Presentation is loading. Please wait.

Presentation is loading. Please wait.

INFINITY Training Partners 2011

Similar presentations


Presentation on theme: "INFINITY Training Partners 2011"— Presentation transcript:

1 INFINITY Training Partners 2011
Agenda Session 1 Technology Trends Session 2 Broadband as a New Standard Quality of Connection Services Session 3 Market and Regulation Direct and Indirect Technology Implication Implication of Technology for The Economics of Overall Market Structure Session 4 Market and Regulation (cont’d) Implications of Technology to the Regulations Summary of Regulatory Implications Session 5 The New Convergence Services Session 6 New Regulatory Paradigm INFINITY Training Partners 2011

2 TELECOMMUNICATION IN THE NEAR FUTURE:
Technology Trends The Impact of Advance Technology to the Market and Regulation

3 INFINITY Training Partners 2011
Agenda Telecommunication Technology Basic Technological Changes The Internet Mobile Communication Next Generation Networks (NGN)/IP Multimedia Subsystem (IMS) Convergence Information Society Technologies Cloud Computing INFINITY Training Partners 2011

4 1 Telecommunication Technology
INFINITY Training Partners 2011

5 “Tomorrow’s cell phone will entertain, amaze - and even make calls” (Fortune Magazine, October 2006)
Live TV Channels Live TV broadcasts Health and Fitness Monitor your heart rate Tagging Share your favorite restaurant with friends Personal Identification Gain access to data Digital Wallet Mobile commerce Media Center Get connected with other in-home devices through Wi-Fi Source: Fortune / Samuel Velasco / 5W Infographics

6 HSDPA: 120 Commercial Operators
More Than 1 Billion People Have Access to 150 3G Mobile Broadband Networks Today Estimated 172 Million Mobile Broadband Subscribers EOY 2007 EV-DO: 77 Commercial Operators HSDPA: 120 Commercial Operators Source: CDG and 3G Americas (June 2007); 1 billion refers to combined estimated POPs coverage.

7 Telecommunication Business Pressure
Regulation Competitive Pressure High competition market Voice Revenue Decline new Telco Business models Approval for new services Limited tarif flexibility Frequency allocation New regulatory landscape Cyber Acces Less Regulated Operator Telco Technology Pressure Life Style Pressure Disruptive technology Fenomena: Skype, Yahoo.. Multiple Network platforms Changing customer expectation Easy to use 3

8 Industry Trends

9 Industry Trends

10 Industry Trends

11 Customer Needs Simultaneous Phone + Internet Use
Faster Access to Maps, Directions, Directory Services Audio and Video Streaming Distance Learning Telecommuting Secure Transactions Telewebbing Simultaneous Phone + Internet Use Enhanced Graphics &

12 Source: BelAir Networks 2007
The Onslaught of Mobile Broadband: Wired Expectations in a Wireless World! Access Backhaul Traffic What it means! Voice Text, + Narrowband Mobile Internet Broadband Voice Data Dominant Dominant ARPU All About Voice Starts to All About Voice Commoditize Data Fractional T1s Demand for broadband is an opportunity & threat Dual mode (Wi-Fi, Cellular) is here to stay Carriers MUST deliver “true” broadband Source: BelAir Networks 2007 T1s Metro Ethernet Wireless Mesh Multiple T1s Microwave Broadband = huge backhaul demand Today’s cellular data networks won’t scale Circuit switched voice infrastructure declines Packet-based IP networks dominate True broadband is an economic imperative Mobility premium based on data experience Great companies will emerge from transition

13 Competitions You under attack !

14 The Cellular Carrier’s Dilemma
Traffic increases, but ARPU is flat! AT&T Wireless ARPU = $50 Source: Unstrung Insider, 2007 Source: AT&T Earning Results, April, 2007 Broad deployment of dual Mode handsets, led by the iPhone (and now RIM) will lead to: User dissatisfaction with a K “wireless dial-up” experience Users seeking & finding Wi-Fi alternatives to cellular data networks (e.g. iPass, Boingo, Muni WiFi, etc.) Wireless data ARPU at risk

15 Market Drivers Manifest Importance of Mobile Broadband
Traffic in mobile networks Source: ABI Source: GSM Assoc. WiFi Handset Users (000) 2004 2005 2006 2007 2008 2009 2010 FMC Users 50 204 1,294 7,479 17,494 32,272 46,795 Source: IDC, 2005

