ConteXtream Confidential ‹#›
About
Established in 2007 to Virtualize Carrier Networks
Deployed at Multiple Tier-1 Carrier Networks Across the Globe
InvestorsTechnology
Focused on Carrier SDN for Network Function Virtualization
5 Patents Granted, 3 Pending
Accolades
Top 10 Carrier SDN Vendors
1
ConteXtream Confidential ‹#›
Network Virtualization and Service Abstraction
LTA
LTE
ConteXtream Confidential ‹#›
WAN and LAN Use Cases
Over 50 cities
Over 50M subscribers
Over 9 years cumulative up-time
Over 1,000 TeraBytes processed per day
Over 160Gbps daily peak download traffic rate
Over 30,000,000,000 per flow analytics generated per day
39% download rate improvement due to per flow TCP-O on LTE
RAN Internet
Overlay & Mapping
TCP opt
VDO-Transcode
HTTP-Enrich
ConteXtream Confidential ‹#›
SDN-NFV Decoupled Architectures
mobility
subscribers
billing F5
F6
F7
optimization
Decouple
Virtual NetworkFunctionsSubscriber-Application-Network-Aware
New: Elastic, dynamics, utilization, fast rollout and time to market
Old: Bundled resources, Complexto extend, expensive fragmented
ConteXtream Confidential ‹#›
SDN Overlay Evolution
Pure IP model Pure SDN model
Controlled end2end FlowsProgramable connection matrix
Autonomous subnet modelPacket "AntFarm" Scales
Monolithic Not Programable Doesn't Scale Net-Diameter
ConteXtream Confidential ‹#›
SDN Overlay Evolution
Application
Subscriber
Function
Combined Overlay model LISPFlowMapping
IP Underlay DHTScales Lookup
IP Underlay Transport Scales Topology
ConteXtream Confidential ‹#›
SDN Overlay Standard Building Blocks
1. NVE - Network Virtualization Edge, In-Network or In-Host
2. SFF - Service Function Forwarder, select & tag the chain hops
3. ITR - Ingress Tunnel Router, map & encap outerlay to underlay
4. ETR - Egress Tunnel Router, decapsulate underlay to outerlay
5. RTR - Re-Tunnel Router, segment and replicate encapsulations
6. XTR - Ingress-Egress Tunnel Router, combines NVE and SFF
7. PXTR - Proxy ITR and ETR, balanced inter-networking gateways
ConteXtream Confidential ‹#›
ConteXtream Carrier SDN Overlay
Underlay
Orchestration
Net
wor
k Fu
nctio
ns
ContexSwitch
Netw
ork Functions
ContexControl (SDN Controller)
ContexView(Performance
Analytics)
ContexSwitch
ContexMap(Mapping System)
ContexMap(Mapping System)
ContexControl (SDN Controller)
Distributed Mapping System
Federated Controller
Rest API
ConteXtream Confidential ‹#›
8.2
8.1.
7.1...
7.2
Programming the Network for Services
Carrier Spine2
Carrier Spine1
Logical Chain1 Logical Chain2
Inet
.
• Mobility Management - stationary context for moving phones
• Subscriber Management - Quality/class of service queuing, AAA
• TCP Optimization - jitter buffers and window scaling utilization
• Video caching and transcoding - steer and redirect video streams
• Filters and protections - firewalls, parental control, honey pots
• Analytics - records of TCP flows, flow quality, HTTP flow tracking
• Header enrichment - profiling users, revenue share, 800 data flows
• ...
.
ConteXtream Confidential ‹#›
NVEs Separate Scaling of Resources & Locations
Logical Chain1 Logical Chain2
Inet8.2
8.1.
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1.1.1.1.1
1.1.1.2
1.1.2.1
1.1.2.2
1.1.3.1
1.1.3.2
1.1.4.1
1.1.4.2
Carrier Spine2
Carrier Spine1
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1...
