Re: Greenfield Access Network

2014-08-01 Thread Robert Drake


On 7/31/2014 12:07 PM, Colton Conor wrote:

1. The article mentioned DHCP doesn't do the other part of what PPPoE or
PPPoA does, which is generate RADIUS accounting records that give us the
bandwidth information. So that’s one of the main challenges in switching to
a DHCP based system. So, how do you handle bandwidth tracking in an all
DHCP environment then? If I want to track how many GB a customer used last
month, or the average Mbps used how do you do so?
A medium sized NMS could do 95th percentile usage on 10k ports. Normally 
I wouldn't want to use an NMS for billing usage but the capability is there.

2. I liked your option 82 example, and that works well for DSL networks
where one port is tied to one customer. But how does option 82 work when
you have multiple customers hanging off a GPON port? What does GPON use a
subport identifier?
The ONT can put an option-82 header on the packet and tag whichever port 
the DHCP request came from.



3. You mentioned, DHCP is again, not a authentication protocol. So what
handles authentication then if only DHCP is used, and there are no
usernames and passwords? I guess for DSL networks you can enable or disable
the port to allow or disallow access, and Option 82 for identification? I
assume you wouldn't want to shut off the GPON OLT port if one customer
wasn't paying their bill as it would affect the other customers on that
port. I assume access vendors allow you to shut down the sub port or ONT in
this situation for GPON? Still that seems messy having to login to a shelf
or EMS system or API to an EMS system especially if you have multiple
access vendors in a network. Is there a way to do authentication with DHCP?
What about open networks like wifi where anyone can connect, so you don't
have the ability to turn of the port or disable the end device?
Most GPON vendors either support TR-69 or some other means to remote 
provision the ONTs.  You can use the DHCP option-82 to identify who a 
customer is and then send their ONT a specific config.  Like DOCSIS you 
could make a disable profile, or you could make them hop on a different 
VLAN that redirects all traffic to a billing page or something.  There 
is also DPoE/DPoG (DOCSIS Provisioning of EPON/GPON) that converts 
DOCSIS provisioning into something PON can use.



4. I don't think anyone is buying a BRAS anymore, but looks like Cisco,
Juniper, and ALU have what they call BGN, Broadband Subscriber Management,
and other similar software. How are these different from BRAS functionality?
I've got no experience with BRAS so I'm not sure.  I think the ASR1k can 
do pppoe termination if you want a Cisco solution.

So it looks like there are open source and commercial solutions for DHCP
and DNS. Some providers like Infloblox seems to integrate all these into
one.


Infoblox, Bluecat, 6connect, Incognito, Promptlink, VitalQIP, Cisco BAC

There are a bunch of vendors and they all have their ups and downs. A 
DHCP system can be an expensive part of your network and it's a very 
critical one, so you might want to look at multiple offerings before 
deciding.



So if we have a core router that speaks BGP, a 10G aggregation switch to
aggregate the the chassis, and a device like Infloblox or the other
commercial solutions you mentioned that do DHCP/DNS, is there anything else
that is needed besides the access gear already mentioned in the
assumptions?  Are these large and expensive commercial BGN/Broadband
Subscriber management products a thing of the past or still very relevant
in todays environment?


Make sure you've got your provisioning system planned out and working 
before you run with it.  Your DHCP systems will tie heavily into your 
OSS so you'll need to work that piece out.  If you use an NMS for 
billing reasons then that will need to tie into the OSS as well.  It's 
always possible to roll out a network that just works, turn up a bunch 
of devices and then realize a critical piece is broken or badly 
designed.  You don't want to be in a position where everything works 
except and you can't take it down because everyone is using it.





Re: Greenfield Access Network

2014-07-31 Thread Scott Helms
What is the ideal way to aggregate the 40 10G connections from the uplinks
of the chassis? I would guess a 10G switch since 10G ports on a router
would be much more expensive?

Definitely aggregate into a switch first unless you want to run a Layer 3
switch as your router, which I don't recommend.


Which router is recommended to handle 4 10G internet connections with full
tables, and then at least 4 10G ports going back to the 10G aggregation
switch?

Your math is a little backwards, its very unlikely that you're going to
have 40 Gbps of Internet (or other interconnection) for the router to
actually have to process.  What is the average provisioned speed for each
of the 10k PON ports?  What over subscription rate are you planning for?
 What, if anything, will you be carrying on net, ie bandwidth consumption
that won't come from or go to the public Internet?  Your own video, voice,
or other service are examples of things that are often on net.  In any case
you're probably in the ASR family with Cisco and I can't remember
the equivalent from Juniper.


