8733 Ethernet SLA App Guide
Transcript of 8733 Ethernet SLA App Guide
-
8/2/2019 8733 Ethernet SLA App Guide
1/44
The Access Company
Application Guide
Carrier EthernetService Level Agreement Support Tools
-
8/2/2019 8733 Ethernet SLA App Guide
2/44
AbstractThe growth in popularity of Business Ethernet services is closely
linked to the level of maturity Ethernet technology has reached,
enabling carriers to deliver and audit hard service level agreement
(SLA) guarantees that satisfy exacting requirements fromenterprise users. Carriers and service providers deploying Business
Ethernet VPNs must be prepared to ensure measurable and
enforceable SLAs that detail commitments for user traffic handling,
availability and performance guarantees, among others.
Focusing on a Layer 2 VPN use case, this application guide reviews
the various service delivery and service assurance support
mechanisms that carriers and telecom providers can utilize to
ensure service reliability, measurable KPIs (key performance
indicators) and SLA commitments.
-
8/2/2019 8733 Ethernet SLA App Guide
3/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 1
Contents1 Business Ethernet Services and the Evolution of Carrier SLAs .................................................. 2
1.1 Business Ethernet SLA support tools ............................................................................... 4
2 SLA and Service Description .................................................................................................... 5
2.1 Layer 2 VPN use case ...................................................................................................... 5
2.2 Service description ......................................................................................................... 6
2.3 Traffic Mapping .............................................................................................................. 8
2.4 Bandwidth Commitments .............................................................................................. 10
2.4.1 Effective Throughput ............................................................................................ 13
2.5 Performance Guarantees .............................................................................................. 15
2.6 Layer 2 Control Protocol Processing .............................................................................. 17
2.7 Service Availability, Response and Repair Time .............................................................. 17
3 Service Delivery .................................................................................................................... 19
3.1 Classification ................................................................................................................ 20
3.2 Metering and Policing ................................................................................................... 21
3.3 Hierarchical Scheduling Level 0 ..................................................................................... 23
3.4 Shaping ........................................................................................................................ 26
3.5 Hierarchical Scheduling Level 1 ..................................................................................... 27
3.6 Packet Editing and Marking ........................................................................................... 29
4 Service Assurance ................................................................................................................. 31
4.1 Critical Service Test Points ............................................................................................ 31
4.2 Service Validation Tests ................................................................................................ 33
4.2.1 Connectivity verification ........................................................................................ 36
4.2.2 Fault detection and diagnostic loopbacks .............................................................. 36
4.2.3 Performance monitoring ....................................................................................... 394.2.4 Throughput measurements (RFC 2544) ................................................................. 40
Conclusion ................................................................................................................................... 41
-
8/2/2019 8733 Ethernet SLA App Guide
4/44
Application Guide: Ethernet SLA Support Tools
2 2009 RAD Data Communications Ltd
1 Business Ethernet Services and the Evolution of CarrierSLAs
Ethernet services for enterprises are booming: The global business Ethernet services market is
forecasted to reach nearly US$ 39 Billion by 2013, while 2008 saw a 43% increase in demand forbusiness Ethernet service ports in the United States alone1. Enterprise customers are embracing
Layer 2 VPN services as these offer higher bandwidth rates, competitive pricing, flexibility, and
scalability. From their end, carriers and service providers see an opportunity to enhance their
business networking solutions portfolio with next-generation services that are cheaper to operate
and which combine added user value with quick return on investment and sustainable revenue
potential. Even in the midst of the current global economic turmoil, more and more business
Ethernet services are becoming available from incumbents, as well as from Tier 2 and 3 providers,
covering an expending footprint not only on a metro level, but also on a national and international
scale.
The growth in popularity of business Ethernet services is closely linked to the level of maturity
Ethernet technology has reached, enabling carriers to deliver and audit hard service level agreement
(SLA) guarantees that satisfy exacting requirements from enterprise users, as illustrated in Figure 1.
Figure 1: Evolution of SLA parameters for Ethernet services
1 Source: Vertical Systems Group, 2009
-
8/2/2019 8733 Ethernet SLA App Guide
5/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 3
Naturally, service quality and assurance are pre-requisites for the enterprise market a fact that is
clearly recognized by telecom providers, who consider service level agreements important to their
strategy for winning corporate business2. Before they migrate all their corporate traffic to new
Ethernet services, organizations need to be assured that theyll receive appropriate quality of
service (QoS) and performance guarantees to support critical applications. In a Heavy Reading 2008survey, over 87% of polled enterprise users indicated that service reliability was a key factor in
choosing their provider. Enterprise users are expecting the same service consistency and reach that
have been offered by legacy TDM, ATM and Frame Relay a requirement that best effort Ethernet
services were unable to fulfill. They also demand service differentiation to facilitate efficient
operations and to meet their particular business needs, both current and future. Table 1
summarizes the must-have carrier-class service attributes of business Ethernet offerings.
Reliable Resilient, always-on connections featuring four nines or five nines availability Automatic fault isolation and quick troubleshooting; 24x7x365 support Minimal service disruptions due to link failures Quality of service priority guarantees per class of service (CoS) VPN and data security
Economical Low expenditures on customer located equipment and multi-site connectivity High throughput without heavy investments in infrastructure and equipment Scalable data rates, provisioned remotely, for pay as you grow flexibility Minimal down-time for servicing and repair
Accountable Differentiated SLA-based performance commitments for voice, video and data Clear network visibility, proactive service monitoring Real-time, on-demand reporting linked to OSS and billing systems SLA-defined penalties and credits based on performance targets
Limitless Data rates from 1 Mbps to 1 Gbps and beyond Consistent service over any infrastructure (fiber, PDH, SDH/SONET, xDSL) Versatile connectivity options (point-to-point, any-to-any)
Table 1: Business-grade attributes of Carrier Ethernet services
2 Source: The 2007 IBM Institute for Business Value and Economist Intelligence Telecom Industry ExecutiveSurvey
-
8/2/2019 8733 Ethernet SLA App Guide
6/44
Application Guide: Ethernet SLA Support Tools
4 2009 RAD Data Communications Ltd
1.1 Business Ethernet SLA support toolsCarriers and service providers deploying business Ethernet VPNs must also be prepared to deliver
measurable and enforceable SLAs that detail commitments for user traffic handling, bandwidth and
performance guarantees, user control protocols processing and availability, as well as for response
and repair times. This requires the installation of intelligent demarcation devices, or network
termination units (NTUs), at the customer premises, to ensure end-to-end service control and
efficient service provisioning from the service hand-off points. Such Ethernet demarcation devices
are ideally equipped with Ethernet SLA support tools, including advanced service delivery and
service assurance capabilities, as shown in Figure 2.
Figure 2: Ethernet demarcation with SLA support tools
-
8/2/2019 8733 Ethernet SLA App Guide
7/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 5
2 SLA and Service Description2.1 Layer 2 VPN use caseThe following chapters explain the various functionalities and support mechanisms available to
telecom providers for delivering business Ethernet SLAs, using a specific service scenario as an
example. In this scenario, a service provider is delivering a managed Layer 2 VPN service to its
business customer over a native Ethernet network with fiber, PDH and DSL access. The enterprise
uses Ethernet virtual connections (EVCs) to transport various types of traffic between remote
branches and company headquarters, as illustrated in Figure 3 below. Table 2 provides examples of
services and applications matching the different traffic types. The L2 VPN conforms to a service
level agreement, which specifies performance commitments for different QoS levels, depending on
traffic type and application.
