×
BNG AND VBNG

AS I WOULD RECOMMEND 

7730 Service Interconnect Router.

The Nokia 7730 Service Interconnect Router (SXR) family provides next-generation IP access, aggregation and edge platforms that make it easy to deliver secure, assured and sustainable IP networking services.

Designed for communications service providers (CSPs) and mission-critical enterprises, 7730 SXR platforms can help you boost performance and capability in advanced IP access and aggregation networks. In distributed IP edge locations, they can help you more efficiently meet the demand driven by broadband investments and evolving cloud network architectures. For mission critical services, the 7730 SXR brings a new level of deterministic performance and resiliency to the furthest reaches of your network.

Enjoy the benefits of advanced routing silicon

At the heart of the 7730 SXR is the Nokia FPcx network processing unit (NPU). In-house designed and fully programmable, the FPcx brings the values of our high-performance and feature-rich FP silicon into a compact and extensible package.

With network security features such as in-line filtering for DDoS mitigation and advanced line-rate encryption, you can rest assured you will have the tools to protect your network and the services running on top of it. A unique multi-core cluster design opens up new ways to streamline software upgrades without network downtime. Advanced QoS, queueing and a hierarchical memory design ensure that your IP packets will get where they need to go when they are supposed to get there.

With a fully programmable NPU, you can accommodate new services and standards as they emerge without having to rebuild your network.

Unlock a new era of NetOps with SR Linux on the 7730 SXR

As networks become more complex, network automation becomes an increasingly critical approach to streamlining network operations. 7730 SXR platforms are built for automation from the ground up, leveraging the Nokia SR Linux network operating system (NOS), which embraces cloud-native design principles, and the Nokia Network Services Platform (NSP) automation suite.

Benefit from automation at scale with a modular model-driven architecture, telemetry at unprecedented granularity and unified service automation and network optimization across IP, MPLS, Ethernet and optical transport layers.

Enjoy resilient networking and hitless per-application software upgrades enabled by the microservices-based, state-efficient design of SR Linux.

Be ready for the future with the unmatched extensibility of SR Linux, enabled by its open design and application development platform.

Add efficiency into your IP network design

With four fixed form-factor and two modular platform variants, and support for high-density interface speeds ranging from 1GE to 400GE, you are sure to find the right 7730 SXR platform to efficiently meet your IP access, aggregation or small edge needs.

SXR family

Introducing the Nokia 7730 SXR, raise the Xpectations of your IP networks

FPCX

Nokia FPcx routing silicon

NetOps raises your Xpectations for IP Network operations

Video

How NetOps raises your Xpectations for IP Network operations with Nokia

7730 SXR benefits and features

Assured and efficient performance

  • Deliver assured IP services with a network processor design that supports deterministic performance, 7-level hierarchical QoS and 256K queues.
  • Ensure consistent service levels across your network with a robust and reliable NOS that leverages field-hardened SR OS protocol stacks and IP networking applications.
  • Drive energy efficiency through right-sized platforms, support for SFP-DD optics and 112G SerDes technology.

Extensive capabilities

  • Deliver more IP services and visibility with superior scalability for counters, services, tunnels, queues, policers and tables.
  • Enhance IP network security with in-line support for DDoS mitigation.
  • Secure IP services through MACsec/ANYsec line-rate encryption with no impact on performance.

Advanced timing and synchronization

  • Meet stringent synchronization demands with highly accurate timing enabled by integrated dual-band Global Navigation Satellite System (GNSS) receivers.
  • Support time-sensitive packet transport and fronthaul networks with a Class C-based Telecom Boundary Clock.

Right-size scale for efficient network designs

  • Bring more capability to the furthest reaches of your IP network with platforms that support 3.6 Tb/s to 5.6 Tb/s of system capacity.
  • Support interface speeds from 1GE to 400GE with comprehensive breakout capabilities.
  • Introduce coherent routing applications with platforms that support digital coherent optics (DCOs).

NetOps building blocks

  • Streamline IP network operations with a Linux-based NOS that supports cloud-native design approaches with a modular, microservices, state-sharing architecture.
  • Customize your network with our NetOps Development Kit (NDK) and programmable Python-based CLI.

