloud metro
03:14 and the third one is the mobile
03:16 transport so here we are talking about
03:17 4g and 5g especially 5g mobile transpose
03:20 of 5g mobile transfer bricks new
03:22 capabilities that are required
03:25 on the transport especially on the front
03:26 hold side so in 5g i will discuss later
03:29 on in the data so we divide the 5g
03:30 transport into three pieces front hold
03:33 mid hole and the back coil piece and
03:35 especially on the front side we have
03:37 very strict requirements when it comes
03:39 to latency that we need to provide over
03:41 the frontal and as well when it comes to
03:43 the timing and synchronization precision
03:45 so here we're talking about class c that
03:47 is required for the timing
03:48 synchronization but i will talk later in
03:50 more data so this is just a small
03:52 introduction and of course on top of
03:54 that we need to have automation suite
03:57 and this is our paradigm automation
03:59 suite so in this presentation i will not
04:01 cover the franklin automation suite but
04:03 paragon automations will be covered
04:04 later on by peter in subsequent
04:07 presentations one of the subsequent
04:09 presentations
04:11 great so let's start with the business
04:13 services so what we have in the business
04:15 services so basically we see you know
04:18 the transport network the cloud network
04:21 has converged metro so basically we have
04:24 one
04:25 transport one the converged cloud metro
04:27 transport that's supposed to cover
04:29 different use cases as you see here
04:31 there's a transport
04:33 you know built from from acx and mx
04:35 devices
04:37 and then we can connect different access
04:39 technologies to this transport that
04:42 could be other tea for example could be
04:44 some business access for the business
04:46 customers but it could be traditional as
04:48 well more traditional islam cmts and so
04:51 on so we believe that you know the
04:53 transport converge transport is there is
04:55 the future story here
04:57 the physical topology of the transport
04:59 in the cloud metro could be different as
05:01 well so here's an example of a spinal
05:03 leaf architecture then you have couple
05:06 of spines a couple of leaves here and
05:07 multiple leaves but of course depending
05:09 on the on the layout of the physical and
05:12 requirements of physical constraints and
05:15 given provider given operator could be
05:17 different topologies this could be ring
05:18 topologies urine topologies are very
05:20 frequent as well very frequently used or
05:23 it could be some combination of ring
05:24 topologies finally topologies some
05:27 passion mesh topologies as well so we
05:29 are prepared for that
05:31 on them
05:33 on all fronts and then you know from the
05:36 domain perspective from the transport
05:37 what we see
05:39 the new emerging protocols that are
05:41 emerging now as we speak is segment
05:43 routing yes all sorts of segment routing
05:45 so we're talking about segment routing
05:47 segment routing traffic engineering and
05:49 topology independent lfa so tlfa
05:52 provides full backup coverage regardless
05:55 what is the physical topology so
05:57 traditionally in the past lfa
05:59 had certain restrictions you know it
06:02 required nice topology from the physical
06:04 perspective in order to provide a
06:06 hundred percent coverage but with
06:08 segment routine introduction of segment
06:10 routing and tlfa which
06:13 segmentation brings to the table we have
06:15 the full coverage full backup coverage
06:17 and then you know the dc domain as well
06:19 we are talking as well we are the
06:21 introduction of segment routing
06:22 capabilities and as well srv6 so we're
06:25 looking
06:26 looking as well some customers you know
06:28 looking for srv6 in the dc domain to
06:31 implement srv6 in the dc domain
06:34 and then on the aggregation igp domain
06:36 you know again segment routing with
06:38 different extension segments i think
06:40 maybe a service six as well
06:42 and then for intra domain
06:43 use cases i will cover electrons one
06:45 more day
06:47 so when the network is very very large
06:49 and then we need to divide this network
06:51 the smaller domains okay because of the
06:54 scaling issues of last radius of of some
06:56 failures scenarios and so on so we're
06:58 dividing the multiple domains we are
07:01 introducing here as well new
07:02 capabilities like bgp class for
07:04 transport so i will mention that
07:06 discussion later in the latest and as
07:08 well controller-based capabilities of
07:11 creating end-to-end tunnels
07:13 using pc controllers so in our case is a
07:16 paragon
07:17 a pathfinder which will be covered in
07:19 more data in the in some subsequent
07:22 presentation
07:24 so business services so as i mentioned