Figure 3:Managed Layer 2 VPN service over fiber, PDH and DSL access
-
8/2/2019 8733 Ethernet SLA App Guide
8/44
Application Guide: Ethernet SLA Support Tools
6 2009 RAD Data Communications Ltd
Traffic Type Typical Application ExamplesReal Time IP telephony (VoIP), IP video
Priority Data Critical data applications, storage and LAN-to-LANconnectivity between local enterprise routers
Best Effort Business Internet access
Table 2: Common applications and services for various traffic classes
2.2 Service descriptionThe managed Layer 2 VPN in this example is delivered between corporate headquarters and two
branches, which are not only located in remote sites, but are also connected to the service
providers network by different technologies. Network access for Headquarters is fiber-based,
whereas Branch A is connected over multiple bonded copper PDH circuits and Branch B over
SHDSL.bis lines. To meet the particular networking needs of the enterprise, the L2 VPN service is
deployed in a point-to-point EVPL (Ethernet Virtual Private Line) topology between Headquarters
and the branches, using a different EVC for each branch-to-HQ connection. The service provider
installs intelligent Ethernet NTUs at the customer premises. These demarcation devices feature the
service hand-off points (UNI: User-Network Interfaces) and support the particular capabilities
required at each location, as well as the available access:
At Headquarters: A RAD ETX-202A Ethernet over fiber demarcation device provides a servicemultiplexed UNI, whereby all the EVCs share the same UNI for efficient utilization of available
interfaces. The network connection rate is 100 Mbps via two redundant Fast Ethernet/Gigabit
Ethernet ports, enabling future upgrades up to 1 Gbps to accommodate an anticipated increase in
traffic volumes to and from this location.
At Branch A: A RICi Ethernet over bonded PDH demarcation device with a non-multiplexed UNI thatis dedicated to a single EVC and supporting a network access rate of 32 Mbps.
At Branch B: An LA-210 Ethernet over DSL demarcation device with a non-multiplexed UNI,supporting a line rate of up to 22.8 Mbps over four bonded pairs of SHDSL.bis links.
-
8/2/2019 8733 Ethernet SLA App Guide
9/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 7
The NTUs perform traffic processing and SLA management to ensure consistent user experience
and to maintain SLA metrics end-to-end, despite the difference in transport technologies and
devices.
Tables 3 and 4 summarize the different service parameters of the various UNIs and EVCs.
UNI Service Attributes Headquarters BranchesSpeed (Mbps) 10-1,000 A B
1-32 1-22.8
Transmission Mode Full Duplex Full Duplex
MAC Layer IEEE 802.3 IEEE 802.3
Service Multiplexing (Max number of
EVCs/UNI)
Yes (2) No (1)
Table 3: UNI service attributes
EVC Service Attributes ValuesEVC Type Point-to-point
CE-VLAN ID Preservation IEEE
802.1Q3
EVC1 EVC2
Yes No
CE-CoS Preservation IEEE 802.1p No
Unicast Frame Delivery Unconditionally
Multicast Frame Delivery Unconditionally
Broadcast Frame Delivery Unconditionally
Max Frame Size (bytes)4 1,580
Table 4: EVC service attributes
3 See section 2.3: Traffic Mapping4 Maximum frame size should correspond with the relevant burst size values (CBS and EBS). For further details,
see section 2.4: Bandwidth Commitments
-
8/2/2019 8733 Ethernet SLA App Guide
10/44
Application Guide: Ethernet SLA Support Tools
8 2009 RAD Data Communications Ltd
2.3 Traffic MappingThere are two EVCs connecting HQ to the branches: EVC1 links Headquarters to Branch A, while EVC2
connects it to Branch B. Within the network, these EVCs are identified by service provider VLAN tags
(SP-VLANs), which are added to customer frames by the local demarcation device upon entering the
network and then stripped off at network egress (push and pop operations). Inband management
traffic is allocated a dedicated SP-VLAN to separate it from user traffic.
The EVCs deliver real-time (RT), priority data (PD) and best effort (BE) traffic between locations,
with each traffic type representing a different class of service within the EVCs (EVC.CoS). As each
class of service requires its own QoS guarantees, it is marked differently so it can be distinguished
by the Enterprises equipment and, more importantly, by the network: In EVC1, this is done by the
three-bit priority field (P-bits) of a customer-assigned VLAN tag (CE-VLAN), while in EVC2 traffic
classes are identified by different customer VLAN IDs (CE-VID). Since both EVCs are associated with
multiple traffic types, a mapping plan of CE-VLANs and CE-P bits to EVCs is defined in advance to
ensure efficient traffic delivery.
Tables 5 and 6 detail the correlation between VLAN IDs (VIDs) and EVCs.
Service Point UNI H (Headquarters) UNI A (Branch A) Network
EVC EVC1ID Tags CE-VLAN CE-P bit CE-VLAN CE-P bit SP-VLAN SP-P bitRT Traffic
17
6
17
6
2,000
6
PD Traffic 4 4 5BE Traffic 1 1 2Management Traffic N/A 5 7
Table 5: Mapping CE-VLANs to EVC1, services are separated by priority bits
-
8/2/2019 8733 Ethernet SLA App Guide
11/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 9
Service Point UNI H (Headquarters) UNI B (Branch B) Network
EVC EVC2ID Tags CE-VLAN CE-P bit CE-VLAN CE-P bit SP-VLAN SP-P bitRT Traffic 42 x 2 x
2,001
6
PD Traffic 43 y 3 y 4BE Traffic 44 z 4 z 2Management Traffic N/A 6 7
Table 6: Mapping CE-VLANs to EVC2, services are separated by customer VLAN tags
Because the customers equipment in Branch A is capable of traffic differentiation based on P-bit
values, all traffic is assigned a single VID with a separate P-bit per service. User equipment and IT
considerations in Branch B, however, require that each class of service receive its own CE-VLAN tag.
In this case, packets carrying the same CE-VID will be treated similarly by the network, regardless of
their specific CE-P bit value. All traffic assigned to EVC1 carry an outer SP-VID 2,000, while traffic
associated with EVC2 is double-tagged with SP-VID 2,001. The different classes of service within
each EVC are marked with different SP-P bit values.
As can be seen in Tables 5 and 6, the classes of service in each EVC are tagged differently at the
associated UNIs. In EVC1, both locations use CE-VLAN 17.6 (CE-VID 17, CE-P bit 6) to mark RT, 17.4
for PD and 17.1 for BE and therefore ingress/egress CE-VLAN ID preservation is required between
locations. This is not in the case in EVC2, where the various service types are assigned different CE-
VIDs at each location and the local demarcation devices must swap CE-VLAN tags in egress frames
when the SP-VLAN tags are popped, for example, replacing CE-VID 42 with CE-VID 2 for RT traffic
arriving at Branch B from Headquarters.
-
8/2/2019 8733 Ethernet SLA App Guide
12/44
Application Guide: Ethernet SLA Support Tools
10 2009 RAD Data Communications Ltd
2.4 Bandwidth CommitmentsThe EVPL SLA contains throughput commitments, divided into the following bandwidth profile
categories:
Committed Information Rate (CIR): The bandwidth that the service provider guarantees theenterprise, regardless of network conditions.
Excess Information Rate (EIR): The bandwidth allowance for best effort delivery, for which serviceperformance is notguaranteed and traffic may be dropped if the network is congested.The combination of CIR and EIR rates is typically referred to as PIR, or Peak Information Rate, whichrepresents the total burstable bandwidth sold to the enterprise.Committed Burst Size (CBS): The maximum size, expressed in bytes, of a burst of back-to-backEthernet frames for guaranteed delivery.