Built for automation at scale

  • Automate IP network operations at scale with model-driven management, full YANG coverage and comprehensive telemetry with granular counters on all key metrics.
  • Leverage unmatched traffic control and optimization, network and service assurance, and transport and service provisioning with the Network Services Platform (NSP).

Solution components

FPcx

SR Linux

Network Services Platform

Resources

 

Application notes

 

Blogs

 

Brochures

 

Solution Sheet

 

White papers

Related solutions and products

Coherent Routing

IP Anyhaul

7750 Service Router

Deepfield Defender

Network Services Platform

-----------------------

Now About BNG AND VBNG

There is no such difference in BNG and vBNG , it’s depends on how you implementing . Here only the platform for vBNG (virtualized devices going to be used) is changed and some of the CLI’s . when i was working i have not seen so much differences .

---------


 © 2020 SCTE•ISBE and NCTA. All rights reserved. 1 A Virtual Broadband Network Gateway (vBNG) Approach for Cable Operators in a Distributed Access Environment A Technical Paper prepared for SCTE•ISBE by Jason Combs Principal Architect Comcast 1800 Arch St Philadelphia, PA 19103 609-706-9190 jason_combs@cable.comcast.com © 2020 SCTE•ISBE and NCTA. All rights reserved. 2 Table of Contents Title Page Number 1. Introduction.......................................................................................................................................... 3 2. The challenges of today’s access network ......................................................................................... 3 3. A method of network abstraction......................................................................................................... 5 3.1. Service Activation Layer......................................................................................................... 6 3.2. The virtual Broadband Network Gateway structure ............................................................... 8 4. Advantages of an NFV and SDN approach compared to a traditional BNG ...................................... 9 5. Conclusion......................................................................................................................................... 10 Abbreviations .............................................................................................................................................. 10 Bibliography & References.......................................................................................................................... 11 List of Figures Title Page Number Figure 1 – Evolution of the Access Network ................................................................................................. 4 Figure 2 – Functional components of this network abstraction..................................................................... 6 Figure 3 – Interfaces and functions of the Service Activation Layer............................................................. 7 Figure 4 – vBNG structure (OLT example) ................................................................................................... 8 List of Tables Title Page Number NO TABLE OF FIGURES ENTRIES FOUND. © 2020 SCTE•ISBE and NCTA. All rights reserved. 3 1. Introduction For as long as the Multiple System Operator (MSO) community has built and operated networks, we have been looking for better ways to segment it, and to optimize the work needed to update and maintain it. In addition, serious efforts emerged over the last several years to add other access media to the mix, such as passive optical networks (PONs) and wireless technologies. Among these efforts is network function virtualization (NFV) and software defined networking (SDN), which have captured the attention of the MSOs and of the networking world at large. How does the MSO community take advantage of these concepts to fulfill both today’s needs as well as the desire for an easier, quicker deployment of access network technology going forward into the future? In this paper, we will explore: • Challenges faced by MSOs in deploying new types of access technologies alongside the current (virtual/”v”) CMTS • A method for abstracting service activation to allow for common control of dissimilar access technologies • A flexible virtual broadband network gateway (vBNG) structure that matches MSO service formats to operate non-DOCSIS access technologies (e.g. PON) • Advantages of this NFV and SDN approach compared to a traditional hardware BNG 2. The challenges of today’s access network The traditional cable operator’s access network is centered around the DOCSIS technology that we all know and love. The business support systems (BSS) and the operations support systems (OSS) that are employed are equally centered around supporting the protocols defined by the DOCSIS protocols. CableLabs and we, as a community, have done an excellent job of extending those systems to support our business needs, as our customers and the Internet as a whole evolved from basic data services into voice, IP video, and commercial services. The focus on a single technology with a single provisioning and operating model led to development of Cable Modem Termination Systems (CMTS) and Optical Line Terminators (OLT) that are fully integrated, as shown in the blue and orange boxes in Figure 1. These systems are typically developed by a single vendor to support all of the service, routing, reporting, and physical functions. The Distributed Access Architecture (DAA) separated the physical generation of the signal, but otherwise remained as integrated as the original CMTS systems. Likewise, the virtual CMTS (vCMTS) has given us a peek into the future by allowing the CMTS functions to live in a server environment, with all of the technology used to accomplish that, but still retains the unified structure seen in prior iterations of the CMTS. © 2020 SCTE•ISBE and NCTA. All rights reserved. 