07:25 so that the characteristics of the
07:27 business services
07:28 we have a basically you know on the high
07:31 level two kind of business services one
07:33 is the internet business services so
07:35 this is the
07:36 uh the layer two kind of services
07:38 internal based services and the models
07:41 for this internal based services are
07:42 defined by math metro ethernet forum and
07:45 here we are talking about e-line which
07:46 is point-to-point connection at the
07:48 layer two we are talking about e3 which
07:51 is point to multi-point connection at
07:55 layer two and we are talking about elan
07:57 which is a multi-point to multi-point
07:59 connection and layer two and these
08:01 connections could be implemented using
08:03 different technologies you know it could
08:04 be different
08:06 implemented using dpls traditionally
08:08 a subseed wire emulation speedway
08:11 emulation for the point-to-point
08:13 technologies and vpns for some sort of
08:15 multi-point technologies but the
08:17 emerging key technologies which are
08:19 emerging now is evps
08:21 international private network which they
08:24 very nicely implements all these
08:26 different
08:28 service models required for the layer
08:30 two and again the physical
08:32 infrastructure could be spinal leaf is
08:35 not such as shown here in the picture
08:37 what could be could be some more
08:38 advanced rings and so on
08:41 so
08:42 when we talk about the migration yes
08:45 scenarios for layer two business
08:47 services
08:48 so traditionally layer two business
08:50 services are implemented using some sort
08:52 of epsilon emulation subsidiary
08:55 emulation typically using ldp based
08:58 signaling
08:59 or for the multi-point services is some
09:02 sort of vpls so which are private
09:07 never switch network
09:08 so with vpls and
09:10 this is some sort of hierarchical
09:12 replays as well that we have multiple
09:14 cd-wire emulations multiple epsilon
09:16 statements in the replace instance
09:18 now we are looking to implement this in
09:21 the new way with the advanced vpn
09:24 ethernet which are private network uh
09:27 and here the question is about the
09:29 migration from the old way you know how
09:31 we implemented in the old days and how
09:34 we implemented the new days and we are
09:36 offering here different sort of options
09:39 for
09:40 supporting the migration
09:42 so basically
09:43 for the migration you know when we
09:45 support for example we support a
09:47 configurable segment routing global base
09:50 so segmentating global base is some
09:53 based use though
09:55 so segment routing is basically
09:58 in a way to
10:00 distribute the labels
10:01 through isis or ospf extensions so there
10:04 are igp extensions to distribute the
10:06 labels as opposed to the traditional way
10:08 when they separate protocol like for
10:10 example ldp a level distribution
10:12 protocol to distribute the labels
10:15 and then we're distributing the levels
10:17 of rsi size we have predictive level
10:19 values so in ldp these little values
10:21 there are some sort of dynamic and talk
10:23 so we don't you know we don't know from
10:25 the label value what is exactly meaning
10:28 with the
10:29 segment we can configure base of the
10:31 numbers that we use for the labels and
10:33 then with very predictive labels
10:35 okay
10:36 then the key features that are required
10:37 for the migration scenarios for
10:40 business services as well as segment
10:42 integrity in migration
10:44 in such a way that implements the
10:46 marketing server
10:48 and mapping client so mapping server
10:50 marketing clients are used to map the
10:51 labels between the led domain and
10:54 statement domain
10:55 it's in both directions so one you know
10:57 one direction is
10:59 the direction is not being fired as well
11:01 as and the forwarding plane we
11:03 introduced with this mapping server
11:05 magnet client
11:06 features we introduced as well
11:08 um
11:10 you know stitching at the foreign level
11:12 so this is this is what is
11:14 very important here
11:16 and there are you know a couple of of
11:18 another features so prefix anika seeds
11:20 as segment id
11:23 static replace neighbors
11:25 and as well very important features
11:26 seamlessly placed to evpn migration so
11:29 basically this is the feature that
11:31 allows to create a single instance
11:35 and in the single instance this is evpn
11:38 instance but this evp instance can talk
11:40 as well over vpls to some
11:43 legacy you know pe
11:46 legacy routers using vpns language so to
11:48 say so this using an install can talk
11:50 both evpn language and vps language so
11:53 this is very important for the migration
11:55 scenarios so this is what we what we are