Excess Burst Size (EBS): The maximum size of a burst of back-to-back Ethernet frames permittedinto the network without performance guarantees. EBS frames may be queued or discarded if
bandwidth is not available.
According to MEF (Metro Ethernet Forum) specifications, the bandwidth profile service attribute,
which includes some or all of the above categories, can be defined per UNI, per EVC or per CoS
identifier (CoS ID; EVC.CoS). For any given frame, however, only one such model can apply. The
service provider meets the bandwidth guarantees by reserving appropriate network resources andemploying a two-rate/three-color (trTCM) rate-limitation methodology as part of its traffic
engineering policy to ensure compliance by user traffic. For the service discussed in this paper, the
policing function is performed by EVC.CoS granularity, as described in further detail in Chapter 3:
Service Delivery.
-
8/2/2019 8733 Ethernet SLA App Guide
13/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 11
Figure 4: CIR and EIR bandwidth profiles
EIR offerings enable carriers to generate more revenues from a given network capacity
without compromising the quality of premium or real-time CIR services. As bandwidth consumption
fluctuates throughout the day and the week, carriers and service providers can oversubscribe the
network and monetize unused portions of it by selling best effort services, provided that the
customer-located demarcation devices are equipped with reliable traffic management capabilities. This
allows total bandwidth charges to exceed actual infrastructure rates. However, because EIR bandwidth
is shared among users and applications, not all users are able to take advantage of the entire excess
bandwidth simultaneously.
Tip: EIR as a Revenue Generator
-
8/2/2019 8733 Ethernet SLA App Guide
14/44
Application Guide: Ethernet SLA Support Tools
12 2009 RAD Data Communications Ltd
Table 7 lists the bandwidth commitments for each class of service within EVC1 and EVC2, which are
applicable to all UNIs even though these support different access rates. To avoid delays in traffic
delivery, the bandwidth profiles in each EVC should not exceed the lowest UNI speed in the service
points connected by that EVC i.e., 32 Mbps for EVC1 (UNI A) and 22.8 Mbps for EVC2 (UNI B). As can
be seen in Table 7, the total CIR allowance for all classes of service in EVC 1 is 25 Mbps, permitting amaximum of 7 Mbps EIR to meet UNI As access connection speed limit. To better serve corporate
operations, the enterprise purchases higher EIR rates for PD and BE traffic, allowing up to 10 Mbps
for each of these classes of service if no other traffic is transmitted at the time. In EVC2, the total
PIR bandwidth is 30 Mbps, of which 20 Mbps are CIR and 10 Mbps of EIR are divided between PD
and BE traffic, allowing up to 5 Mbps for each, provided that no other traffic is transmitted
simultaneously. RT applications are typically allocated CIR bandwidth only, BE EIR only and PDs
bandwidth profiles are divided between CIR and EIR commitments.
EVC EVC.CoS Bandwidth ProfileCIR (Mbps) EIR (Mbps) CBS (Bytes) EBS (Bytes)
1Real-Time 5 0 150 0Priority Data 20 10 5,000 5,000Best Effort 0 10 0 2,500
Total 25 20 -- --
2Real-Time 5 0 150 0Priority Data 15 5 3,500 3,000Best Effort 0 5 0 2,500
Total 20 10 -- --Table 7: Effective bandwidth commitments per EVC.CoS
The CBS and EBS values should correspond with the frame sizes that typically make up each class of
service, as well as with the maximum frame size allowed at the UNI. Here, for example, a CBS value
of 5,000 bytes for PD traffic in EVC1 permits up to three frames of 1,522 bytes in each burst. A
general rule of thumb correlates between CBS value, frame size and their effect on network delay:
Large frames transmitted in a service that receives a low CBS value are more prone to delays, since
the burst allowance is exhausted quickly by a relatively low number of frames. In such cases, new
frames must await subsequent bursts.
-
8/2/2019 8733 Ethernet SLA App Guide
15/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 13
Figures 5 and 6 illustrate CIR and EIR values in UNI A and UNI B, respectively.
2.4.1 Effective ThroughputWhenplanningbandwidth commitments, the difference between line rate and effective throughputshould be taken into account, as frame header VLAN tags and other overhead may potentially
consume significant portions of available bandwidth. For SLA rate measurement purposes, user data
usually includes IEEE 802.3 Ethernet frames from the destination MAC address (DA) to the Frame
Check Sequence/Cyclic Redundancy Check (FCS/CRC) field, including the CE-VLAN tag. Service
provider data in IEEE 802.1ad (Q-in-Q) networks include four bytes of the SP-VLAN tag, while the
Ethernet protocol itself typically adds the following overhead5:
Preamble + Start Frame Delimiter (7 bytes + 1 byte): Synchronizes receiving networkelements with incoming signals and indicates the start of the frame
IFG Inter-frame Gap (12 bytes): Provides a brief recovery time between frames for thereceiving element (96 bit times/8 bits = 12 bytes)
5 Also exists in LAN traffic on the user side
Figure 5: CIR and EIR values in UNI A Figure 6: CIR and EIR values in UNI B
-
8/2/2019 8733 Ethernet SLA App Guide
16/44
Application Guide: Ethernet SLA Support Tools
14 2009 RAD Data Communications Ltd
Figure 7: User, network and protocol data in 802.3 Ethernet framesObviously, the effective throughput is directly impacted by the frame size. For large Ethernet
frames carrying, for example, 1,500 bytes of data payload at a line rate of 10 Mbps, the calculation
will be as follows:
1. Total frame size = 8B (Preamble + SFD) + 6B (DA) + 6B (SA) + 4B (SP-VLAN) + 4B (CE-VLAN)+ 2B (T/L) + 1,500B (data payload) + 4B (FCS/CRC) + 12B (IFG) = 1,546 bytes
2. User data = 6B (DA) + 6B (SA) + 4B (CE-VLAN) + 2B (T/L) + 1,500B (data payload) + 4B(FCS/CRC) = 1,522 bytes
3. Ethernet overhead = {[8B (Preamble + SFD) + 4B (SP-VLAN) + 12B (IFG)] / 1,546 bytes (totalframe size)} x 100% = 1.55%
4. Effective throughput = [1,522 bytes (user data) / 1,546 bytes (total frame size)] x 10 Mbps(line rate) = 9.84 Mbps
However, smaller frames using the same line rate are characterized by a lower effective throughput
due to higher overhead relative to their size, as demonstrated by the following calculation for a 46-
byte payload data frame:
1. Total frame size = 8B (Preamble + SFD) + 6B (DA) + 6B (SA) + 4B (SP-VLAN) + 4B (CE-VLAN)+ 2B (T/L) + 46B (data payload) + 4B (FCS/CRC) + 12B (IFG) = 92 bytes
2. User data = 6B (DA) + 6B (SA) + 4B (CE-VLAN) + 2B (T/L) + 46B (data payload) + 4B(FCS/CRC) = 68 bytes
-
8/2/2019 8733 Ethernet SLA App Guide
17/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 15
3. Ethernet overhead = {[8B (Preamble + SFD) + 4B (SP-VLAN) + 12B (IFG)] / 92 bytes (totalframe size)} x 100% = 26%
4. Effective throughput = [68 bytes (user data) / 92 bytes (total frame size)] x 10 Mbps (linerate) = 7.39 Mbps
The actual throughput experienced by the enterprise is therefore dependent on the relative
proportions of various applications in the traffic mix. A higher share of 68-byte user data packets,
such as being used for most VoIP traffic, will result in lower throughput efficiency. In addition to the
Ethernet-related bandwidth penalties, the physical media used for transmission may require further
overhead for framing and encapsulation. For example, Ethernet over DSL throughput is affected by
the particular transport protocol being used: The traditional DSL protocol stack includes an ATM
sub-layer, which presents heavy bandwidth fines (cell tax) of up to 20%-50%; the more recent
EFM (Ethernet in the First Mile) encoding, such as used by the LA-210 demarcation device at UNI B,
enables improved line utilization and a 5% overhead. Likewise, multi-circuit copper access that is
powered by Ethernet over NG-PDH capabilities, as is the case for the RICi demarcation device at UNI
A, can rely on constant, predictable and lower overhead with GFP (generic framing protocol), VCAT
(virtual concatenation) and LCAS (link capacity adjustment scheme) encapsulation and bonding
tools, compared to the less-efficient HDLC, MLPPP and IMA methods.