4 Figure 1 – Evolution of the Access Network The challenge with this integrated structure begins to clearly show itself once we consider providing our services through other access technologies. The expansion into other access technologies is happening for a number of reasons including demand for multi dwelling unit solutions, changes in physical construction costs, and the desire to compete in the Wi-Fi and wireless arenas. Although more distinctly seen now, these issues have been lurking in the shadows all along. The DOCSIS service, provisioning, and operational models do not mesh well when combined with the wireless, fiber, and ethernet technologies that allow us to expand our network in non-traditional directions. On the other side of the coin, the BSS and OSS systems that have grown up in reaction to the DOCSIS architecture force us to attempt to have other access technologies mimic that architecture to avoid major back office changes. The following paragraphs provide a brief synopsis of five admittedly intertwined priorities that are difficult to achieve with the current structure. • Swift integration of new access technologies. Beyond the need to develop a technology for our physical network, new technologies typically also come with a full system design and integration. All of these system components require time to develop, and often duplicate the same functions from other systems. Most introductions of new vendors cause us to start this cycle again, representing a high barrier to entry and ultimately fewer options for technology partners. • Consistent services provisioning. It is cumbersome to develop and maintain separate BSS systems, in whole or in part, for every technology that we deploy. The problem is a compounding one. It is a massive effort to deploy new authentication and service definition systems, and once they exist, they are difficult to maintain while assuring that service definitions remain aligned © 2020 SCTE•ISBE and NCTA. All rights reserved. 5 with the existing DOCSIS systems. The way around this problem is to create a translation system, such as the virtual cable modem introduced by DOCSIS Provisioning of EPON (DPoE). This, too, needs to be maintained and updated with the latest changes, and can easily fall behind. Workaround remedies add time to any process and represent custom work for the MSO community. • Service consistency. DOCSIS provides a robust set of service features, which are implemented in its service flows with extensive classifiers, subscriber management filters, and frame accounting with Simple Network Management Protocol (SNMP) and IP detail records (IPDR). Other access technologies have similarly robust features that are simply different from what we typically use. Aligning these methods can cause hardware and feature control issues that limit our choices. The worst-case scenario is the network could look and act differently for one customer than it does for another. • Testing velocity. Swift testing is an inherent challenge with any additional development. What exacerbates it is the unnecessary replication of the same function within multiple systems. Rather than testing the unique functions, much time is spent retesting different implementations of the same function. • Operational model differences. With different systems come different interpretations of specifications and different interface models. This is aggravated by specifications created by organizations with very different goals, that apply to other access technologies. They also create additional work, to translate from one system to another. 3. A method of network abstraction There is no simple or fast solution to the challenges stated in the previous section. A new system organizational abstraction is needed to make significant progress in resolving these issues. The existing system needs to be broken into distinct components that can evolve in isolation from each other. In kind, these components need to be linked by extensible application programming interfaces (APIs) that can be modified to meet the needs of the future. With this isolation and extensibility, we remove the need to replicate functions that are common to all of the access technologies and give ourselves the flexibility to integrate any technology quickly. Figure 2 below represents the proposed network abstraction. © 2020 SCTE•ISBE and NCTA. All rights reserved. 6 Figure 2 – Functional components of this network abstraction This architecture focuses on three major areas of providing services through a scaled access system: The billing and provisioning systems manage the customer entitlements and interactions with us as cable operators. It is necessary to break away from the tight DOCSIS integration that our back-office systems are built on. Much of the goal of this architecture is to enable that transition. The change itself is a massive amount of work that is not directly addressed within this paper. The service activation layer receives the entitlements from the BSS and creates the detailed service description for a particular customer device. The vBNG implements the service description provided by the service activation layer and manages the moment by moment experience of the customer. This layer can be broken down further, which we will explore in the following sections. We can add a fourth area to this list of three areas to include the operations and data gathering systems. This has been explored by prior papers in detail, for example, in the SCTE paper “The Future of Operations: Building a Data-Driven Strategy” [1] and will not be explored here. 3.1. Service Activation Layer The service activation layer exists to create a means of defining the customer’s access network services that is abstracted away from both the BSS system and the access technologies that those services ride on. There are several aspects to this component that are necessary to be able to provide this function as illustrated in Figure 3. © 2020 SCTE•ISBE and NCTA. All rights reserved. 