20
ConteXtream Confidential ‹#› About Established in 2007 to Virtualize Carrier Networks Deployed at Multiple Tier-1 Carrier Networks Across the Globe Investors Technology Focused on Carrier SDN for Network Function Virtualization 5 Patents Granted, 3 Pending Accolades Top 10 Carrier SDN Vendors 1

About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

About

Established in 2007 to Virtualize Carrier Networks

Deployed at Multiple Tier-1 Carrier Networks Across the Globe

InvestorsTechnology

Focused on Carrier SDN for Network Function Virtualization

5 Patents Granted, 3 Pending

Accolades

Top 10 Carrier SDN Vendors

1

Page 2: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

Network Virtualization and Service Abstraction

LTA

LTE

Page 3: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

WAN and LAN Use Cases

Over 50 cities

Over 50M subscribers

Over 9 years cumulative up-time

Over 1,000 TeraBytes processed per day

Over 160Gbps daily peak download traffic rate

Over 30,000,000,000 per flow analytics generated per day

39% download rate improvement due to per flow TCP-O on LTE

RAN Internet

Overlay & Mapping

TCP opt

VDO-Transcode

HTTP-Enrich

Page 4: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN-NFV Decoupled Architectures

mobility

subscribers

billing F5

F6

F7

optimization

Decouple

Virtual NetworkFunctionsSubscriber-Application-Network-Aware

New: Elastic, dynamics, utilization, fast rollout and time to market

Old: Bundled resources, Complexto extend, expensive fragmented

Page 5: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Overlay Evolution

Pure IP model Pure SDN model

Controlled end2end FlowsProgramable connection matrix

Autonomous subnet modelPacket "AntFarm" Scales

Monolithic Not Programable Doesn't Scale Net-Diameter

Page 6: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Overlay Evolution

Application

Subscriber

Function

Combined Overlay model LISPFlowMapping

IP Underlay DHTScales Lookup

IP Underlay Transport Scales Topology

Page 7: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Overlay Standard Building Blocks

1. NVE - Network Virtualization Edge, In-Network or In-Host

2. SFF - Service Function Forwarder, select & tag the chain hops

3. ITR - Ingress Tunnel Router, map & encap outerlay to underlay

4. ETR - Egress Tunnel Router, decapsulate underlay to outerlay

5. RTR - Re-Tunnel Router, segment and replicate encapsulations

6. XTR - Ingress-Egress Tunnel Router, combines NVE and SFF

7. PXTR - Proxy ITR and ETR, balanced inter-networking gateways

Page 8: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

ConteXtream Carrier SDN Overlay

Underlay

Orchestration

Net

wor

k Fu

nctio

ns

ContexSwitch

Netw

ork Functions

ContexControl (SDN Controller)

ContexView(Performance

Analytics)

ContexSwitch

ContexMap(Mapping System)

ContexMap(Mapping System)

ContexControl (SDN Controller)

Distributed Mapping System

Federated Controller

Rest API

Presenter
Presentation Notes
* Software Defined Overlay Network, Connects resources over IP LAN or WAN backbones.�• Uses IP underlay for both transport and mapping, north orchestration API, horizontal ID-IP.�• OpenFlows to (and from) Access and Internet are chained through core carrier functions.�• Typical carrier functions: subscriber mobility, caching, optimizations, and monetization.�• Functions are applied locally or globally, functions pooled hence not fragmented by locations.�• Flows are steered per context, subscriber-function-application context is kept in mapping.�• Flows cross locations over a mesh of overlay tunnels. Federated Overlay is Underlay aware.�• This means multi-path underlay drop-less paths are measured for delay and queue buildup.�• Stateless underlay traffic engineering is driven by the SDN overlay based on app-rloc mapping. • Overlay traffic is steered through underlay landmark segments using IPvN re-tunneling headers.
Page 9: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

8.2

8.1.

7.1...

7.2

Programming the Network for Services

Carrier Spine2

Carrier Spine1

Logical Chain1 Logical Chain2

Inet

.

• Mobility Management - stationary context for moving phones

• Subscriber Management - Quality/class of service queuing, AAA

• TCP Optimization - jitter buffers and window scaling utilization

• Video caching and transcoding - steer and redirect video streams

• Filters and protections - firewalls, parental control, honey pots

• Analytics - records of TCP flows, flow quality, HTTP flow tracking

• Header enrichment - profiling users, revenue share, 800 data flows

• ...