2.5 Performance GuaranteesA key element in the SLA defines the performance and QoS guarantees that the service provider
commits to the enterprise, specifically, frame delay, delay variation and frame loss.
Frame Delay (Latency) is the time a transmitted frame travels across the network until it isdelivered. VoIP and real-time services require extremely low latency, as even the smallest delay has
a dramatic effect on service quality. TCP applications are also impacted from increased network
delay, taxing the network resources with re-transmissions when session timeouts occur.
Frame Delay Variation(Jitter) is the difference in delay between consecutive frames, causingthem to arrive at their destination at inconsistent intervals. Jitter is a critical performance parameter
for real-time services.
-
8/2/2019 8733 Ethernet SLA App Guide
18/44
Application Guide: Ethernet SLA Support Tools
16 2009 RAD Data Communications Ltd
Frame Loss Ratio is the percentage of undelivered frames out of all the frames that weretransmitted within a certain time interval. Packet loss might lead to service degradation and can
have a negative effect on throughput when dropped frames are re-transmitted, as is the case with
TCP/IP applications.
The nominal values for the above performance commitments are specified in the SLA, together with
qualifying parameters, such as the service direction (one-way or round-trip), the percentage of
traffic and the time interval for which these commitments are valid. Table 8 details the performance
metrics guaranteed by the service provider for the enterprise. These are presented per class of
service and refer to both EVCs, in all locations.
Performance Attribute Real-Time(VoIP)
Priority(LAN-to-LAN)
Best Effort(Internet
Access)Frame Delay
Value (ms)
-
8/2/2019 8733 Ethernet SLA App Guide
19/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 17
Table 8 also specifies the service providers commitment for service restoration in the event of
network or equipment failure, a parameter that also affects the Service Availability performance
attribute discussed in section 2.7.
2.6 Layer 2 Control Protocol ProcessingAnother aspect of the service that must be defined in advance refers to the handling of user
Ethernet control protocols (L2CP Layer 2 Control Protocols), to avoid duplication of user and
provider bridged protocol data units (BDPUs). Table 9 lists the processing instructions for the
enterprises L2CP, according to MEF recommendations for an EVPL service.
Layer 2 Control ProtocolSTP Spanning Tree Protocol Discard
RSTP Rapid Spanning Tree Protocol Discard
MSTP Multiple Spanning Tree Protocol Discard
Pause IEEE 802.3 x Discard
LACP Link Aggregation Control Protocol Discard
Authentication IEEE 802.1 x Discard
GARP Generic Attribute RegistrationProtocol
Discard
Table 9: Layer 2 control protocol processing instructions
2.7 Service Availability, Response and Repair TimeFinally, the service provider offers various SLA packages that differ in the service support, time to
repair (TTR) and service availability commitments that they offer. In this case, the enterprise selects
the Gold package as it reflects the level of support and reliability best suited for its needs. The
relevant SLA metrics are listed in Table 10.
-
8/2/2019 8733 Ethernet SLA App Guide
20/44
Application Guide: Ethernet SLA Support Tools
18 2009 RAD Data Communications Ltd
Service Level Service CenterHours
ResponseTime
Repair Time AverageAvailability
Standard Mon-Fri08:00-17:00
4 Hours 12 Hours 99.0%
Silver Mon-Sat08:00-20:00
3 Hours 10 Hours 99.9%
Gold Mon-Sat08:00-20:00
2 Hours 8 Hours 99.99%
Platinum Mon-Sun00:00-24:00
1 Hours 4 Hours 99.999%
Table 10: Service package parameters for availability, response and repair time
Service availability, or uptime, is typically calculated on a monthly basis, after measuring the number
of minutes and seconds that the network or service were unavailable to the enterprise.
To determine customer remedies for SLA breaches, unavailability instances include service outages
and network downtimes associated with unscheduled maintenance events. This means that, in a
30-day month with no scheduled down-time, the enterprise should not experience serviceunavailability for more than 4 minutes and 19 seconds throughout the entire month [60 minutes x
24 hours x 30 days x (1-0.9999) unavailability threshold]. According to the terms of the Gold
service package, the service provider assures a maximum TTR of 8 hours from the moment the
customer opens a Trouble Ticket.
-
8/2/2019 8733 Ethernet SLA App Guide
21/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 19
3 Service DeliveryAs per the enterprises SLA terms, VoIP traffic requires different service quality than email
communications and therefore must be handled separately by the network. By delivering multiple
services from each UNI with differentiated, per-service QoS parameters the service provider caters
to the enterprises needs, while lowering its own operational costs and improving its profit margins.
To satisfy the SLA guarantees that are listed in Chapter 2, the Carrier Ethernet demarcation devices
must support multi-priority, multi-flow traffic and ensure latency, jitter and packet delivery
performance for each flow. These devices are therefore equipped with capabilities such as
metering, policing and shaping of user traffic, as well as with a two-stage queuing mechanism that
ensures predictable performance and creates scheduling fairness with better load distribution in
the network.
The EVPL service is defined as CoS-aware, with both bursty and real time traffic and VLAN-based
EVCs. Accordingly, upstream user traffic undergoes the following processing steps by the ETX-202A,
RICi, and LA-210 demarcation devices, to ensure that QoS and SLA commitments are met:
Classification Metering and policing Hierarchical scheduling (Level 0) Shaping Hierarchical scheduling (Level 1)
Marking and editing
The following sections describe in detail ingress traffic processing as performed at Headquarters
(UNI H).
In some cases, downstream traffic also requires rate-limiting in the form of metering,
policing and shaping, to ensure that egress traffic does not exceed user equipment port limits. This
is required when UNIs receive traffic from several sources simultaneously, such as in E-LANservices involving any-to-any connectivity between numerous remote branches and a company
headquarters. In these cases, the aggregate traffic arriving from multiple sites may exceed the
bandwidth limit of the customers local equipment at a particular location. Asymmetric rate-
limiting, i.e., different policies implemented for upstream and downstream traffic, is therefore
often tasked to the local demarcation device.
Tip: Rate Limitation of Downstream Traffic
-
8/2/2019 8733 Ethernet SLA App Guide
22/44
Application Guide: Ethernet SLA Support Tools
20 2009 RAD Data Communications Ltd
3.1 ClassificationTraffic arriving from customer equipment is first classified according to its type. The demarcation
devices QoS engine associates incoming traffic by flows, which represent the various classes of
service within a particular EVC (EVC.CoS), i.e., Real-Time, Premium Data and Best-Effort. The
demarcation devices sort traffic by the user port through which it arrives, together with different
CoS ID selectors for each EVC. These are the customers VLAN tag priority fields for EVC 1 and user-
assigned VLAN tags for EVC2, as per the mapping charts in Tables 5 and 6. Consequently, Flows 1, 2
and 3 make up EVC1, while Flows 4, 5 and 6 are delivered in the network as EVC2.