16 Wireless Broadband Evolution
Network Evolution Mobile Device Evolution Service Evolution All-IP Network For Fixed-Mobile Convergence (VoIP & data) Co-existence of Different Access Networks for Various Needs Coverage, Mobility, Capacity, QoS, Data Rates … Convergence of Communication, Computing & CE Platforms Multi-mode Devices Connect to Various Access Networks Service Requirements, Availability, Cost … User Behaviors Trend from Wired to Wireless Same Rich IP Apps and Services in all Environments Ubiquitous & Consistent Experience Desired

17 Network Evolution: The Right Technology for the Right Application
CDMA CDMA/TDM OFDM OFDMA LTE EV-DO REV B REV A REL 0 CDMA2000 1X UMB1 Rev 0 FLASH-OFDM Rev 1 FLASH-OFDM (Pre- UMB) HSPA + Rel-7 (Ph 1) Rel-8 (Ph 2) Rel-5 (HSDPA) HSPA Rel-6 (HSUPA) Rel-99 WCDMA Mobile WAN Technologies EV-DO Platinum Multicast GOLD WCDMA MBMS FLO/DVB-H Wide-Area Multicast Technologies Local-Area Technologies n (Full) 802.11n 802.11a/g 802.11b 2006 2007 2008 2009 2010 + 1999 1-UMB (Ultra Mobile Broadband), previously referred to as Rev C LBC

18 Device Evolution: Convergence of Communication, Computing & CE Platforms
Multimode devices supporting several air interfaces 3GPP, 3GPP2, GPS, FLO/DVB-H, Embedded WAN in CEs Handset acts as WAN gateway to CEs (via , UWB or Bluetooth) Continued advances of device capabilities New class of computers -- Ultra Mobile PCs Mobile microprocessors Dual CPU - Up to 1 GHz Multimedia 3D Graphics, camera, video, display, gaming, mp3 players Large storage capacity for personal media library Video, pictures and music Integration at silicon level for lower cost, improved form factor and increased battery life Memory MPROC 802.11, FLO DSP GPS 3D Graphics Video Audio Imaging WCDMA, CDMA2000, Ultra Mobile PC

19 Service Evolution: Same Rich IP Apps and Services in all Environments
User Trends Shift from Wired to Wireless Ever increased demand for more and higher quality video Users sharing content within a traditional fixed environment (wireless through the home) Place-shifting of content now accessible at all times and places with wireless Introduction of mobile real-time TV services via multicast technology Individuals becoming content creators Handsets now becoming media generation and storage devices Wireless connection to social networks allows users to express themselves anytime, anywhere User Generated Content on Social Networks

20 2 Basic Technological Changes
Digitalization Computerization Packet-based Switching INFINITY Training Partners 2011

21 2 Basic Technological Changes
1.1 Digitalization The development from analogue to digital is by far the most fundamental precondition for any other technological changes we have witnessed in recent years. Digitalization enables the integration of different services in the same network and enables synergy to be reaped in the whole value chain of service- production, distribution and consumption. Furthermore, digitalization enables expansion of resources in the access and core networks in a technical and cost efficient way. Three main technologies that have been important to realise digitalization of communication technologies and infrastructures: Compression Modulation Forward Error Correction (FEC) INFINITY Training Partners 2011

22 2 Basic Technological Changes
Compression Compression denotes the techniques and protocols that reduce the bandwidth necessary for transmission of a given signal. For example, there is a huge amount of redundant information in the analogue audio and video signals. These can be removed and, consequently, the amount of bits per second that must be transmitted will be reduced substantially. Compression technologies determine the digital bandwidth by making a trade-off between how much capacity is available and the quality of service that is needed. INFINITY Training Partners 2011

23 2 Basic Technological Changes
Moving Pictures Expert Group (MPEG) has developed three audio/video compression standards, widely deployed in development of audio video services: MPEG-1. Primarily intended for applications like computer images and graphics. MPEG-2 is used in digital broadcasting. MPEG-2 is intended to be generic in the sense that it serves a wide range of applications, bit rates, resolutions and services. MPEG-2 covers different picture resolution from Low Level (352X288) pixels to a very high resolution of 1920X1152 pixels, also called High Definition TV (HDTV) resolution. MPEG-4. Contrary to the MPEG-1 and MPEG-2, which are frame-based, MPEG-4 is object-based. MPEG-4 supports two-dimensional arbitrarily shaped, natural video objects as well as synthetic data. Synthetic data includes text, generic 2D/3D graphics and animated faces, enabling content-based interaction and manipulation. MPEG-4 is an important standard for the distribution of Digital TV to Handheld devices, and also for broadband IPTV and Video on demand (VoD). INFINITY Training Partners 2011