.

Page 10: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

NVEs Separate Scaling of Resources & Locations

Logical Chain1 Logical Chain2

Inet8.2

8.1.

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1.1.1.1.1

1.1.1.2

1.1.2.1

1.1.2.2

1.1.3.1

1.1.3.2

1.1.4.1

1.1.4.2

Carrier Spine2

Carrier Spine1

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1...

7.2

NVEs Map IDs to LocationsAll NVEs are meshed

Page 11: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SFFs Chain Flow Instances to Resource Instances

Logical Chain1 Logical Chain2

Inet8.2

8.1.

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1.1.1.1.1

1.1.1.2

1.1.2.1

1.1.2.2

1.1.3.1

1.1.3.2

1.1.4.1

1.1.4.2

SFF

SFF

Carrier Spine1

Carrier Spine2

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1...

7.2

Page 12: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

10x Hops-Latency, 1K Servers: 1M Syncs-Tunnels..

Logical Chain1 Logical Chain2

Inet8.2

8.1.

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1.NVE

1.1.1.2

1.1.2.1

NVE

1.1.3.1

1.1.3.2

1.1.4.1

1.1.4.2

SFF

SFF

Carrier Spine2

Carrier Spine1

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1...

7.2

Page 13: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

Optimal ToRG : Single Hop XTR, Single Hop DHT

Logical Chain1 Logical Chain2

Inet8.2

8.1.

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1.

ETRHardware

Carrier Spine2

Carrier Spine1

7.1...

7.2

Top of Rack Grid networkSinge Hop ITR-SFF-RTRSingle Hop DHT MS/MR

<< DHT PerFlow>>

Page 14: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

Killer Carrier Apps .. but Challenges

• Top of Rack Switch-Servers• Not quite ready yet• Low end X86 CPUs used• Not enough PCI to X86• FlowRules instruction set• But not enough rules • Not enough rules / sec• There's a need for Interim

solutions

GLB

NFVVPN

14

Page 15: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

Interim: NVE at ToR + MapTrix + SFF NFV

Logical Chain1 Logical Chain2

Inet8.2

8.1.

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1. SFF

SFF

Carrier EPC

switch

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1...

7.2

SFF

Mapping Hash (Source IP Mask) >> Load Balanced SFF

LOCATION

IDENTITY

Mapping

Carrier Spine2

Page 16: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

Not Optimal But Better

Logical Chain1 Logical Chain2

Inet8.2

8.1.

7.1.. 8.1.

7.2... 8.1.

7.1... 8.2.

7.2... 8.2.

7.1. 8.2.

7.2... 8.2.

7.1.. 8.1.

7.2... 8.1. SFF

SFF

Carrier EPC

switch

1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x

7.1...

7.2

SFF

Mapping

Carrier Spine2

16

Page 17: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Overlays Using Combined Switch-Compute

• Open Standard Open Source ConteXt FlowMapping • Transport and global context using overlay mapping • OpenStack, AAA, HSS, mapped network/resource KPI • Dynamically allocate and release HW accelerated flows• Based on subscribers, applications, and net conditions

17

Page 18: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

Thank You - Backup Slides

IP

Mapping

North Bound

NVE

NVE

NVE

NVE

FunctionsUsers < - - FlowMapping - - >

18

Page 19: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Scale Challenge

• Assume the simplest possible topology connect SRC to DST through F(x)- Controller plots flow path based on the (presumed) topology- Controller plots flow protections for link and switch failures- Complexity exponents by scaling capacity and redundancy

DST SRCF(x)A B

D

Controller

Xtrapolate Xtrapolate

Page 20: About Technology Accolades Investors · 2015. 6. 4. · Virtual Network. Subscriber-Application-Network-Aware. Functions. New: Elastic, dynamics, utilization, fast rollout and time

ConteXtream Confidential ‹#›

SDN Overlay Solution

IPUnderlay

EndPoint (IP or Ethernet Addresses)

EndPoint

Landmark or Function (RTR, BGP ,Firewall..

• With Freedom of movement

• Assume a network with thousands of locations, billions of addresses in millions of subnets- The Underlay DFZ IP is only aware of the few thousands Overlay nodes - Overlay nodes are aware of Outerlay users-machines in their default region - By sharing a hash or directory any Overlay can map any outerlay ID-location

CDN/VPN

EndPoint