Figure 8: Traffic classification into flows
High flexibility in traffic classification, manifested by the ability to support a wide variety of
sorting criteria, allows service providers to identify various traffic types at fine granularity and ensure
appropriate quality of service for each flow. In addition, it eliminates the limitation of by-VLAN-only
classification, which is restricted to 4,096 unique IDs. Ideally, criteria alternatives will include such CoS ID
selectors as VLAN ID, 802.1p, DSCP, IP precedence, EtherType, MAC address, IP address, and many others,as well as their combinations, depending on the capabilities of the demarcation devices.
Tip: QoS Classification Criteria
-
8/2/2019 8733 Ethernet SLA App Guide
23/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 21
3.2 Metering and PolicingOnce the flows are established, a metering and policing function is applied for each flow to regulate
traffic according to the contracted CIR, EIR, CBS, and EBS bandwidth profiles. Rate limitation is
performed according to the Dual Token Bucket mechanism, using a trTCM algorithm, as seen in
Figure 9.
Figure 9: Rate limitation using two-rate-three-color metering
Let us take, for example, a flow containing Priority Data traffic in EVC1, for which the QoS
parameters defined in the SLA are as follows: CIR = 20 Mbps, EIR = 10 Mbps, CBS = 5,000 bytes,and EBS = 5,000 bytes. Three Ethernet frames are sent by the user 2 microseconds apart; all three
are 1,522 bytes in sizeand all are mapped to flow number 2, marked as 17.4 (CE-VLAN ID 17, P-bit
4). The first frame drains 1,522 bytes of the 5,000 CBS bytes, leaving 3,478 bytes remaining. Since
the frame size is smaller than the CBS limit, it is marked as Green and admitted forward. The
token bytes are refilled at the CIR rate of 20 Mbps, or 2.5 Megabyte per second, resulting in 5
additional bytes in the bucket when the second frame arrives (2.5 Megabyte per second x 2
microseconds). Together, there are now 3,483 bytes available for the second frame (3,478 + 5).
The second drains another 1,522 bytes, leaving an allowance of 1,961 bytes in the bucket, to which
5 bytes are added by the time the third frame arrives. The total of 1,966 bytes (1,961 + 5) is still
enough for the 1,522 bytes of the third frame, but not for the one following it 2 microseconds
later.
Green: Frames admitted tonetwork
Yellow
: Frames admitted to
network on a best effort basis
Red: Discarded frames
-
8/2/2019 8733 Ethernet SLA App Guide
24/44
Application Guide: Ethernet SLA Support Tools
22 2009 RAD Data Communications Ltd
The fourth frame is also 1,522 bytes in size, however, at the time of its arrival there are only 449
bytes available, after the previous frame drained 1,522 bytes and 5 bytes were added between
frames (1,966 1,522 + 5 = 449). The fourth frame is therefore examined by the excess bandwidth
threshold, and, as it is within the EBS limit of 5,000 bytes, it is marked as Yellow and passed
forward on a best effort basis.
Since non-conformant packets are discarded, rather than queued or buffered, the metering
function is accompanied by a policing function. Another method for traffic engineering shaping
is used at a later stage to ensure that transmission is performed in a way that best utilizes network
resources.
Figure 10: Traffic metering and policing
-
8/2/2019 8733 Ethernet SLA App Guide
25/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 23
3.3 Hierarchical Scheduling Level 0The next traffic processing phase defines the order in which the various flows are forwarded, using
a two-step scheduling mechanism so that each flow receives the desired scheduling priority.
In level 0, different flows are assigned separate output queue blocks, each containing schedulingslots corresponding with CoS delivery priorities. Technically, each of the six flows in our EVPL service
can be assigned a dedicated queue block; however, this is not necessary as the flows are already
sorted by class of service. Instead, the three flows associated with EVC1 (17.6, 17.4, and 17.1) are
assigned one queue block while the flows associated with EVC2 (CE-VLAN IDs 42-44) are assigned
another, resulting in a total of two blocks. In the latter case, each of the three VLANs is
permanently mapped to its designated CoS queue, regardless of the CE-P bit it carries.
Figure 11: Traffic scheduling, level 0
-
8/2/2019 8733 Ethernet SLA App Guide
26/44
Application Guide: Ethernet SLA Support Tools
24 2009 RAD Data Communications Ltd
As can be seen in Figure 11, each queue cluster contains up to eight slots, whereby CoS 7 is
mapped to the highest priority queue, normally reserved for the service providers management
traffic, and CoS 0 the lowest. The ETX-202A supports a combination of traffic scheduling
techniques, whereby applications requiring low latency and jitter are mapped to Strict Priority
queues, while other services are mapped to the remaining slots using weighted fair queuing (WFQ):
The Strict Priority queues ensure minimal latency and jitter for the RT traffic, even when alarge amount of bursty data traffic is sent over the same uplink. Strict Priority traffic will
always be processed first, while flows mapped to the WFQ slots are buffered until the Strict
Priority queues are empty.
The WFQ technique avoids scheduling starvation of lower priority queues and ensuresrelatively fair allocation of bandwidth by sharing it among all flows. In this manner, packets
belonging to lower classes of service are not penalized when higher priority queues are not
empty and may still receive transmission time. QoS-conformant scheduling is handled by
assigning different weights to the various queues instead of equally dividing overall
bandwidth among all active flows.
To ensure adherence to SLA bandwidth guarantees, it is important to correlate weight
distribution among the queues with the committed rates allocated for each service. In EVC1, for
example, with network access rate of 32 Mbps, the real-time traffic is mapped to one of the
Strict Priority queues to ensure expedited delivery. According to the enterprises SLA bandwidth
commitments listed in Table 7, the RT flow requires a committed rate of 5 Mbps, leaving 27
Mbps to be divided between the other two classes of service that are mapped to the WFQ slots
CoS 4 (PD traffic) and CoS 1 (best effort traffic). The recommended weight ratio between
these queues is 22:5. This allows for 22 Mbps for CoS 4 to ensure it receives its 20 Mbps CIR
value and some of the EIR bandwidth, leaving 5 Mbps of EIR for CoS 1.
The same principal can be applied to EVC2, for which the access rate is 22.8 Mbps. After
securing 5 Mbps of CIR for the RT traffic with Strict Priority queuing, the remaining 17.8 Mbps
are divided at a ratio of 8:1 between the PD and BE flows, respectively. This ensures 15 Mbps
CIR and 1 Mbps EIR for CoS 4 and almost 2 Mbps EIR for CoS 1.
Tip: Using Scheduling Queues to Deliver SLA Bandwidth Guarantees
-
8/2/2019 8733 Ethernet SLA App Guide
27/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 25
While most of the management traffic is mapped to the highest SP queue, OAM (operations,
administration and maintenance) traffic and performance measurement messages should be
assigned the same queue slot as that of the data they test. In other words, OAM messages testing
CE-VLAN 17.6 are mapped to the Strict Priority queue assigned to CoS 6.