11:58 introducing here
12:01 all right so for layer free residential
12:04 uh for the free business
12:05 residential access we are introducing
12:08 couple of new architecture models so
12:10 first architecture model that i'm
12:12 presenting here
12:13 is based on the flexible cross connect
12:16 as you see here fxc is flexible cross
12:18 connect so what does it mean flexible
12:20 cross connect
12:21 so traditionally when we create layer to
12:24 see the wire
12:25 from from one device like here on the on
12:27 the bottom this icx device to some
12:30 another device here and on the top some
12:32 mx device so traditionally this layer to
12:34 see the wire needs to be terminated on
12:36 single physical interface
12:38 okay and in that case see so here if i
12:40 have free physical interfaces i would
12:42 need to create free seed wires to
12:44 interconnect these three physical
12:46 interfaces to the mx
12:48 so of course if if i need to if i think
12:51 about you know large network uh with
12:53 scaling requirements uh this requirement
12:56 if i have here 48 ports for example on
12:59 this box on a6 for 54 48 or four third
13:02 access ports it would mean i need to
13:04 create 48 fcd wires out of this single
13:08 access device to my some service device
13:11 mx so this this
13:13 you know great scaling challenges if i
13:14 have many
13:16 access devices like that and from every
13:19 access device i need to create large
13:20 number of seed wires so it might be
13:22 scanning challenge on the on the on the
13:24 service p and that's a
13:28 in that scenario so we introduce a
13:30 flexible cross connect with allows you
13:32 know to
13:33 cross connects multiple physical
13:35 isotropic from multiple physical
13:37 interfaces over a single
13:40 cd-wire okay this flexible cross-connect
13:42 see the wires of vexilar cross connect
13:44 evpn vpws service which are private wire
13:48 service allows to send the traffic from
13:51 multiple physical interfaces
13:53 okay and on the only one instance here
13:55 with matica physical interfaces and mcdo
13:58 wire is attached to this one instance
14:00 so this is this is very important
14:03 then another model as well that we
14:05 introducing are we supporting is the
14:07 multi-homic yes so we can active active
14:10 multi-homing as you see here
14:12 it's introduced using evpn ethernet
14:15 segment identifier so evp and
14:17 multi-homing this is evpn based
14:18 multi-homing they could be active active
14:20 active standby defective is the is the
14:22 most popular one and then in that
14:25 example you know the pawn device is
14:27 connected to two access devices to acx
14:29 access devices in active active
14:32 commander on the phone device it behaves
14:34 like normal lag interface aggregate
14:36 interface
14:37 all right and then the again is
14:38 collected from two's axis devices sent
14:41 to some um
14:43 service pe
14:44 on the service pe we are introducing as
14:46 well the concept of
14:49 of cd-wire head and termination
14:51 so basically with c2i and then
14:53 termination we terminate the speedo wire
14:55 again regardless if this is as i
14:57 mentioned before flexible
14:59 cross-connected wire with evpn service
15:02 or a plain evpmc driver we terminate
15:05 that on the on the single epsilon
15:07 determination interface and here we can
15:10 extract different vlans from the speed
15:12 wire to different services
15:13 as you see here we extract you know
15:16 zombieland to vrf1 service some anova
15:18 vlan to vrf2 service and maybe third
15:21 will undo some vpls service so it's very
15:23 flexible way of providing the services
15:28 so
15:29 for a another way as well so we have as
15:32 well more traditional with mc lac so
15:33 multicast is lack yes we multi-chassis
15:36 lack we can provide as well
15:38 the similar services of course there are
15:40 some some restrictions here
15:42 regarding the flexibility cross connect
15:45 for example and as well with multicast
15:47 slack we can provide active standby
15:49 services but otherwise the picture is
15:51 very similar the services we can provide
15:55 and then as well a number is for delay
15:56 free business access yes they are free
15:58 business access again
16:00 we have only a layer two on the access
16:03 site
16:04 a to provide
16:06 you know active active layer to access
16:08 from the from the uh
16:10 access device or ftth device in that
16:12 case here
16:13 and
16:15 immediately on the access
16:16 pe here i acx access d we extract this
16:20 layer to traffic into layer free so
16:22 every ilv integrated routing and
16:25 bridging interface okay with the
16:27 integrated loading and bridging
16:28 interface
16:29 to provide resiliency this rb interface
16:32 on on one xsp
16:34 and lb interface on an over xsp is
