We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byPaola Starks
Modified about 1 year ago
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © G Operator experiences: Methods to maintain a good reputation 4GWE Miami, Feb 2010 Friday - 2/4/10. 10:15-10:50am
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 VSS Corporate Profile VSS Monitoring, Inc. is the leading innovator of Distributed Traffic Capture Systems™ and Network Taps Founded 2003 Headquarters San Mateo, California 90+ employees worldwide Channel focused (40+ International Resellers) Technology alliances with major system integrators and analyzer OEMs Japanese office opened Q China office opened Q UK office opened Q Offices in New York and Washington, D.C.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 TelecomEnterpriseGovernment Customers Partners Customers & Partners
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Agenda Session premise Surmounting the 3G carryovers, incorrectly dimensioned backhauls, loss of critical debugging packets, issues with SPAN ports, the expense of 10G tools, aggregation of traffic between 1G/10G networks, detecting microbursts – just some of the operational experiences coming to light from the recent rash of 4G deployments across the country. In this talk, Andy Huckridge will take you through many of the initial deployment issues and shed light as well as methods to maintain a good carrier reputation in a confusing 4G world. Discussion Q&A
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 What are the challenges along the road ahead? Flattening of network = New network entities / protocols Real time access to user plane & control plane Increasing number of proprietary monitoring systems Network Complexity Multiple-4G architectures proposed for IMT-Advanced 3.5G, LTE, WiMAX, LTE-Advanced, IMS, Femto… Circuit Telephony migration to Packet LTE network Evolving Standards CAPEX / OPEX constraints Revenue / Traffic growth not aligned Revenue opportunities through sophisticated SLAs Economics 3 rd party overlay IP services beyond operators’ control New monitoring requirements to ensure QoE / QoD Rapid troubleshooting / report / repair End User Experience Corporate compliance (e.g. SOX) Lawful interception Security & Compliance
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Learning the lessons from the past. Real life 3G deployments Case Studies
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Case Study: 3G/UMTS Network Protocol Analyzer Gn/Gi SMS/MMS Probes Forensics / Recorder VoIP (media) VoIP (Signaling) Challenges: IMS/Triple/Quad Play. Capture traffic from multiple locations for proactive QoE monitoring and signaling analysis VSS Solution: Centralized Monitoring via selective aggregation and session-aware load balancing. Custom filtering for each monitoring system to receive only the traffic of interest Results: Reduced total monitoring CAPEX / OPEX by 70% Reduced number of analyzer from 100 to 14 Improved visibility to voice quality and error Simplified architecture Challenges: IMS/Triple/Quad Play. Capture traffic from multiple locations for proactive QoE monitoring and signaling analysis VSS Solution: Centralized Monitoring via selective aggregation and session-aware load balancing. Custom filtering for each monitoring system to receive only the traffic of interest Results: Reduced total monitoring CAPEX / OPEX by 70% Reduced number of analyzer from 100 to 14 Improved visibility to voice quality and error Simplified architecture
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Case Study: Chinese Mobile Operator / GPRS Challenges: Solution to monitor SS7, WAP, MMS, SMS and other IP data Previously installed competitors low end low density taps, unable to scale as services expand Customer behavior analysis Monitoring cost out of control Capacity planning of SS7 and data links VSS Solution: High density intelligent 10/100 taps Aggregation taps from multiple locations to consolidate and centralize signaling analysis Custom filtering to MMS, SMS and Sigtran/SS7 monitoring Results: Reduced capture cards ratio by 600% Reduced MMS failure rate down to 1% Provided additional port capacity to scale future tools and across provinces Eliminated use of SPAN ports
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 The Visibility Problem Network Monitoring 2.0
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Network not fully visible: Network Monitoring 1.0 Situation Tools and probes are deployed across many interfaces Access by SPAN or basic network taps Different tools for different IP services (VoIP, IPTV, user/control plane, protocol analyzer, SLA mgmt, IPS/IDS, DPI, etc.) Challenges Physical access / blind spots Network complexity High management overhead CAPEX / OPEX – management overhead Tools scalability / performance (1G / 10G) Fragmented monitoring creates further performance and complexity problems.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 What is the visibility problem? Services create revenue only if they are deployed… Monitoring is essential to make sure the services stay deployed... Deployed solutions are increasingly complex. Traffic on hockey-stick growth curve. Slow to troubleshoot, manage and monitor change. Proliferation of monitoring tools create physical access contention to SPAN ports. Traffic volume at high speed (e.g. 10G) exceeds tools capacity. Management cost out of control even as IT budget shrinks. Network monitoring must be pervasive across different physical networks and all network layers.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 The new paradigm: Network Monitoring 2.0 Decouple analyzer tools from communication infrastructure Centralized “tool farm” Dramatic tools reduction Views not stovepiped: Ends 1:1 relation between network link and monitor tool A traffic capture layer provides universal network access for all tools Single intelligent layer for all traffic capture needs. Distributed intelligence & redundancy Front end traffic grooming / pre-processing for tools increases tool utilization Reduce or eliminate contention for SPAN ports Simplified & centralized management Monitoring Systems Distributed Traffic Capture Layer Network Infrastructure
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Solving many of the 4G deployment issues Getting to the details