7 Figure 3 – Interfaces and functions of the Service Activation Layer • Service Entitlement flexibility. Many access networks, such as DOCSIS, use a bottom up provisioning methodology where the end device requests service. However, there are examples of top down access networks, such as commercial ethernet and residential ethernet, where the end device does not include this capability. It is important to have an API that allows for both methods of entitlement and configuration. • Unified Access Service Descriptors. These descriptors are imagined to be in the form of a YANG data model to communicate the services to the vBNG deterministically. They would be formed via a configuration generator that takes the access device type and model along with the customer’s entitlements into account. With a common vBNG data plane and a desire to have consistent services, it is imagined that the YANG model for the customer’s services would be largely common between access types. The Virtual Provisioning Interfaces Technical Report [2] produced by CableLabs has defined a YANG model that may be a good fit for this language. • Access/Customer Premise specific configuration modifiers. While the majority of the service definitions will be common, there will certainly be access-specific configurations that would be of interest. For example, a PON system may want to be able to configure optical parameters that do not apply to other access technologies. Access-specific extensions of the universal YANG model would cover this case. • Database of activated services. With millions of devices in our networks, it is often difficult to have a definitive knowledge of the exact service configuration the customer device is operating upon when a problem is discovered. The service activation layer should record the exact configuration given for each device to aid in troubleshooting and to add traceability. • Push/Pull of configuration. In the same vein as supporting both bottom up and top down provisioning, this is the mechanism for providing the YANG model configuration to the vBNG. This also enables the ability to change customer device configuration dynamically. © 2020 SCTE•ISBE and NCTA. All rights reserved. 8 Introducing the service activation layer gives us several capabilities and advantages that help us overcome the problems defined earlier in this paper. • It abstracts billing and provisioning away from the configuration of the network. • It presents a consistent service provisioning mechanism for all access networks and all services running through them. • It brings consistency to service definitions across all access technologies, making their implementation also consistent, within the vBNG • It eases the application of dynamic services to existing devices and allows for modification of existing services. 3.2. The virtual Broadband Network Gateway structure Many of the issues discussed here can be resolved with a proper vBNG implementation. There are a number of options, in terms of how the vBNG can be laid out, and which components are included. Let us start with a description of the basic components in this method. Figure 4 – vBNG structure (OLT example) Access controller. This sets up the access network itself and the services that flow through it. To accomplish this task there are several steps that are necessary. A service configuration interpreter translates the YANG model produced by the service activation layer into access-specific configurations used by the vSubscriber data construct. The access manager, displayed as an “OLT” or “ONU Manager” in the diagram, is responsible for configuring all remote access components. A service control API then sends the necessary configuration information to the data forwarder, which is where components common to all access networks are configured. © 2020 SCTE•ISBE and NCTA. All rights reserved. 9 Data forwarder. This provides frame processing and basic subscriber services. Certain functions can be enabled or disabled, such as a traffic manager, for access networks that do not have a built-in means of doing so. On a per customer basis, features like subscriber management filtering and DSCP rewrite can be enabled or disabled based on the services defined via the service activation layer. To aid in effective use of network and processor resources, the data forwarder can be implemented as a single unit or can be separated out for greater flexibility. The first logical separation is the network control, which includes the functions necessary to connect to the MSO network as well as typical services such as DHCP relay, routing protocols, and legal intercept controls. The upstream data plane is the next separation and provides data forwarding services from the customer into the network. Upstream traffic typically has a lower volume expectation. Finally, the downstream data plane provides data forwarding services from the network to the customer. In this case, all access networks would utilize the traffic manager function to shape traffic going downstream. Downstream traffic typically has a higher volume expectation. These components give us several advantages, no matter how they are laid out in a virtualized system. • The data forwarder includes common code for all access networks. This is a major facilitator of service consistency, as all customers are served by the same implementation for many of functions provided. From a development perspective this allows us to develop once but use the code many times. Adding new routing protocols, for example, only requires the single implementation to be tested. There is also no need to test the common code extensively when a new access network is developed. • The Service control API is well defined between the access controller and the data forwarder. This allows for easy and unambiguous integration with new access controllers. • New development for a new access technology is primarily limited to the access specific functionality such as the access controller, the remote access element, and interoperability with in-home equipment. 