16:37 configured with exactly the same values
16:39 so you see this ipad which is exactly
16:41 the same micro this is exactly the same
16:43 which means if this ftth box is doing
16:46 some load balancing and so it doesn't
16:47 really matter over which member link the
16:49 traffic is sent it will land
16:51 you know
16:52 on the on the same irb from the fth
16:55 perspective and then irb interface this
16:57 is layer three interface this is some
16:59 interface which is teaching layer two
17:01 domain with layer free domain layer free
17:02 domain that means vrf so irb is placed
17:05 in the vrf and then from
17:08 that point on onwards we send the
17:10 traffic as free vpn traffic
17:15 now quickly let's go to the residential
17:17 services
17:19 so let's discuss the residential
17:21 services so again residential services
17:24 as well the important is the block
17:25 holding of the traffic typically you
17:27 know some sort of backlink of the
17:29 traffic from the
17:31 from the homes from the residential
17:32 places up to the places where we have
17:35 some bng so
17:37 so subscriber management
17:39 devices bng or some cache servers and
17:42 some internet so this is typical way
17:45 that with that we need to do that and of
17:47 course here as well we can do vpls uh
17:50 see the wire uh
17:52 emulation backhoe link
17:54 or in a new one is evpn base backhauling
17:57 so let me discuss and here is well
17:59 important some few
18:00 q and q so double vlans because for the
18:03 residential services we typically have
18:05 very very large number of of the
18:07 subscribers so with single vlan it would
18:10 not be possible to transport all this
18:13 traffic for subscribers seeing a million
18:14 dollars on the 4k subscribers so we have
18:17 super support for qmq and as well they
18:20 say snooping so typically these
18:21 residential subscribers that will
18:23 dynamically get ip address assigned igmp
18:27 snooping for iptv for example you know
18:30 not every subscriber is interested in
18:32 the same iptv channel so into five gp
18:35 snooping
18:36 to
18:37 to snoop to what the iptv channels are
18:40 required for given subscriber
18:43 so
18:44 what
18:45 new features that we introduce so
18:46 features on on acx devices that we're
18:49 introducing here to support this one
18:51 again so active active multi-homing evp
18:54 and active active multi-homing is
18:55 similar like we had in the previous
18:58 slides for
19:00 uh
19:01 business subscribers but in addition to
19:03 that one and then irb as well sir b
19:05 interfaces as discussed before but in
19:08 addition to that we have a advanced
19:10 feature for the hcp so we have the acp
19:13 relay on these rv interfaces
19:15 placing the evpn instances
19:18 as well as we have a synchronization of
19:20 dhcp relay state between two
19:23 access ps
19:25 so because the synchronization is needed
19:27 for the heb states
19:29 eventually if you like to do the hp
19:31 snooping on some dc base protections
19:34 that's like for example our dynamics art
19:37 inspection
19:38 so if the left
19:40 if the access p on the left hand side is
19:42 distributing the ip addressing to the
19:44 subscriber
19:45 then this information needs to be
19:47 synchronized with the access the device
19:49 on the right hand side so when the
19:52 for example dynamic arp inspection is in
19:54 place
19:55 and the traffic is not balanced to the
19:57 right
19:59 access the right acx this information is
20:01 available here for for dynam cart
20:04 inspection so this is what we introduced
20:06 on this on these devices as well and
20:08 synchronization as well on the ignp mlb
20:11 state so agmpmd snooping this is for
20:14 iptv distribution again if some igp you
20:18 know initial igmp
20:21 exchange was exchanged between the
20:23 subscriber and the left b
20:25 but eventually the traffic is sent
20:27 overnight speed and then of course right
20:29 p needs to have this state as well so we
20:31 need to have synchronization and this is
20:33 what we implement
20:35 here as well
20:38 and last but not least is
20:40 as well
20:41 distributed access architecture for the
20:44 cables of the cable operators so here we
20:46 are we have different architectures that
20:48 we are looking for so first architecture
20:50 is based on sql 3 mode 5. so on remote
20:53 file we have a remote file device and
20:56 the remote file device is doing on the
20:58 very very basic processing of the of the
21:00 signal yes that we receive for the rfi
21:03 signature dc for the coax cable is
21:06 basically putting this this signal in
21:08 some sort of
21:10 you know see the wires so as you see
21:12 here dps downstream external file
21:14 interface this is based on the ipc wire
21:16 so putting the signature wires and