7.2
NVEs Map IDs to LocationsAll NVEs are meshed
ConteXtream Confidential ‹#›
SFFs Chain Flow Instances to Resource Instances
Logical Chain1 Logical Chain2
Inet8.2
8.1.
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1.1.1.1.1
1.1.1.2
1.1.2.1
1.1.2.2
1.1.3.1
1.1.3.2
1.1.4.1
1.1.4.2
SFF
SFF
Carrier Spine1
Carrier Spine2
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1...
7.2
ConteXtream Confidential ‹#›
10x Hops-Latency, 1K Servers: 1M Syncs-Tunnels..
Logical Chain1 Logical Chain2
Inet8.2
8.1.
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1.NVE
1.1.1.2
1.1.2.1
NVE
1.1.3.1
1.1.3.2
1.1.4.1
1.1.4.2
SFF
SFF
Carrier Spine2
Carrier Spine1
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1...
7.2
ConteXtream Confidential ‹#›
Optimal ToRG : Single Hop XTR, Single Hop DHT
Logical Chain1 Logical Chain2
Inet8.2
8.1.
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1.
ETRHardware
Carrier Spine2
Carrier Spine1
7.1...
7.2
Top of Rack Grid networkSinge Hop ITR-SFF-RTRSingle Hop DHT MS/MR
<< DHT PerFlow>>
ConteXtream Confidential ‹#›
Killer Carrier Apps .. but Challenges
• Top of Rack Switch-Servers• Not quite ready yet• Low end X86 CPUs used• Not enough PCI to X86• FlowRules instruction set• But not enough rules • Not enough rules / sec• There's a need for Interim
solutions
GLB
NFVVPN
14
ConteXtream Confidential ‹#›
Interim: NVE at ToR + MapTrix + SFF NFV
Logical Chain1 Logical Chain2
Inet8.2
8.1.
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1. SFF
SFF
Carrier EPC
switch
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1...
7.2
SFF
Mapping Hash (Source IP Mask) >> Load Balanced SFF
LOCATION
IDENTITY
Mapping
Carrier Spine2
ConteXtream Confidential ‹#›
Not Optimal But Better
Logical Chain1 Logical Chain2
Inet8.2
8.1.
7.1.. 8.1.
7.2... 8.1.
7.1... 8.2.
7.2... 8.2.
7.1. 8.2.
7.2... 8.2.
7.1.. 8.1.
7.2... 8.1. SFF
SFF
Carrier EPC
switch
1.1.1.x 1.1.2.x 1.1.3.x 1.1.4.x
7.1...
7.2
SFF
Mapping
Carrier Spine2
16
ConteXtream Confidential ‹#›
SDN Overlays Using Combined Switch-Compute
• Open Standard Open Source ConteXt FlowMapping • Transport and global context using overlay mapping • OpenStack, AAA, HSS, mapped network/resource KPI • Dynamically allocate and release HW accelerated flows• Based on subscribers, applications, and net conditions
17
Thank You - Backup Slides
IP
Mapping
North Bound
NVE
NVE
NVE
NVE
FunctionsUsers < - - FlowMapping - - >
18
ConteXtream Confidential ‹#›
SDN Scale Challenge
• Assume the simplest possible topology connect SRC to DST through F(x)- Controller plots flow path based on the (presumed) topology- Controller plots flow protections for link and switch failures- Complexity exponents by scaling capacity and redundancy
DST SRCF(x)A B
D
Controller
Xtrapolate Xtrapolate
ConteXtream Confidential ‹#›
SDN Overlay Solution
IPUnderlay
EndPoint (IP or Ethernet Addresses)
EndPoint
Landmark or Function (RTR, BGP ,Firewall..
• With Freedom of movement
• Assume a network with thousands of locations, billions of addresses in millions of subnets- The Underlay DFZ IP is only aware of the few thousands Overlay nodes - Overlay nodes are aware of Outerlay users-machines in their default region - By sharing a hash or directory any Overlay can map any outerlay ID-location
CDN/VPN
EndPoint
Top Related