As the queues are filling up, new packets face a growing risk of being discarded due to lack of
buffer space. When packets arriving to overrun queues are dropped indiscriminately, such as in a
Tail Drop mechanism, differentiated QoS cannot be maintained and network performance is
hindered by intermittent periods of flooding and underutilization. The ETX-202As QoS engine
solves such issues by employing a weighted random early detect (WRED) mechanism for intelligent
queue management and congestion avoidance. The WRED algorithm monitors the state and size of
each queue and determines whether an incoming packet should be buffered or dropped, based on
statistical probabilities: Green-marked packets are directed to their respective queues, while
yellow-marked packets are admitted forward in accordance with their WRED profile.
Near-empty queues accept all incoming packets but as they begin to fill, the drop probability for
new packets increases. The different queues are allocated different occupancy thresholds, above
which incoming packets are discarded at random at a growing rate as the queue fills, until the
queue has reached a maximum threshold and all incoming packets are dropped. As can be seen in
Figure 12, various classes of service are assigned drop values that reflect their priorities. This way,
packets of lower classes of service with lower QoS commitments will be dropped earlier and at a
greater rate than those of a higher CoS.
Figure 12: WRED profiles for different classes of service
-
8/2/2019 8733 Ethernet SLA App Guide
28/44
Application Guide: Ethernet SLA Support Tools
26 2009 RAD Data Communications Ltd
The blue curve in Figure 12 represents the lowest priority queues for classes of service 0 and 1.
Their random packet discarding begins early, for example, when the queues are only 20% full. As
the queue reaches 40% occupancy it hits the 60% drop probability mark, after which packet
dropping picks up pace until the WRED mechanism stops the random discard and drops all packets.
By contrast, the highest priority queues for classes of service 6 and 7, represented by the purplecurve, do not drop packets until they are almost full.
3.4 ShapingTraffic coming out of the level 0 queue blocks is shaped to smooth out bursts and avoid buffer
overruns in subsequent network elements. At this stage, output packets from each buffer block
undergo a shaping function so that the overall traffic volume from each block does not exceed a
preset bandwidth value. Shaping is performed according to a Token Bucket algorithm, with a single
rate bandwidth profile that is based on the accumulated CIR values of all the flows mapped to the
relevant queue block and a certain allowance of excess rate that the service provider assigns to the
enterprise to avoid congestion:
Shaper rate queue block 0 = 5 Mbps (CIR Flow 1) + 20 Mbps (CIR Flow 2) + 0 (CIR Flow 3) =25 Mbps + excess allowance
Shaper rate queue block 1 = 5 Mbps (CIR Flow 4) + 15 Mbps (CIR Flow 5) + 0 (CIR Flow 6) =20 Mbps + excess allowance
The shaping function also compensates for the network data packet overhead that is added at later
stages, as well as for service provider OAM traffic. Packets exceeding the shaper value are delayed
in the buffer until they can be transmitted to the network. The multiple shaping rates mechanism is
an important tool to ensure that outgoing traffic volume is in line with the access connection of the
remote service point: The shaper for queue block 0 matches the bonded PDH bandwidth capacity of
UNI A, while the shaper for queue block 1 is set to meet UNI Bs xDSL access rate.
The shaping phase is illustrated in Figure 13.
-
8/2/2019 8733 Ethernet SLA App Guide
29/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 27
Figure 13: Shaping queue block buffer traffic
3.5 Hierarchical Scheduling Level 1In the second step of the scheduling process, each queue cluster in level 0 receives a queue slot in
level 1, with each slot corresponding with a different EVC. Allocation of different scheduling
priorities to the queues effectively sets the precedence each EVC receives at the network ingress,
as it defines the priority in which the EVC data is transmitted. In this case, the scheduling is
performed by WFQ with weights assigned at a ratio of 5:4 to queue 1, in effect giving precedence
to EVC1 traffic at the network entrance.
-
8/2/2019 8733 Ethernet SLA App Guide
30/44
Application Guide: Ethernet SLA Support Tools
28 2009 RAD Data Communications Ltd
The 1 Gbps rate of the physical network interface can easily accommodate the total bandwidth
consumption of both EVCs, however, the queue management and buffering system influences
traffic delay and must therefore take into account the enterprises SLA commitments.
Figure 14: A two-level hierarchical scheduler
-
8/2/2019 8733 Ethernet SLA App Guide
31/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 29
By managing bandwidth consumption and transmission priorities with CoS granularity, multi-level
hierarchical scheduling enables predictable, per-SLA latency and jitter performance across the
network. In addition, it provides fair distribution of bandwidth among traffic classes and users over
shared connections, by allocating excess bandwidth not required for critical applications to lower-
priority traffic. Implementation of such capabilities at the service hand-off point reduces the risk ofcongestion at the network core, further facilitating the service providers ability to meet delay and
loss guarantees.
3.6 Packet Editing and MarkingThe final stage in preparing user traffic to network transmission involves packet editing and
marking. This includes adding service provider VLAN tags (packet editing) according to the EVC
mapping attributes listed in tables 5 and 6. In this manner, packets belonging to Flows 1, 2 and 3
are stacked with an SP-VLAN tag whose ID value is 2000, while Flows 4, 5 and 6 are added SP-VLAN
tag 2001. In addition, the packets are marked with service provider priority bits in the outer SP-
VLAN tag to denote the priority each EVC.CoS receives while in the network.
Figure 15 illustrates all the various stages included in service delivery processing as describedabove.
As the packets are already marked by their level of CIR/EIR conformance (green and
yellow), metering continuity in the network can be achieved by using the P-bit field to signal a
packets color so that it has a greater chance of maintaining its status and priority throughout
the transmission. This is especially useful in color-blind networks, as well as in 802.1Q color-
aware networks with no discard eligible (yellow) marking.
Tip: Using P-bits for Color Marking
-
8/2/2019 8733 Ethernet SLA App Guide
32/44
Application Guide: Ethernet SLA Support Tools
30 2009 RAD Data Communications Ltd
Figure 15: Ethernet service delivery process
-
8/2/2019 8733 Ethernet SLA App Guide
33/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 31
4 Service AssuranceA third, crucial piece of the L2 VPN service puzzle relates to the providers ability to verify that the
actual service performance and network availability experienced by the enterprise matches SLA
guarantees. This is done by performing remote, end-to-end OAM tests, preferably without affecting
the service and in line with actual user traffic. In addition to meeting customer service expectations
and optimizing network operations, service monitoring procedures and remote loopback testing
contribute to the service providers profit margins by minimizing the risk of penalties associated
with SLA breaches.
4.1 Critical Service Test PointsService validation and testing is required at the following points throughout the service lifecycle:
At initial service turn-up: Prior to handing off the L2 VPN service to the enterprise, theservice provider must perform acceptance tests to verify that the service is running
smoothly according to the SLA, per the pre-defined classes of service. Testing at this point
also serves for generating a baseline for performance parameters, to which future test
results will be compared. Specifically, KPI (key performance indicators) metrics for end-to-
end throughput, packet delivery ratio, latency, and jitter are established. These results are
recorded and archived for customer reporting, SLA comparison and future use as needed. It
is advisable to perform burn-in stability tests over an interval of 24 hours, at minimum, to
accurately establish service behavior.
Ongoing monitoring: KPI measurements are also performed on an on-going basis, tomonitor network health and ensure that QoS is maintained per class-of-service and in
accordance with the contracted SLA. Continuous monitoring is required to detect service
degradation and network congestion, prompting relevant alerts and advising when an
increase in bandwidth is required. When service outages or connectivity faults are identified,
Trouble Tickets are initiated and appropriate remedial actions taken. The collected data is
used for billing purposes, while reports of network and service conditions are available to
the enterprise periodically and on-demand. OAM tests are performed at a frequency that
balances between the need to quickly detect and repair problems before they escalate, and
the service providers desire to limit the toll such tests take on network and bandwidth
resources.