How do you handle IP address management? a /20 is only 4096 IP addresses,
but the network would have potentially 10,000 customers. Assume that
getting more space from ARIN is not an option. Is CGN an option?

CGN is the option of last resort IMO, but you may have to consider it.  A
better approach is to see if your backbone providers will agree to give
some blocks that you can announce and use those blocks for dynamic
customers only.  Your static IP customers should come from your direct ARIN
allotment in case you need to choose a new backbone provider, which is
extremely common over time.


Dynamic IP
addresses? DHCP?

DHCP with enforcement from the shelves.  All the major OLT vendors support
doing this so that a customer can only use the address assigned to him by
DHCP and nothing else, except for those customers that you choose to hard
code.  Make most of your static customers actually DHCP reservations and
only hard code those that you must.

How do you separate users and traffic? VLANs, Service VLANs, Per Customer
VLANs, Usernames? Passwords? PPPoE? MAC Separation?
Is a BRAS or BGN functionally really needed or are these older concepts?

DHCP, with Option 82 logging for the circuit ID is the better path than a
BRAS (PPPoE) these days.  Here's a paper we put together on that topic a
while back:

http://www.zcorum.com/wp-content/uploads/Why-Should-I-Move-from-PPPoA-or-PPPoE-to-DHCP.pdf

Depending on your OLT vendor you can either use their built in port
isolation or QinQ tagging, both are reliable and scalable, just ask your
vendor which is the best option for your specific gear.



If CGNAT or DHCP is needed, what will host the CGNAT or DHCP service? The
core router, a linux box, or something else?

I wouldn't have those two services connected personally, though there are
hooks for some of the CGN boxes to talk to DHCP servers.  I would hope you
can get another 6k addresses and avoid the need for CGN altogether.  Having
said that, have you tested your OLTs and ONTs for IPv6 interoperability?
 If they don't handle it well then you're going to have to think about
alternatives like 6RD (http://en.wikipedia.org/wiki/IPv6_rapid_deployment)

For DHCP at your scale you can run ISC DHCP (
http://www.isc.org/downloads/dhcp/) which is the most common open source
DHCP daemon if you someone who can take care of a Linux server, parse the
Option 82 information for logging, and handle the configuration of the DHCP
daemon itself.  Otherwise you might want to look at commercial products
designed for the service provider market like Incongito's BCC and Cisco's
BAC (CNR replacement)

http://www.incognito.com/products/broadband-command-center/
http://www.cisco.com/c/en/us/products/cloud-systems-management/broadband-access-center/index.html


What about DNS?
Is a firewall needed in the core?
What else is needed?

There are two kinds of DNS, caching (recursive) and authoritative.  The
first is what your customers will use to resolve things on the Internet and
the second is used to provide caching name servers on the Internet with
information about domains you control (are authoritative for).  The first
needs good performance, availability, and scalability since your customers
will use your caching name servers constantly.  Most people can run BIND at
your scale, again if you have someone with Linux experience, but there are
other alternatives.  PowerDNS has both caching and authoritative modules
and there are some commercial offerings out there both as cloud hosting and
local deployments.  Your backbone provider will also often have caching
name servers your customers can use, but the quality varies quite a bit.
 You can also, especially at first, leverage some of the free offerings
like Google's DNS.  I don't recommend firewalls for service provider
networks, but you should make sure your gear can run (and is configured to
do so) BCP 38.


Scott Helms
Vice President of 

Re: Greenfield Access Network

2014-07-31 Thread Colton Conor
Scott,

Thanks for the long post.

We will use a layer 2 10G aggregation switch then to aggregate the chassis
at the core location. Do you have any recommendations on 10G switches?

Yes I realize the math is a little backwards as this is all hypothetical at
this point. We would provision each ONT as a shared 1Gbps offering similar
to Google Fiber. We know there will be a large amount of oversubscription
as no one really uses a full Gbps or anywhere close to it. I just wanted to
stress the point that carrier redundancy at the 10G level would be a
requirement for the core router, and it should of course have 10G links
going to the uplinks on the aggregation switch. I think the Cisco ASR9k and
the Juniper MX line will do well. Not sure if there are any others that can
handle this level of traffic on the BGP side?

So we have a 10G aggregation switch to aggregate the chassis uplink
connections, and a 10G router BGP capable router.