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Issues tapping gigabit copper Brand damage Surmounting 3G carryovers Incorrectly dimensioned backhauls Loss of critical debugging packets Issues with SPAN ports The expense of 10G tools Aggregation of traffic between 1G/10G networks Detecting microbursts Net Neutrality What are the 4G issues we see today? Hockey stick increases in data growth on mobile networks CAPEX / OPEX constraints. User Equipment issues (most notably with the iPhone) Network issues, most notably with the Backhaul, support of multiple networks and access to debugging information Monitored traffic not being evenly distributed between analytic / analysis tools of the same time type SLA adherence
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Intelligent routing and self-discovery Redundant mesh architecture Self-acting failover Routing for highest-speed low latency (multi and optimal) vStack+™ Intelligent Stacking Intelligent Data Routing: Redundancy, Scalability and Assurance High-bandwidth Central network vantage Highly scalable Scalable system. Self-healing mesh. Unmatched capability
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Session-Aware Load Balancing Even distribution of traffic across multiple links Highly granular balancing (10 criteria) Maintain session consistency Fault-tolerant Distribute Traffic Across Multiple Tools Per IP Session Monitor 10G networks with existing tools Fully leverage Gigabit tools Prevent oversubscription on monitor ports
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 vAssure™ Hyper-fast switchover 30-60ms typical Registers as noise Won’t trigger spanning tree No configuration required Built-in to all VSS copper Gigabit taps Solves failsafe monitoring & inline dilemmas Copper Gigabit Failover Fail-safe Prevents network downtime Time sensitive apps uninterrupted
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Aggregation / Selective Aggregation Input traffic to monitor output control One-to-multiple network ports to one-to-multiple monitor ports –1-to-1 –1-to-Many –Many-to-1 –Many-to-Many Reduce costs Improve efficiency of tools Reduce number of monitor interfaces required Monitoring Tools Work Best With The Correct Traffic
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Hardware-Based Filtering User-defined traffic of interest User-customizable Custom offset filters Tunneling applications Layer 2-7 filtering VLAN, QoS, IP Service Type UDP/TCP/ICMP –port, range MAC and IP –source, destination Selectively Forward Only Traffic Of Interest To Tools Reduce Costs Ultra-Low Latency Line-Rate Monitoring
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Ingress time stamp and ingress port stamp NTP, GPS and moment-of-ingress time stamp support 9 bytes added at the end of payload for time and port information Time Stamp: 8 bytes after payload Port Stamp: 1 byte after payload CRC recalculated Only visible to monitor ports Time and Port Stamping Support Accurate Ingress Information At Packet Level Scalable packet arrival information Link-level forensics data Track latency propagation
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 GTP Balancing GPRS Tunneling Protocol Balance GTP traffic Send traffic to multiple user-selected monitor ports Based on GTP Tunnel ID (TEID) Balance GTP traffic across multiple analysis tools Keep GTP session / tunnel packets together for same tool
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 GTP De-Encapsulation Remove GTP Encapsulation Strip GTP headers before passing packet to monitor port Per port GTP De-Encapsulation Enable Load Balancing & easier Filtering on GTP payload content Allows tools without support for GTP, to analyze GTP traffic More easily filter GTP traffic based on payload content Balance GTP traffic based on other criteria
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 vSlice™ - Conditional Packet Slicing Truncate packets User-customizable offset and protocols Multiple ports Monitor Tool Over-Utilization And Data Privacy Regulations Reduce traffic load to monitor tools Remove user information before reaching monitor tools Increase monitoring efficiency / reduce costs
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Identifies and provides bit-level metadata Sub-millisecond network utilization statistics Identify network microbursts / peak utilization Minute by minute FTP reporting capability vCapacity™ – Capacity Planning Network Blind Spots - Microbursts Accurate view of network bandwidth issues / requirements Identify location of problems in real-time
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 VSS Value Proposition Distributed Traffic Capture Systems: Network Monitoring 2.0 is a Paradigm Shift – Monitoring no longer an afterthought Strategically addresses the company’s bottom line Best price-performance in the market Flexibility and scalability across all IP networks Grow solution as your need grows Visibility Performance Economics Revenue stream stability Shorter MTTR Reduced churns Reduced complexity Faster ROI Greater application / network performance Ultra low latency Enhanced QoS/QoE Achieve SLA goals Tools optimization Centralized monitoring Network forensics and security Lawful intercepts Deep packet inspection Find problems fast
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Summary VSS is committed to addressing the 4G / LTE challenges. Network Monitoring 2.0 delivers a sustainable and strategic network management strategy to LTE. Best price- performance solution in the market. VSS is committed to addressing the 4G / LTE challenges. Network Monitoring 2.0 delivers a sustainable and strategic network management strategy to LTE. Best price- performance solution in the market. Technology leader in distributed traffic capture. 180+ product portfolio Flexible, scalable and reliable solution, with no single point of failure Technology leader in distributed traffic capture. 180+ product portfolio Flexible, scalable and reliable solution, with no single point of failure VSS brings a breadth of experience and capabilities to help Service Providers, Enterprises and Government agencies with their mission- critical network data Vision Innovation Partnership
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009 Thank-you Closing thoughts… From years of experience in this area, the industry’s best known & respected NEMs / Operators continue to put the most in to testing of products / services and in to operational capability & maintenance. There is a direct correlation between positive brand awareness, sales and bottom line revenue growth when this strategy is employed.