21:18 transporting the signal you know for the
21:21 for the core
21:22 for the converge cable access platform
21:25 core
21:26 for for the processing
21:28 okay and so the advantage of this one is
21:31 that
21:31 in this part of the network
21:33 we can use ip network yeah because here
21:36 we can put the signal in some some of
21:38 ipc the wires so npsp device ipm pls
21:41 networks ipm psp wires so we don't have
21:44 to dedicate the network here only in
21:46 this part of the network you have
21:47 dedicated this box
21:50 network
21:51 another approach and over architecture
21:53 approach is that
21:54 some
21:55 processing some mac some mac layer
21:57 processing that here and the frisbee
21:59 approach is in the center alcohol site
22:01 is moved to the remote site okay and
22:04 that's the reason we call it a remote
22:06 machine
22:07 a device so here it requires more
22:09 advanced device in the remote sites but
22:12 here we don't need to have any sort of
22:14 tunneling as before so before we had
22:16 some sort of tunneling here side piece
22:17 in the wire say it's not my ip traffic
22:19 here already
22:21 and and the third one is the
22:22 visualization so basically this
22:25 converged cable access platform in
22:27 central location is being visualized so
22:30 this instead of having physical
22:32 dedicated services here we have mutual
22:34 services
22:36 running on the conventional intel
22:38 servers and so which are you know
22:42 platforms that this is basically the
22:43 same as model one model one and three
22:46 are very similar with the difference
22:47 that here we have everything is
22:49 virtualized instead of having a physical
22:51 devices so we see what we see on the
22:53 market what the one is the most dominant
22:55 with the three is taking over yes model
22:57 two is not the dominant this is what we
22:59 see but one three these two models are
23:02 pretty dominant in the market and here
23:04 you know some some more datas are the
23:06 use cases of this distributed access
23:08 architecture use cases so one very
23:11 simple use cases is that we have this
23:13 lpd so remote file devices
23:17 on the under remote locations they
23:19 collected by the acx you know access
23:23 devices access piece
23:25 uh sending some some ipc ui and this ipc
23:28 where it's going to nx 1003 and here you
23:30 know it's terminated and then the
23:32 traffic is distributed to the decor
23:34 functions so this is very very basic
23:37 location for this see the wiring or this
23:40 you know
23:41 signaling processing to work we need to
23:43 distribute as well the clock yeah so
23:45 that's the reason there's some grand
23:46 master in the corner of the network from
23:48 the grand master without distributing
23:49 the clock the clock needs to be
23:51 distributed to the rpds and that's what
23:53 needs to be available in the central
23:54 location because otherwise we cannot
23:56 recover the the signal
23:59 i know one advance you know depending on
24:01 the size of the network but in the
24:02 remote locations and the central
24:04 location we could have more advanced
24:06 hear scenarios
24:08 using some spinal leaf architecture with
24:10 the leafs being acx and the spines being
24:14 qfx so the reason that leaves ccx is
24:16 because we need to have here some
24:19 clocking
24:21 so some boundary clock is required here
24:23 to provide the clock to lpd devices on
24:25 the spine the polymeric is not required
24:28 here we are
24:29 okay with the transparent clock as well
24:31 so that's the result which a cheaper
24:33 device with low buffering so it could be
24:35 could be used otherwise it's similar to
24:37 the previous case
24:39 and of course in more advanced even more
24:40 advanced scenarios when the transport
24:42 network you know this this central site
24:44 is much far away from the remote sites
24:47 and there are plenty of remote sites you
24:49 could have ever more advanced scenarios
24:51 using for example the rings of dwdam
24:54 rings
24:55 and with a670 100 rotaries which
24:58 recently were announced or recently were
25:02 released uh we can have colored optics
25:04 as well and with the colored optics we
25:06 can you know attach these
25:08 rings directly to the dwm this rod is
25:11 directed to the dwdm rings
25:15 all right let's go me now for
25:17 residential services
25:20 so residential services uh for
25:22 resonations this is specifically for the
25:24 uni for unified point solutions yes you
25:26 need five point solution so basically
25:28 what we are introducing is unified fund
25:31 solution what does it mean unified
25:32 unified means that we have a sfd which
25:36 supports rlt so this is modular team so
25:38 sf sfp with the ot support as you see
25:42 here this fap consumes a little bit more