I really liked your article on DHCP vs PPP for DSL networks. We definitely
agree the way to go is with a DHCP server. A couple of items your article
left as big questions:
1. The article mentioned DHCP doesn't do the other part of what PPPoE or
PPPoA does, which is generate RADIUS accounting records that give us the
bandwidth information. So that’s one of the main challenges in switching to
a DHCP based system. So, how do you handle bandwidth tracking in an all
DHCP environment then? If I want to track how many GB a customer used last
month, or the average Mbps used how do you do so?
2. I liked your option 82 example, and that works well for DSL networks
where one port is tied to one customer. But how does option 82 work when
you have multiple customers hanging off a GPON port? What does GPON use a
subport identifier?
3. You mentioned, DHCP is again, not a authentication protocol. So what
handles authentication then if only DHCP is used, and there are no
usernames and passwords? I guess for DSL networks you can enable or disable
the port to allow or disallow access, and Option 82 for identification? I
assume you wouldn't want to shut off the GPON OLT port if one customer
wasn't paying their bill as it would affect the other customers on that
port. I assume access vendors allow you to shut down the sub port or ONT in
this situation for GPON? Still that seems messy having to login to a shelf
or EMS system or API to an EMS system especially if you have multiple
access vendors in a network. Is there a way to do authentication with DHCP?
What about open networks like wifi where anyone can connect, so you don't
have the ability to turn of the port or disable the end device?
4. I don't think anyone is buying a BRAS anymore, but looks like Cisco,
Juniper, and ALU have what they call BGN, Broadband Subscriber Management,
and other similar software. How are these different from BRAS functionality?

So it looks like there are open source and commercial solutions for DHCP
and DNS. Some providers like Infloblox seems to integrate all these into
one.

So if we have a core router that speaks BGP, a 10G aggregation switch to
aggregate the the chassis, and a device like Infloblox or the other
commercial solutions you mentioned that do DHCP/DNS, is there anything else
that is needed besides the access gear already mentioned in the
assumptions?  Are these large and expensive commercial BGN/Broadband
Subscriber management products a thing of the past or still very relevant
in todays environment?









On Thu, Jul 31, 2014 at 8:54 AM, Scott Helms khe...@zcorum.com wrote:

 What is the ideal way to aggregate the 40 10G connections from the uplinks
 of the chassis? I would guess a 10G switch since 10G ports on a router
 would be much more expensive?

 Definitely aggregate into a switch first unless you want to run a Layer 3
 switch as your router, which I don't recommend.


 Which router is recommended to handle 4 10G internet connections with full
 tables, and then at least 4 10G ports going back to the 10G aggregation
 switch?

 Your math is a little backwards, its very unlikely that you're going to
 have 40 Gbps of Internet (or other interconnection) for the router to
 actually have to process.  What is the average provisioned speed for each
 of the 10k PON ports?  What over subscription rate are you planning for?
  What, if anything, will you be carrying on net, ie bandwidth consumption
 that won't come from or go to the public Internet?  Your own video, voice,
 or other service are examples of things that are often on net.  In any case
 you're probably in the ASR family with Cisco and I can't remember
 the equivalent from Juniper.


 How do you handle IP address management? a /20 is only 4096 IP addresses,
 but the network would have potentially 10,000 customers. Assume that
 getting more space from ARIN is not an option. Is CGN an option?

 CGN is the option of last resort IMO, but you may have to consider it.  A
 better approach is to see if your backbone providers will agree to give
 some 

Re: Greenfield Access Network

2014-07-31 Thread Roland Dobbins

On Jul 31, 2014, at 8:23 PM, Colton Conor colton.co...@gmail.com wrote:

 Is a firewall needed in the core?

No, quite the opposite:

https://app.box.com/s/a3oqqlgwe15j8svojvzl

 How would you build a access network from the ground up if you had the 
 resources and time to do so?

I'd hire folks who have experience from both and architectural and operational 
perspectives, and who have the necessary local knowledge.  Most of the question 
you're asking (except the one about iatrogenic stateful firewalls) are 
situationally-specific, and aren't really going to be answerable in detail via 
a mailing-list, no matter the depth and breadth of expertise of many of those 
participating in said email list.

For example, you've asked nothing specifically about recursive or authoritative 
DNS infrastructure, although they're both key (you did mention DNS generically, 
which is good, but that's overly broad).  Nothing about availability and 
resiliency and telemetry visibility and network hardening.  Nothing about 
access policies, mitigation systems, quarantine systems, etc.  Nothing about 
upstream transit requirements, nothing about peering goals and imperatives.  
Nothing about redundancy at any level/in any area/for any function.  And so 
forth.