4. Advantages of an NFV and SDN approach compared to a traditional BNG The traditional BNG is the staple of many telecommunication companies’ network and has proven to be a solid solution for their access needs. So, why not use the same thing? The answer lies in flexibility. Just as with traditional CMTS deployments, a network operator must choose and size the BNG appropriately for both their current and future needs. Inevitably, when the network capacity or business needs surpass that BNG’s capabilities, the operator must upgrade or add more BNGs -- or worse, do both. Flexibility and reuse are where NFV and SDN shine. This is exemplified by allowing the system to expand functionality naturally into new access networks, while also allowing each of the components to continue to evolve -- to remain the best they can be, without requiring that the entire system be recreated. In terms of capacity, the system relies on generic processing hardware to do its job. The first advantage with this approach is the ability to directly add capacity by adding more compute power, without touching the rest of the system. Secondly, when using generic hardware, the system can be laid out in different ways to fit the most effective technology, in terms of cost and efficiency. There are several ways in which these components can be laid out in a virtualized system to optimize the available technology. © 2020 SCTE•ISBE and NCTA. All rights reserved. 10 The first decision for optimization is whether one instance of the vBNG will handle one service group or many service groups. A single service group vBNG gives you the greatest control and isolation at the expense of more wasted processing cycles, while a multiple service group vBNG gives you more efficient processor utilization at the expense of more complex control and isolation. The other area of opportunity is whether and how to separate the components of the vBNG to more efficiently assign processing resources. Separating the access controller from the data forwarder is attractive as the access controller and the data forwarder have very different functional and service assurance metrics. This separation would allow for a considerable amount of processor utilization optimization. Perhaps this would give us the ability to have the access controller live higher up in the cloud. Another way to optimize the component separation is to divide the upstream and downstream data planes. This would allow us to take advantage of inherent differences in upstream and downstream utilization. The upstream data plane has significantly less usage, even with symmetric access technologies, and can be multiplexed more effectively, while the downstream data plane has significantly more usage and needs more network and processor resources to be assigned. Details of these approaches are a subject of considerable discussion in and of themselves. Intel has published an architectural study that dives deep into the factors of these decisions [3] that may be interesting to the reader of this paper. 5. Conclusion The protocols defined in the DOCSIS specifications have led us down a path that has centered our back office and access networks around those protocols. This has been very good to us, but it is time to integrate other access technologies into our portfolios. The NFV and SDN evolution gives us an opportunity to refactor the way that we build and run our networks to support both the network of today and the multi-technology network of tomorrow. In light of this goal, this paper has described an access network abstraction which defines a clear demarcation of system functions between the BSS and OSS, service activation, and network access. This architecture should allow us to: • Deploy new technology quickly. • Provision access networks in a unified way. • Have consistent services. • Minimize testing. • Enjoy one operational model. • Evolve each component of our network without interfering with the others. We must not only produce a network that solves the problems that we can foresee, but one that allows us to continue to adapt well into the future. Abbreviations vBNG virtual broadband network gateway MSO multiple system operator NFV network function virtualization SDN software defined networking PON passive optical network © 2020 SCTE•ISBE and NCTA. All rights reserved. 11 CMTS cable modem termination system vCMTS virtual cable modem termination system DOCSIS data over cable service interface specification BSS business support system OSS operational support system DAA distributed access architecture DPoE DOCSIS provisioning of EPON vCM virtual cable modem ENET ethernet RPHY remote PHY ROLT remote optical line terminator SNMP simple network management protocol IPDR IP data records API application programming interface YANG yet another next generation OLT optical line terminator ONU optical network unit DSCP differentiated services code point rSwitch Remote Switch or field deployed switch SCTE Society of Cable Telecommunications Engineers Bibliography & References [1] SCTE paper “The Future of Operations: Building a Data-Driven Strategy” [2] Virtual Provisioning Interfaces Technical Report - CableLabs [3] https://www.intel.com/content/dam/www/public/us/en/documents/platform-briefs/broadbandnetwork-gateway-architecture-study.pdf












Related Post

×

Notice!!

All Quantic user are requested to use our hybrid cloud drive for you project and Data base . We had added new module of cronjob to schedule and optimise your backup .