25:44 power than the traditional sfp that's
25:46 the reason you know there's additional
25:47 stuff for the cooling with this sfd at
25:49 the same radiators here for the cooling
25:51 sfp then we have junos rotor when we
25:53 inject this sfp
25:55 and broadband gateway somewhere that
25:58 do subscriber management
26:01 all right and then basically in we are
26:04 replacing a traditional way of deploying
26:07 all the networks say that we have some
26:09 you know h or access rotor and this
26:11 x-axis rod is connected to some pony or
26:14 t-shelf in this finality chevy's you
26:16 know lt determination
26:19 instead of that we have still our h-axis
26:22 router which is acx so initially we
26:26 qualified this solution on the acx
26:27 service specifically on a6 5448
26:31 initially
26:32 but you know in the future we might
26:33 quantify the national devices and here
26:36 we inject this you know sfp
26:40 plus base the all t devices directly
26:43 into the uh into the router okay so this
26:45 is very efficient instead of having
26:47 separate boxes we have everything
26:49 integrated
26:50 into one box is a very efficient
26:52 solution and as i mentioned initially we
26:55 support we qualify this on ac axis and
26:57 we have three types of a6 5448
27:00 specifically and we have three types of
27:02 a6
27:03 5848 so a6 basic a6 5048 then 5448d
27:09 which has the dwdm interfaces for the
27:12 uplinks and a650 ford 48m which has a
27:16 maxx support okay so for all of these
27:18 three types of 5448 this solution is
27:23 qualified is supported
27:26 because of the cooling requirements or
27:29 power
27:30 requirements of these sfps as i
27:32 mentioned they consume more power than
27:33 traditional sfps we can they populate
27:36 only half of the ports on a6 54 48 with
27:40 that we despawn all the panels the sfps
27:43 so which means we can populate 24 uh
27:46 imports 24 sockets yes if this is a
27:49 piece remaining circuits can be
27:51 populated with something with
27:52 traditional sfp
27:53 and the because of one sfp one the
27:56 finality sfp we support up to 128
27:59 subscribers so it means that the 186
28:02 5448 can support up to 3 000 subscribers
28:05 and then subscriber management itself is
28:08 you know
28:09 taking place on dng on the mx
28:12 broadcast
28:17 so unifying the solution components
28:19 again is a sfp which is injected into
28:23 acx 5448 router so all the bases fb this
28:27 is one solution
28:28 then we have a controller says
28:30 lightweight agent on the routers
28:32 managing the sfps and this as well
28:34 manager so central database is a
28:37 software with the central manager
28:38 software managing this all dc from the
28:41 center location
28:43 so there are the three components
28:45 and because of that as you see here that
28:47 this component so we have a
28:49 panel t injected in acx routers then we
28:52 have some control processor and the
28:55 central manager to manage all the
28:57 database from online on all phones in
28:59 the network and and bng or virtualbng as
29:02 well to make a subscriber management and
29:05 everything communicates over traditional
29:07 ips network so we could have here
29:09 traditional ipm based network
29:11 whatever is is so good could be shared
29:14 this network could be shared with the
29:15 other services used in the network
29:17 doesn't need to be dedicated for the
29:19 phone rlt
29:22 all right
29:23 and the last but not least
29:24 is mobile
29:26 mobile 4g 5g transport network
29:29 so
29:31 what we see the in the mobile what's
29:32 happening in the mobile space when it
29:34 both it goes to the transport and the
29:36 radio as well itself is the shift in the
29:38 how the radius are being built so
29:40 traditionally the radius are being built
29:42 in such a way that we have a remote
29:44 radiohead so basically antenna on the
29:46 top of the tower
29:48 and the bottom of the dowel bbu basement
29:50 unit so basement unit is you know
29:52 processing the antenna signal and it's
29:54 locally on the same location so antenna
29:56 is the top of the tower bbu's bottom of
29:58 the tower and let's say 89 of
30:00 deployments is following this this this
30:02 model today
30:04 then
30:05 some of the deployments in a slightly
30:07 different in some of the deployments we
30:09 are putting away this dbu to some more
30:12 centralized location centralized
30:14 location so the reason being is because
30:16 in that case
30:17 these bbc use doesn't need to be
30:19 hardened because if you know central's
30:21 locations 20 views i can have small
30:24 you know small small central office
30:26 whatever with with proper cooling and so
30:28 on this previous doesn't handle so the
30:31 overall operational cost is slower
30:33 comparing to the hardened dbus at each