1 Making Networks Smarter. Trends Everything is moving to the network –Telephony –Video –Web services (and further.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
IT’S HERE Bandwidth Technologies. Agenda Technologies for Bandwidth –Single Location DSL/Cable T1/Bonded T1 DS3/OC-N Ethernet Over Copper (EoC, EoFM)
Simplifying Cloud Connectivity for Your Clients Presenter: Tom SharkeyTom Sharkey December 8,
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Non-Intrusive Out-of-Band Network Monitoring Utilizing a Data-Access Switch April 1, 2008 Patrick.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
May l Washington, DC l Omni Shoreham SaaS Market Opportunities Jerry Champlin Chief Executive Officer Absolute Performance Inc. Enabling Today’s.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
© 2014 Gigamon. All rights reserved. 1 It’s What You Can’t See That Will Sink You Enhance Network Security and Increase Your Visibility.
Juniper Networks CONFIDENTIAL 1 MIGRATION FROM SCREENOS TO JUNOS BASED FIREWALL PRESENTER NAME JULY 2014.
Net Optics, Inc. - Proprietary Director Pro™ Overview February 2010.
TELEPHONE MAN OF AMERICA Earning Your Business Every Step of the Way! Specializing in Telecom Equipment of all Brands, Carrier Services, Technician Services,
Creating Business Impact | Providing Expert Solutions | Delivering Quality Consistently | Building Partnerships Globally Presented by: Vidyalankar Nidamarthy.
Visibility Fabrics for Measurement, Management and Security.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
1 © 2006 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Technology Enabling the Avaya Vision Technology Enabling the Avaya Vision.
C ONFIDENTIAL July COM and LineSider bring OverDrive to Managed Service Providers.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Case Study: The ROI of SIP Trunking Date:Tuesday 2/3, 8:30-10:00am Track: SIP-05 –SIP Trunking Room: B114 / B115.
1 Copyright © 2013 Tap DANZing with Arista Networks Redefining the Cost of the Access Layer.
1 ® Adtran, Inc All rights reserved Proprietary and Confidential 1 ® Adtran, Inc All rights reserved Cost-effectively Positioning Your Network.
Smart Buildings Srirangarajan Kadaba National Manager – Energy Edge Buildings Business Schneider Electric 21June 2010.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
1 EMC CONFIDENTIAL—INTERNAL USE ONLY EMC’s End-to-End Capabilities for Microsoft EMC helps you successfully plan, design, deploy and manage your Microsoft.
Chapter 1 LAN Design LAN Switching and Wireless – Chapter 1.
Amdocs Services Reach New Heights of Success For more information: Pages/services.aspx
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
Innovative and Unique Solution for EOE – RAISECOM.
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FIREEYE NX IN LINE SOLUTION Dennis Carpio Sr. Director Business Development Xceed Technology.
Motorola Mobility Services Platform Management Software: Stage Edition.
The Eyeblaster ACM Advertising Campaign Management.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco IOS IP SLAs, Technical, 11/04 Cisco IOS IP Service Level Agreements An Overview Assuring the Delivery.
It’s a Mixed Up World Deploying Unified Communications and Collaboration in Mixed Environments David J. Wippich Chief Executive Officer Ensim Corp.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
© 2017 SlidePlayer.com Inc. All rights reserved.