I'm not criticizing you; I'm just trying to make the point that instead of 
concentrating on vendors and technologies and hardware and software, it's 
better to concentrate on *people* who have the requisite experience and 
expertise, and go from there.  There are lots of specializations and 
subspecializations, and it's important to have folks who have broad experience 
spanning multiple areas, as well as others who know *everything* in a given 
area.

While you can get some categorical advice, you can't really crowdsource the 
architecture, design, deployment, and operations of your network.

;

--
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

   Equo ne credite, Teucri.

  -- Laocoön



Re: Greenfield Access Network

2014-07-31 Thread Colton Conor
Roland,

I agree with everything you mentioned in your email. No matter how much
money and resources you have, if you don't have the talent and people
required to get the job done the project will fail. There a many outfits,
like Scotts for example, that will handle most all of these issues for an
operator that doesn't have the skills, talent, or personnel to deploy such
a network on their own.

I tried to keep the topics as broad as possible. No, I didn't go into
detail about recursive or authoritative as I figured the general term DNS
would cover both for the readers of this forum. The same with availability
and resiliency and telemetry visibility and network hardening and the other
detailed terms you have mentioned as I am making the assumption that this
networking gear being talk about (carrier grade routers) would have most of
these capabilities and people that would implement them (certified network
engineers) would handle these issues.

With that being said, we are not trying to crowdsource the architecture,
design, deployment, and operations of our network. We are just seeking
categorical
advice as mentioned. If you ask this question to many of the network
vendors that make these products they will try to oversell you on items you
don't need. Just trying to cut through some of the marketing BS that the
vendors produce, and see what people in the real world are actually
deploying.




On Thu, Jul 31, 2014 at 11:24 AM, Roland Dobbins rdobb...@arbor.net wrote:


 On Jul 31, 2014, at 8:23 PM, Colton Conor colton.co...@gmail.com wrote:

  Is a firewall needed in the core?

 No, quite the opposite:

 https://app.box.com/s/a3oqqlgwe15j8svojvzl

  How would you build a access network from the ground up if you had the
 resources and time to do so?

 I'd hire folks who have experience from both and architectural and
 operational perspectives, and who have the necessary local knowledge.  Most
 of the question you're asking (except the one about iatrogenic stateful
 firewalls) are situationally-specific, and aren't really going to be
 answerable in detail via a mailing-list, no matter the depth and breadth of
 expertise of many of those participating in said email list.

 For example, you've asked nothing specifically about recursive or
 authoritative DNS infrastructure, although they're both key (you did
 mention DNS generically, which is good, but that's overly broad).  Nothing
 about availability and resiliency and telemetry visibility and network
 hardening.  Nothing about access policies, mitigation systems, quarantine
 systems, etc.  Nothing about upstream transit requirements, nothing about
 peering goals and imperatives.  Nothing about redundancy at any level/in
 any area/for any function.  And so forth.

 I'm not criticizing you; I'm just trying to make the point that instead of
 concentrating on vendors and technologies and hardware and software, it's
 better to concentrate on *people* who have the requisite experience and
 expertise, and go from there.  There are lots of specializations and
 subspecializations, and it's important to have folks who have broad
 experience spanning multiple areas, as well as others who know *everything*
 in a given area.

 While you can get some categorical advice, you can't really crowdsource
 the architecture, design, deployment, and operations of your network.

 ;

 --
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

Equo ne credite, Teucri.

   -- Laocoön




Re: Greenfield Access Network

2014-07-31 Thread William Herrin
On Thu, Jul 31, 2014 at 9:23 AM, Colton Conor colton.co...@gmail.com wrote:
 If a new operator or city is building a greenfield access network from the
 ground up,

Hi Colton,

We just had a long discussion in this forum to the effect that if a
city builds a greenfield access network, it would be best limited to
layer 1 services. That is, deliver dark fiber and invite as many
service providers as possible to light it with whatever services
they're inclined to sell. Commercially, the L1 infrastructure presents
the barrier to entry. That's why you don't have enough competitive
commercial entities mooting the need to even discuss providing
Internet as a municipal service. Even the smallest city is attractive
to competitive commercial service providers when they can lease
in-place L1 infrastructure ad hoc.

This isn't as sexy as delivering gigabit Internet in the way roads
aren't as sexy as the cars which drive on them but it relieves the
city of having to make most of the hard-to-get-right decisions that
could tank your effort and turn it into a boondoggle. Let commercial
entities worry about what car will be popular next year and let
commercial entities figure out which stores folks will drive those
cars to. Just worry about where to build roads.




On Thu, Jul 31, 2014 at 12:24 PM, Roland Dobbins rdobb...@arbor.net wrote:
 I'm not criticizing you; I'm just trying to make the point that instead
 of concentrating on vendors and technologies and hardware and
 software, it's better to concentrate on *people* who have the
 requisite experience and expertise, and go from there.