30:35 tower location
30:37 and the you know communication between
30:39 these bbus and the and the
30:41 remote radiohead antennas is based on
30:43 the front hall protocol which goes
30:45 simply common public radio interface so
30:48 common public radio interface is some of
30:50 secret switch protocols it's not not
30:52 internet based not ip based not mpls
30:54 nothing like that it's circuit switch
30:56 it's something like you know tdm kind of
30:58 of protocol something and not exactly
31:00 but something like that
31:02 and
31:03 there are strict requirements here this
31:04 bbu cannot be very far away from from
31:07 antenna because otherwise the antenna
31:09 cannot be processed correctly so we are
31:11 talking about 10 to 20 kilometers
31:13 approximately so the reason being the
31:16 latency between bbu and remote radiohead
31:18 we are talking here about around 100
31:20 microseconds so that's the reason that
31:22 it cannot be because if it's more than
31:24 these 100 microseconds for example one
31:25 millisecond latency we cannot really
31:28 recover the signal so that's that's the
31:30 challenge and we see you know this is
31:32 ten percent approximately deployments
31:34 using this model
31:36 no this model is further changed by
31:38 virtualization of the dbus so if the
31:41 instead of having the physical
31:42 appliances for bbus we are having some
31:45 small data center with some intel based
31:47 you know servers on this inter-based
31:49 service we are installing bbu
31:50 applications which are doing the signal
31:52 processing
31:53 of course a digital signal processing
31:55 requires some special computation power
31:58 so these servers need to have some
31:59 special hundred pieces uh for for
32:01 supporting this dsp processing okay this
32:04 is not the traditional server but with
32:05 some additional hybrid piece could be
32:07 based on fpga for example is this
32:10 you know additional dsp processing
32:11 capability or gpu graphical or
32:15 graphical
32:16 process unit processing unit as well it
32:18 can be used for that
32:20 and further for 5g what we are seeing is
32:23 that further this component bbu is
32:25 divided into two separate components one
32:29 component is called du so distributed
32:31 unit
32:33 and an overcome company is called cu
32:35 centralized unit so du component is
32:37 strictly used to you know to completely
32:40 process the antenna signal fully process
32:43 antenna signal and convert this antenna
32:45 signal to ip packet so extract you know
32:47 ipv packets from data snip packets cu is
32:50 used more for the coordination between
32:53 multiple antennas and so on okay so this
32:55 is that's the reason we don't see the
32:57 process here we antenna signals and
32:59 longer so which means this handle
33:00 requirements when mentioned before the
33:02 server is adequate only for the edu as
33:05 well as strict you know
33:07 clocking synchronization requirements
33:09 adequate on the du as well
33:12 so basically so this is the challenge so
33:14 this is the difference that we see yes
33:15 enough b is is you know is distributed
33:18 across them
33:20 radio you need a distributed unit and
33:22 centralized unit with additional pieces
33:24 of the transport network pistol front
33:26 hole and the mid hole and therefore the
33:28 front we have very strict requirements
33:30 here like hundred to 200 microseconds
33:32 latency another requirement for 5g as
33:36 well is a very slight timing
33:37 requirements so here time alignment
33:39 error this is a you know
33:41 timing precision required between two
33:43 radio units between the antennas again
33:46 depending what kind of radio features we
33:48 are implementing we try to implement
33:50 these requirements could be very strict
33:52 for example very typical requirements
33:53 that we see today is here for 260
33:56 nanoseconds on 130 nanoseconds between
33:59 two antennas in order to implement these
34:01 advanced features like for example
34:03 indra band continuous carry aggregation
34:06 in frequency range too intravenous
34:07 conditioner
34:09 aggregation is some sort of aggregation
34:11 of the
34:12 radio spectrum regular channels
34:15 and and it's important
34:17 we see the requirements as well for the
34:19 transport slicing so we see three
34:21 different transport slice architectures
34:23 or use cases one is tactical link
34:26 slicing so which means we have one link
34:28 i would like to know which analyze this
34:30 thing somehow another is network sharing
34:32 use case when you have in
34:34 network transport and we would say okay
34:37 green operator can use twenty percent of
34:39 capa capacity of this network and red
34:42 operator can use fifty percent capacity
34:44 of this network yeah this might be used