-
8/2/2019 8733 Ethernet SLA App Guide
34/44
Application Guide: Ethernet SLA Support Tools
32 2009 RAD Data Communications Ltd
Figure 16: RADs Ethernet OAM Resource Utilization Calculator
RAD has developed a modeling tool to determine the network resources
required for OAM procedures. In the enterprises service topology, for example, periodic
multicast OAM messages for connectivity fault management may require a bandwidth
rate of 23,000 bytes per second and 34 FPS (frames per second) per demarcation device,
if sent every 1,000 milliseconds. Under the same network conditions, bandwidth
consumption per demarcation device climbs to over 40,000 bytes per second and 53 FPS,
if the service provider increases testing frequency to 100 millisecond intervals.
To receive a copy of RADs OAM Calculator, please contact us at [email protected].
Tip: OAM Bandwidth Calculation
-
8/2/2019 8733 Ethernet SLA App Guide
35/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 33
On-demand monitoring and troubleshooting: When a service outage is reported, a suite oftests is performed to remotely localize the fault prior to a technician dispatch. This reduces
MTTR (mean time to repair) and minimizes the effect on users, while lowering operating
expenses by eliminating unnecessary (and expensive) truck rolls and ensuring that
technicians are sent to the right location.
4.2 Service Validation TestsThe OAM tests performed by the ETX-202A, RICi and LA-210 at the various locations conform to the
relevant industry standards:
IEEE 802.3-2005 (formerly 802.3ah): Ethernet Link OAM is part of the Ethernet in the FirstMile, or EFM, set of standards. It relates to a single Ethernet link, typically the access
connection between the customer premises and the network edge. Specific link monitoring
procedures include auto-discovery, heartbeat, and fault notification messages; link
statistics; MIB variable retrieval; and remote loopbacks.
IEEE 802.1ag: Ethernet Service OAM, also termed Connectivity Fault Management (CFM),enables Ethernet service monitoring over any path, whether a single link or end-to-end,
allowing the service provider to manage each EVC separately regardless of the underlying
transport. CFM partitions a network into maintenance domains and hierarchy levels that are
allocated between users, service providers and third-party operators. It assigns maintenance
end points, or MEPs, to the edges of each domain and maintenance intermediate points, or
MIPs, to ports within domains. This helps define the relationships between all entities from
a maintenance perspective and permits each entity to monitor the layers under its
responsibility to easily localize problems. Service monitoring procedures include continuity
check, link trace, loopback, and alarm indication signal. As can be seen in Figure 17, the
EVPL service provided to the enterprise involves a single maintenance domain with one level.
-
8/2/2019 8733 Ethernet SLA App Guide
36/44
Application Guide: Ethernet SLA Support Tools
34 2009 RAD Data Communications Ltd
Figure 17: Ethernet Service OAM maintenance domain levels ITU-T Y.1731: The OAM Functions and Mechanisms for Ethernet-based Networks standard
is used for Ethernet service performance monitoring, enabling the service provider to
measure frame delay, delay variation and frame loss SLA parameters. It also includes fault
management functionalities similar to CFMs, such as continuity check, loopbacks, and link
trace.
Figure 18 displays the various network sections to which different OAM procedures apply.
Figure 18: Ethernet Link, Connectivity and Service layer OAM over different network segments
-
8/2/2019 8733 Ethernet SLA App Guide
37/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 35
Table 11 summarizes the different OAM tools available to the service provider for SLA verification.
These are performed either directly between sites or via an external test set probe:
Function Tools
Connectivity Verification& Fault Detection
IEEE 802.3ah heartbeat
Y.1731/IEEE 802.1ag Continuity Check (Unicast/Multicast)
Y.1731/IEEE 802.1ag Loopback (MAC Ping, Unicast/Multicast) on
demand
Fault IsolationY.1731/IEEE 802.1ag Link Trace (MAC Trace-route)
Y.1731/IEEE 802.1ag Loopback (MAC Ping, Unicast/Multicast)
L3 Ping and Trace-route
L1 IEEE 802.3ah Loopback, MIB variable retrieval
Fault Propagation Subscriber port shutdownITU-T Y.1731 Alarm Indication Signal
Fault Notification ITU-T Y.1731 Remote Defect IndicationIEEE 802.3ah Dying Gasp, SNMP Trap
Diagnostic LoopbacksL1 physical interface Loopback
L1 IEEE 802.3ah Loopback
L2/3 in-service and out-of-service Loopback at line-rate or lower, with
MAC/IP swap, per EVC/VLAN, EVC.CoS, or MAC address flows
PerformanceManagement
ITU-T Y.1731 Packet Loss, Packet Delay, Packet Delay Variation with
statistics collection per EVC.CoS (Unicast/Multicast)
RFC2544 Throughput measurements
L3 Performance Measurements
BER Testing
Table 11: OAM tools for SLA verification
Further details on selected OAM tests performed by the service provider are described in the
following sections.
-
8/2/2019 8733 Ethernet SLA App Guide
38/44
Application Guide: Ethernet SLA Support Tools
36 2009 RAD Data Communications Ltd
4.2.1 Connectivity verificationThe demarcation devices are configured to send periodic 802.3-2005 (802.3ah) heartbeat
messages and 802.1ag/Y.1731 Continuity Check (CC) frames. These fault detection and discovery
mechanisms are used to check the status of link and service connectivity for service acceptance at
turn-up and on an on-going basis at pre-set intervals for preventive maintenance. For example, the
ETX-202A installed at Headquarters (MEP #1 in EVC1) can be configured to send 802.1ag CC
messages to the RICi unit installed at Branch A (MEP #2 in EVC1) every 1 second, and to check for
incoming CC messages sent at that period. Loss of continuity (LOC) is declared if no CC messages
are received from MEP #2 within 3.5 seconds (3.5 times the transmission period), at which point
MEP #1 activates the RDI flag in the next CC message to MEP #2 to indicate connectivity problem. It
also notifies the user and sends an alarm to the network management system (NMS), so that the
remote MEP can initiate an uplink connection switchover.
4.2.2 Fault detection and diagnostic loopbacksRemote diagnostic loopback tests are performed on-demand at service turn-up and, once the
service is running, to enable quick isolation of problems and minimize false repair calls. This can be
done at port-level (Layer 1) according to 802.3-2005, by testing two physically connected
elements, such as the ETX-202A at Headquarters and the provider edge (PE) device to which it is
connected. When using EFM OAM, an OAM entity (e.g. the PE) can activate an out-of-service
loopback mode in a remote entity (e.g. the ETX 202A), whereby every frame received by the ETX
202A is transmitted back on that same port except for OAM control frames so that the device can
exit the loopback state. EFM OAM loopback messages cannot be forwarded by Ethernet bridges and
are therefore limited to single links.
Loopback protocols can also be executed in-service, to analyze service connectivity across EVCs
without taking the customer link down or affecting untested traffic. For example, a customer
service representative (CSR) working a Trouble Ticket relating to EVC2 can generate an end-to-end
flow loopback test between the ETX-202A at Headquarters and the LA-210 at Branch B. The
procedure is selective and executed per a variety of flow criteria, including VLAN ID, class of service
(P-bit) and source or destination MAC or IP address. This allows the loopback messages to traverse
multiple hops, including intermediary switches or bridges, without disrupting the traffic flows thatare not being tested.