This. So much this.

Regards,
Bill Herrin

-- 
William Herrin  her...@dirtside.com  b...@herrin.us
Owner, Dirtside Systems . Web: http://www.dirtside.com/
Can I solve your unusual networking challenges?


Re: Greenfield Access Network

2014-07-31 Thread Scott Helms
On Thu, Jul 31, 2014 at 12:07 PM, Colton Conor colton.co...@gmail.com
wrote:

 Scott,

 Thanks for the long post.

 We will use a layer 2 10G aggregation switch then to aggregate the chassis
 at the core location. Do you have any recommendations on 10G switches?


Not really, just stick with one of the major brands and you _should_ be
fine.



 Yes I realize the math is a little backwards as this is all hypothetical
 at this point. We would provision each ONT as a shared 1Gbps offering
 similar to Google Fiber. We know there will be a large amount of
 oversubscription as no one really uses a full Gbps or anywhere close to it.
 I just wanted to stress the point that carrier redundancy at the 10G level
 would be a requirement for the core router, and it should of course have
 10G links going to the uplinks on the aggregation switch. I think the Cisco
 ASR9k and the Juniper MX line will do well. Not sure if there are any
 others that can handle this level of traffic on the BGP side?


That's reasonable IMO and yes, I think the Juniper MX can handle that as
well as some other functions for you related to subscriber management if
you want.  The MX line has a full BRAS set of capabilities built into it
that it inherited from the older ERX line, but they're commonly deployed
without using any of them of as well.



 So we have a 10G aggregation switch to aggregate the chassis uplink
 connections, and a 10G router BGP capable router.

 I really liked your article on DHCP vs PPP for DSL networks. We definitely
 agree the way to go is with a DHCP server. A couple of items your article
 left as big questions:



 1. The article mentioned DHCP doesn't do the other part of what PPPoE or
 PPPoA does, which is generate RADIUS accounting records that give us the
 bandwidth information. So that’s one of the main challenges in switching to
 a DHCP based system. So, how do you handle bandwidth tracking in an all
 DHCP environment then? If I want to track how many GB a customer used last
 month, or the average Mbps used how do you do so?


There are a few ways to get at that problem.  You can use Netflow/IPFIX
collection to gather the usage from your router, accepting that you're only
going to get information on layer 3 traffic, which generally isn't a
problem.  You will need to match the IPs up against your Option 82 parsing
which will give you the circuit ID, IP address, and WAN MAC of the ONT.
 You can also poll your shelves via SNMP, CLI, TL-1, and/or Netconf to
collect the data and put it into a database in much the same way you can
use RADIUS accounting data.



 2. I liked your option 82 example, and that works well for DSL networks
 where one port is tied to one customer. But how does option 82 work when
 you have multiple customers hanging off a GPON port? What does GPON use a
 subport identifier?


Yep, the different vendors implement it slightly differently, usually the
ONT MAC/serial will be included or the ONT ID will be included.  Talk with
your vendor, all the major OLT vendors are very familiar with Option 82 and
in many cases they can tailor what their boxes send to make it easier for
you.



 3. You mentioned, DHCP is again, not a authentication protocol. So what
 handles authentication then if only DHCP is used, and there are no
 usernames and passwords? I guess for DSL networks you can enable or disable
 the port to allow or disallow access, and Option 82 for identification? I
 assume you wouldn't want to shut off the GPON OLT port if one customer
 wasn't paying their bill as it would affect the other customers on that
 port. I assume access vendors allow you to shut down the sub port or ONT in
 this situation for GPON? Still that seems messy having to login to a shelf
 or EMS system or API to an EMS system especially if you have multiple
 access vendors in a network. Is there a way to do authentication with DHCP?
 What about open networks like wifi where anyone can connect, so you don't
 have the ability to turn of the port or disable the end device?
 4. I don't think anyone is buying a BRAS anymore, but looks like Cisco,
 Juniper, and ALU have what they call BGN, Broadband Subscriber Management,
 and other similar software. How are these different from BRAS functionality?