34:46 for example for the run sharing and in
34:49 the run sharing we have as well so
34:50 access network is shared but we multiple
34:52 operators
34:53 and then at the very end we have you
34:55 know dynamic free gpp end-to-end slicing
34:59 requirements or use cases
35:02 so from the building blocks not the
35:03 transport network you see what features
35:05 or what the building blocks we have to
35:07 implement the slicing
35:09 and in the cloud metro network so first
35:11 building block is some sort of
35:13 isolation or separation of the traffic
35:15 but in different slices is required this
35:18 is being implemented using traditional
35:19 vpns so nothing new here so we have
35:22 layer free vpns
35:23 mvp and vpns and vlans as well the
35:26 access interfaces so basically this is
35:28 business as usual then the second
35:31 building blocks the second aspect of the
35:33 transfer network slicing the cloud
35:34 network is some sort of topology
35:36 differentiation so i have one physical
35:38 topology but out of this one physical
35:41 apology i can topology can create
35:43 multiple logical topologies okay
35:46 the third one is some sort of resource
35:47 guarantees so we need to provide some
35:49 resource guarantees for the slices
35:51 uh and the fifth one the fourth one
35:53 sorry is the om monitoring so we need to
35:56 monitor the sla
35:57 of the slices
35:59 and the fifth one is end-to-end
36:01 orchestration which will be covered in
36:03 the subsequent session
36:05 so the mapping and then specifically
36:07 when we talk about the mapping of these
36:10 slices to the free gpp use cases on the
36:13 run scientific gpp you identify the
36:15 slices using using ssd sd ssds service
36:19 type as the slice differentiator
36:21 these these slices are mapped to some
36:23 vlans and there's villain handoff
36:25 between the radio site and the transport
36:27 site called metro site and then as i
36:29 mentioned so here we have this
36:30 attributes like vpns some topology
36:32 differentiation and some resource
36:34 guarantees
36:36 recently we introduced as well for
36:37 topology differentiation a new feature
36:39 in joonas this is introducing 21.1 so
36:42 this is q1 of this year
36:44 and basically we are
36:46 from q1 this year we are capable to do
36:48 multiple routing tables per topology
36:50 slice for topology so basically you know
36:52 we can create a
36:54 low latency panels using whatever slt or
36:58 or flex algo or lsvp some other tencent
37:01 unless and we install these lower tensor
37:03 panels in this orange routing table then
37:06 another set of panels you know is
37:07 created
37:09 optimized for the best for the so high
37:10 capacity the best therefore are these
37:12 standards are inside the green tracking
37:14 table and so on and then later on when
37:16 the traffic is mapped this nothing is
37:19 mapped by all the additional attribute
37:20 that is distributed with the refugee and
37:22 prefixes which is the extended humanity
37:26 so here you see our extended community
37:27 smart so which means the protocol next
37:29 call for this report these graphics will
37:32 be resolved inside of this traffic level
37:34 so this
37:47 as well the new for the um
37:50 advanced architecture with multi-domain
37:52 architectures in order to create the
37:53 slices across multiple
37:55 multi-domain cloud architectures so
37:57 transport architecture
37:59 a new
38:00 extensions to bgp which are called bgp
38:02 class classical transport so there's
38:04 reference here to the to the the draft
38:07 and this is basically enhancements of
38:08 bgplu so this is you know like vgplu
38:11 today with the addition of slice
38:13 awareness so that we can create the you
38:15 know slices end to end using bgp class
38:17 for transport across multiple domains
38:20 and as as well we have another option
38:23 if for specifically for customers that
38:25 are looking for end-to-end slt
38:27 calculations so we have some optimized
38:30 end-to-end
38:31 handles calculations when we optimize
38:33 the
38:35 topology database visibility from remote
38:39 domains in order to scale this this in
38:42 the high in the high level domains and
38:44 this is called express segment
38:46 architecture
38:49 and
38:51 and we have
38:53 traffic as well introducing a new way of
38:56 of a here called qs
38:58 so h cos here so with h cos
39:01 we can
39:02 create
39:06 h strategies over interface without the
39:08 v naught so traditionally we need to
39:10 village here sub interfaces
39:12 and
39:13 here with this h cos new h cos we can
39:16 you know classify the traffic on the
39:18 input and then based on that we kind of
39:20 specify
39:21 attach h4 and output
39:23 and that's all what i wanted to present
39:26 so thank you very much
39:32 [Music]