-
8/2/2019 8733 Ethernet SLA App Guide
39/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 37
The receiving device LA-210 swaps the source and destination MAC addresses of incoming
packets prior to looping them back, so as not to create a conflict in the switches or bridges along
the path. End-to-end loopback tests can also be performed for Layer 3 services, in which case the
receiving device swaps the IP addresses.
Figure 19: OAM loopback tests in Layers 1, 2 and 3
The test setup procedure includes such user-defined parameters as the MAC address of the tested
device, preferred testing standard, test run-time, and other relevant metrics. If a connectivity error
is detected, i.e., the LA-210 does not respond within a specified period of time, the CSR would
locate the failure point by attempting to loop another device in the path, or by sending a Link Trace
request for hop-by-hop path tracking, to identify non-responsive maintenance intermediate points
(MIPs).
The test results detail loss and error rates (BER) for the loopback frames, as well as round trip
duration and delays. These metrics help determine the service performance and connection quality,
as described in further detail in section 4.2.3. The Link Trace test results display the responsive
nodes, enabling the CSR to map the service path, pinpoint problematic MIPs and dispatch a
technician to the right location for a quick repair. Alternatively, the CSR can use the 802.1ag
Loopback test to isolate faulty MIPs, by looping successive intermediary points until the fault is
identified.
Table 12 summarizes the various Loopback methodologies and their main capabilities.
-
8/2/2019 8733 Ethernet SLA App Guide
40/44
Application Guide: Ethernet SLA Support Tools
38 2009 RAD Data Communications Ltd
Method L1 PHY IEEE802.3-2005(802.3ah)
IEEE802.1ag ITU-TY.1731 L2 LB withMAC Swap L3 LB withIP AddressSwap
In-Service/Out-of-Service(OOS)
OOS OOS In-Service In-Service In-Service
+ OOS
In-Service
+ OOS
Performedat Line Rate X X
Performedon ActualData X X
Per Flow(Incl. CoS) X X X X
TraversesL2 BridgedNetworksX X
TraversesL3 RoutedNetworks
X N/A N/A N/A N/A
Mechanism ViaManagement
Console
802.3ah LB 802.1ag
LB
Y.1731 LB Automaticper MACAddress
Automaticper MAC, IP
Address
Standard X X
Table 12: Loopback Tests Comparison
-
8/2/2019 8733 Ethernet SLA App Guide
41/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 39
4.2.3 Performance monitoringThe demarcation devices at the various enterprise locations perform proactive performance
measurements for the EVPL service on an on-going basis. By analyzing the measured data, the
devices calculate and report standard performance metrics per class of service flow, including
Y.1731-defined latency, jitter and packet loss.
Frame Delay (latency): Tests the travel time across the network for delivered frames andmeasured end-to-end as the customer views it, i.e., between ingress UNI-N (network side
of the UNI) and egress UNI-N. The test measures the elapsed time between the start of
transmission of the first bit of a time-stamped Delay Measurement (DM) frame at a source
MEP (e.g. ETX-202A at Headquarters), and the arrival of the last bit of that same frame at
the destination (e.g. RICi at Branch A). The receiving MEP then compares the time-stamp to
its own reference clock and calculates end-to-end transmission delay. Unidirectional delay
measurements require that both MEPs are synchronized. Alternatively, frame delay can be
measured on a round-trip basis, by analyzing the difference between the transmit time
stamp in a DM message and the receive time stamp of the DM reply that was returned to
the originating MEP.
Frame Delay Variation (jitter): Measures the variation in frame delay by comparing the timeinterval between consecutive frames belonging to the same CoS flow at the ingress UNI to
the delay in arrival of the same frames at the egress UNI. In round-trip delay variation
calculations, FDV is defined as the difference between two consecutive frame delay
measurements at the same MEP.
Frame Loss: Uni-directional (dual-ended) frame loss ratio is determined by analyzing thecounters for sent and received CC messages at the service end points and measuring the
number of lost/discarded frames out of all frames that should have been delivered within a
specified time interval. Bi-directional (single-ended) frame loss ratio measurements refer
only to the initiating device and involve the exchange of Loss Measurement (LM) messages
and LM replies.
The ETX-202A, RICi and LA-210 record minimum, maximum and average values for delay and delayvariation, together with the rate of frame loss and the number of seconds during which the service
was unavailable all for a pre-set interval. Performance statistics are collected and sent periodically
to the service providers NMS to deliver an up-to-date account of service quality, as well as an
historical view of network and service behavior, without over-taxing the network with excessive
-
8/2/2019 8733 Ethernet SLA App Guide
42/44
Application Guide: Ethernet SLA Support Tools
40 2009 RAD Data Communications Ltd
management traffic. This enables both provider and customer to easily evaluate actual performance
over time and compare it to SLA guarantees.
The continuous monitoring of KPI for multiple MEPs and flows simultaneously allows the service
provider to detect degradation in service quality and to take remedial actions to quickly restore
appropriate performance levels.
When the counters of any of the tested parameters rise above or drop below pre-set thresholds
within the specified sampling period, the demarcation devices send SNMP traps to notify the
associated management station,and update the event log for future reference.
4.2.4 Throughput measurements (RFC 2544)The Internet Engineering Task Force (IETF) standard RFC 2544, Benchmarking Methodology for
Network-Interconnect Devices, defines out-of-service testing procedures for evaluating the
performance of network devices, among which are network throughput measurements. These allow
the service provider to baseline service performance and determine the available bandwidth for
each EVC, by establishing the maximum transmission rate at which no packets are dropped.
Throughput measurements can be conducted from the providers NOC (network operations center)
using a test head device, or initiated by the ETX-202A at Headquarters, starting at the service
hand-off point and testing every network element along the service path. RFC 2544 outlines a set
of frame sizes for which throughput measurements are conducted, including 64, 128, 256, 512,
1024, 1280, and 1518 bytes, as well as Jumbo Frames. This helps pinpointing the processing delays
caused by short frames and identifying network equipment that is having trouble handling larger
packets. Based on packet receive-rate results, the service provider can also determine the maximum
packet length that can be offered to the enterprise with SLA guarantees, after calculating frame
extension allowance for headers, SP-VLAN tags and other overhead.
-
8/2/2019 8733 Ethernet SLA App Guide
43/44
Application Guide:Ethernet SLA Support Tools
2009 RAD Data Communications Ltd 41
ConclusionAs Ethernet technology progresses, it presents telecom providers with opportunities to tap into a
rapidly growing market and improve their competitive advantage by offering business clients new
customized services at a higher speed and lower cost. Key enablers for achieving these goals are
carrier-grade demarcation devices equipped with service delivery and service assurance capabilities.
This application guide reviews the various tools carriers and service providers can utilize to ensure
business-grade performance for Ethernet services and to meet enterprise expectations for service
reliability, measurable KPIs and SLA guarantees. By executing sophisticated traffic management
schemes and standardized testing procedures right off the user premises, carriers can also manage
their network resources smartly and lower their spending on equipment and operations.
-
8/2/2019 8733 Ethernet SLA App Guide
44/44
North America HeadquartersRAD Data Communications Inc.900 Corporate DriveMahwah, NJ 07430 USATel: (201) 529-1100,Toll free: 1-800-444-7234Fax: (201) 529-5777
il k d
International HeadquartersRAD Data Communications Ltd.24 Raoul Wallenberg St.Tel Aviv 69719 IsraelTel: 972-3-6458181Fax: 972-3-6498250E-mail: [email protected]
d
www.rad.com