First, if you can manage it turn on DOCSIS provisioning of your GPON
network.  AFAIK only Calix has announced this functionality, but I expect
the others to follow suit now that there is an official effort at CableLabs
to allow that.

http://www.lightreading.com/cable-video/docsis/calix-launches-docsis-provisioning-of-gpon/d/d-id/709859

The notion of managing ports and profiles via (an ever changing) shelf API
is one of the main reasons that telco billing systems cost so much compared
to cable billing systems.  If you can't swing DPoG then you're kind of
stuck, either you can implement the API your vendor supplies with your
billing system, manage the profile assignment manually (yuck), or just
provision everyone with the same speed 

Re: Greenfield Access Network

2014-07-31 Thread Colton Conor
I have read both the Juniper MX and Cisco ASR9K do support this advanced
BRAS functionality, what Juniper calls Subscriber Feature Management and
what Cisco calls BGN. These software functions run on the router itself,
however the are not free or included with the base chassis. To enable these
you must pay a hefty fee. So you are saying that these advanced feature
packs that the largest networking markers in the world sell are really not
needed anymore due to advancements on the access vendor side of the house?
From the reading I have done about these solutions, it is kind of like
PPPoE with a radius setup, but instead DHCP option 82 with a radius setup.
These routers are also capable of running a local DHCP server, but I am not
sure if that is recommended.

The DPoE DOCSIS provisioning of your GPON network is interesting, but is
that really relevant for a new provider if they don't have cable CMTS
systems already deployed. Sure, it makes sense for the cable compaines who
have already bought billing systems and are used to living in
a DOCSIS world. But if you were starting fresh from the group up are you
recommending we look at GPON providers like Calix because they support DPoE
so we can buy DOCIS billing systems? That is an interesting concept.




On Thu, Jul 31, 2014 at 12:59 PM, Scott Helms khe...@zcorum.com wrote:


 On Thu, Jul 31, 2014 at 12:07 PM, Colton Conor colton.co...@gmail.com
 wrote:

 Scott,

 Thanks for the long post.

 We will use a layer 2 10G aggregation switch then to aggregate the
 chassis at the core location. Do you have any recommendations on 10G
 switches?


 Not really, just stick with one of the major brands and you _should_ be
 fine.



 Yes I realize the math is a little backwards as this is all hypothetical
 at this point. We would provision each ONT as a shared 1Gbps offering
 similar to Google Fiber. We know there will be a large amount of
 oversubscription as no one really uses a full Gbps or anywhere close to it.
 I just wanted to stress the point that carrier redundancy at the 10G level
 would be a requirement for the core router, and it should of course have
 10G links going to the uplinks on the aggregation switch. I think the Cisco
 ASR9k and the Juniper MX line will do well. Not sure if there are any
 others that can handle this level of traffic on the BGP side?


 That's reasonable IMO and yes, I think the Juniper MX can handle that as
 well as some other functions for you related to subscriber management if
 you want.  The MX line has a full BRAS set of capabilities built into it
 that it inherited from the older ERX line, but they're commonly deployed
 without using any of them of as well.



 So we have a 10G aggregation switch to aggregate the chassis uplink
 connections, and a 10G router BGP capable router.

 I really liked your article on DHCP vs PPP for DSL networks. We
 definitely agree the way to go is with a DHCP server. A couple of items
 your article left as big questions:



 1. The article mentioned DHCP doesn't do the other part of what PPPoE or
 PPPoA does, which is generate RADIUS accounting records that give us the
 bandwidth information. So that’s one of the main challenges in switching to
 a DHCP based system. So, how do you handle bandwidth tracking in an all
 DHCP environment then? If I want to track how many GB a customer used last
 month, or the average Mbps used how do you do so?


 There are a few ways to get at that problem.  You can use Netflow/IPFIX
 collection to gather the usage from your router, accepting that you're only
 going to get information on layer 3 traffic, which generally isn't a
 problem.  You will need to match the IPs up against your Option 82 parsing
 which will give you the circuit ID, IP address, and WAN MAC of the ONT.
  You can also poll your shelves via SNMP, CLI, TL-1, and/or Netconf to
 collect the data and put it into a database in much the same way you can
 use RADIUS accounting data.



 2. I liked your option 82 example, and that works well for DSL networks
 where one port is tied to one customer. But how does option 82 work when
 you have multiple customers hanging off a GPON port? What does GPON use a
 subport identifier?


 Yep, the different vendors implement it slightly differently, usually the
 ONT MAC/serial will be included or the ONT ID will be included.  Talk with
 your vendor, all the major OLT vendors are very familiar with Option 82 and
 in many cases they can tailor what their boxes send to make it easier for
 you.



 3. You mentioned, DHCP is again, not a authentication protocol. So what
 handles authentication then if only DHCP is used, and there are no
 usernames and passwords? I guess for DSL networks you can enable or disable
 the port to allow or disallow access, and Option 82 for identification? I
 assume you wouldn't want to shut off the GPON OLT port if one customer
 wasn't paying their bill as it would affect the other customers on that
 port. I assume access vendors allow you to 

Re: Greenfield Access Network

2014-07-31 Thread Scott Helms
On Thu, Jul 31, 2014 at 2:25 PM, Colton Conor colton.co...@gmail.com
wrote:

 I have read both the Juniper MX and Cisco ASR9K do support this advanced
 BRAS functionality, what Juniper calls Subscriber Feature Management and
 what Cisco calls BGN. These software functions run on the router itself,
 however the are not free or included with the base chassis. To enable these
 you must pay a hefty fee. So you are saying that these advanced feature
 packs that the largest networking markers in the world sell are really not
 needed anymore due to advancements on the access vendor side of the house?
 From the reading I have done about these solutions, it is kind of like
 PPPoE with a radius setup, but instead DHCP option 82 with a radius setup.
 These routers are also capable of running a local DHCP server, but I am not
 sure if that is recommended.


Yeah, that's it in a nutshell.  There are several options, like matching on
Option 82 or redirecting to a web page, but at the end of the day I don't
believe they're worth the time or expense.  Keep in mind that earlier in my
career I was a huge proponent of BRAS architecture and I've put in
everything from Nortel Shasta's to Lucent Terminators, to Redbacks, to
Juniper ERXs and several more models I can't remember.  Once you get past
the whole lack of authentication, which was never very secure, and
understand that you can depend on Option 82 to tell you where a session
came from physically the rest is just finding away to count and account for
bits.

Oh, and I never recommend running the DHCP daemon on a piece of networking
gear for service providers.



 The DPoE DOCSIS provisioning of your GPON network is interesting, but is
 that really relevant for a new provider if they don't have cable CMTS
 systems already deployed. Sure, it makes sense for the cable compaines who
 have already bought billing systems and are used to living in
 a DOCSIS world. But if you were starting fresh from the group up are you
 recommending we look at GPON providers like Calix because they support DPoE
 so we can buy DOCIS billing systems? That is an interesting concept.


I'd strongly recommend finding a vendor that says they will support it on
the shelves you're going to buy even if they don't today.  Even if you're
not doing DOCSIS cable modems and don't ever plan to the provisioning
paradigm (DHCP, TFTP, ToD) is much simpler than the proprietary north bound
(usually SOAP) API that direct integration requires.  You can even build
your own provisioning system with a little scripting and there are many
more commercial options than there are for direct integration to the
shelves.







 On Thu, Jul 31, 2014 at 12:59 PM, Scott Helms khe...@zcorum.com wrote:


 On Thu, Jul 31, 2014 at 12:07 PM, Colton Conor colton.co...@gmail.com
 wrote:

 Scott,

 Thanks for the long post.

 We will use a layer 2 10G aggregation switch then to aggregate the
 chassis at the core location. Do you have any recommendations on 10G
 switches?


 Not really, just stick with one of the major brands and you _should_ be
 fine.



 Yes I realize the math is a little backwards as this is all hypothetical
 at this point. We would provision each ONT as a shared 1Gbps offering
 similar to Google Fiber. We know there will be a large amount of
 oversubscription as no one really uses a full Gbps or anywhere close to it.
 I just wanted to stress the point that carrier redundancy at the 10G level
 would be a requirement for the core router, and it should of course have
 10G links going to the uplinks on the aggregation switch. I think the Cisco
 ASR9k and the Juniper MX line will do well. Not sure if there are any
 others that can handle this level of traffic on the BGP side?


 That's reasonable IMO and yes, I think the Juniper MX can handle that as
 well as some other functions for you related to subscriber management if
 you want.  The MX line has a full BRAS set of capabilities built into it
 that it inherited from the older ERX line, but they're commonly deployed
 without using any of them of as well.



 So we have a 10G aggregation switch to aggregate the chassis uplink
 connections, and a 10G router BGP capable router.

 I really liked your article on DHCP vs PPP for DSL networks. We
 definitely agree the way to go is with a DHCP server. A couple of items
 your article left as big questions:



 1. The article mentioned DHCP doesn't do the other part of what PPPoE or
 PPPoA does, which is generate RADIUS accounting records that give us the
 bandwidth information. So that’s one of the main challenges in switching to
 a DHCP based system. So, how do you handle bandwidth tracking in an all
 DHCP environment then? If I want to track how many GB a customer used last
 month, or the average Mbps used how do you do so?


 There are a few ways to get at that problem.  You can use Netflow/IPFIX
 collection to gather the usage from your router, accepting that you're only
 going to get information on layer 3 traffic, which 

Re: Greenfield Access Network

2014-07-31 Thread Colton Conor
Scott,

Thank you for your input.

What do you recommend for network segmentation? A VLAN per Chassis, a VLAN
per service, or a VLAN per customer/port? When you say qinq VLANs are you
referring to the CVLAN model?

I am really interested to know how the largest providers, like Comcast,
ATT, and Verizon setup their residential networks. Little information is
available on the internet besides the access platforms they use.


On Thu, Jul 31, 2014 at 1:51 PM, Scott Helms khe...@zcorum.com wrote:



 On Thu, Jul 31, 2014 at 2:25 PM, Colton Conor colton.co...@gmail.com
 wrote:

 I have read both the Juniper MX and Cisco ASR9K do support this advanced
 BRAS functionality, what Juniper calls Subscriber Feature Management and
 what Cisco calls BGN. These software functions run on the router itself,
 however the are not free or included with the base chassis. To enable these
 you must pay a hefty fee. So you are saying that these advanced feature
 packs that the largest networking markers in the world sell are really not
 needed anymore due to advancements on the access vendor side of the house?
 From the reading I have done about these solutions, it is kind of like
 PPPoE with a radius setup, but instead DHCP option 82 with a radius setup.
 These routers are also capable of running a local DHCP server, but I am not
 sure if that is recommended.


 Yeah, that's it in a nutshell.  There are several options, like matching
 on Option 82 or redirecting to a web page, but at the end of the day I
 don't believe they're worth the time or expense.  Keep in mind that earlier
 in my career I was a huge proponent of BRAS architecture and I've put in
 everything from Nortel Shasta's to Lucent Terminators, to Redbacks, to
 Juniper ERXs and several more models I can't remember.  Once you get past
 the whole lack of authentication, which was never very secure, and
 understand that you can depend on Option 82 to tell you where a session
 came from physically the rest is just finding away to count and account for
 bits.

 Oh, and I never recommend running the DHCP daemon on a piece of networking
 gear for service providers.



 The DPoE DOCSIS provisioning of your GPON network is interesting, but is
 that really relevant for a new provider if they don't have cable CMTS
 systems already deployed. Sure, it makes sense for the cable compaines who
 have already bought billing systems and are used to living in
 a DOCSIS world. But if you were starting fresh from the group up are you
 recommending we look at GPON providers like Calix because they support DPoE
 so we can buy DOCIS billing systems? That is an interesting concept.


 I'd strongly recommend finding a vendor that says they will support it on
 the shelves you're going to buy even if they don't today.  Even if you're
 not doing DOCSIS cable modems and don't ever plan to the provisioning
 paradigm (DHCP, TFTP, ToD) is much simpler than the proprietary north bound
 (usually SOAP) API that direct integration requires.  You can even build
 your own provisioning system with a little scripting and there are many
 more commercial options than there are for direct integration to the
 shelves.







 On Thu, Jul 31, 2014 at 12:59 PM, Scott Helms khe...@zcorum.com wrote:


 On Thu, Jul 31, 2014 at 12:07 PM, Colton Conor colton.co...@gmail.com
 wrote:

 Scott,

 Thanks for the long post.

 We will use a layer 2 10G aggregation switch then to aggregate the
 chassis at the core location. Do you have any recommendations on 10G
 switches?


 Not really, just stick with one of the major brands and you _should_ be
 fine.



 Yes I realize the math is a little backwards as this is
 all hypothetical at this point. We would provision each ONT as a shared
 1Gbps offering similar to Google Fiber. We know there will be a large
 amount of oversubscription as no one really uses a full Gbps or anywhere
 close to it. I just wanted to stress the point that carrier redundancy at
 the 10G level would be a requirement for the core router, and it should of
 course have 10G links going to the uplinks on the aggregation switch. I
 think the Cisco ASR9k and the Juniper MX line will do well. Not sure if
 there are any others that can handle this level of traffic on the BGP side?


 That's reasonable IMO and yes, I think the Juniper MX can handle that as
 well as some other functions for you related to subscriber management if
 you want.  The MX line has a full BRAS set of capabilities built into it
 that it inherited from the older ERX line, but they're commonly deployed
 without using any of them of as well.



 So we have a 10G aggregation switch to aggregate the chassis uplink
 connections, and a 10G router BGP capable router.

 I really liked your article on DHCP vs PPP for DSL networks. We
 definitely agree the way to go is with a DHCP server. A couple of items
 your article left as big questions:



 1. The article mentioned DHCP doesn't do the other part of what PPPoE
 or PPPoA does, which is generate