24 2 Basic Technological Changes
1.1.2 Modulation Modulation technology is used to transmit information, including audio and video signals, over different transmission media; the information is modulated on the carrier waves when transmitted, and demodulated at the reception point. In principle, the technology is used for both analogue and digital transmission, though the techniques used in digital modulation – where a stream of binary numbers must be transmitted – are different from those used in analogue modulation. Modulation technologies have expanded the transmission resources in all infrastructures, and particularly in the radio spectrum modulation and other technologies which improve the spectral efficiency or include new spectrum to be deployed in the ICT sector, have challenged the scarcity argument, which has been an important pillar for the regulatory design in the ICT market. In this relation, a number of other technologies like Software defined radio, Cognitive radio, smart antenna and the technologies  which use new spectrums (like the frequency range at 60 GHz and above) are important. INFINITY Training Partners 2011

25 2 Basic Technological Changes
1.1.3 Forward Error Correction (FEC) The signals that are received at the end users' site are often erroneous, particularly in the wireless environment, due to noise and multi-path interference in the transmission medium, among other things. These errors are experienced by the end-user as signal degradations, and consequently degradation of the quality of service. In the two-way communication networks, the problem of errors is often solved by retransmission of the signal. Another technology that can be used, when there is no return path to send commands up-stream and ask the source to retransmit the signal, or the timing requirements of the signal does not permit retransmission, is Forward Error Correction (FEC). FEC is implemented so that some overhead information is calculated and added to the signal prior to transmission. The FEC overhead information is then used in the decoder to detect and, if possible, correct the errors in the signal. An important issue regarding FEC is that a part of the transmission capacity is ‘sacrificed’ to reduce errors and increase quality, and the greater the capacity that is ‘sacrificed’ for the FEC overhead, the more secure the transmission. In practice, the level of FEC is determined by the characteristic of the transmission medium. INFINITY Training Partners 2011

26 2 Basic Technological Changes
1.2 Computerization Another vital fundamental development has been the deployment of computers in the production and consumption parts as well as within the network infrastructures. The role of computers in production and consumption parts is quite obvious, but seen in the light of the objective of this Toolkit, it is important to emphasize the role of computers in the development of network infrastructures, including the deployment of computers in the network nodes as a replacement for switches and as devices adding intelligence to the network nodes. Furthermore, the processing power affects the spectrum use and management. INFINITY Training Partners 2011

27 2 Basic Technological Changes
Development of computers has had vital influence on the effective organization and operation of network infrastructures. As end devices, computers act as intelligent terminals. The use of computers in the network nodes has reduced the cost of technology, network management, operation and maintenance. The processing power of computers and the new applications have had a radical impact on the ICT sector. On the one hand, the expensive and complex functions in the network, such as switching and Intelligent Network services, are done to a large extent by computers. On the other hand, computers have diffused in practically every function necessary for operation of an ICT network, such as billing and Human Resource Management. INFINITY Training Partners 2010

28 2 Basic Technological Changes
1.3 Packet-based Switching Packet switched technologies have had an important role in the more efficient utilization of the available resources in different network infrastructures and the creation of platforms enabling multi-service delivery in the same network, enabling real convergence. Different packet technologies have been developed with different advantages/disadvantages. Internet Protocol (IP) is the most successful packet-based technology and the dominant paradigm of today’s ICT infrastructures. INFINITY Training Partners 2011

29 2 Basic Technological Changes
Development from circuit switched to the packet switched paradigm is another important technological development. In a circuit switched network a dedicated connection (circuit or channel) is set up between two parties for the duration of the communication. The connection and therefore the network resources are occupied during the whole session. The Plain Old Telephone Service (POTS) network is an example of a circuit switched network. The problem with a circuit switched network is that the network resources are occupied even when they are not in use. For example, with regards to POTS, the network resources are occupied in the silence periods, resulting in inefficient utilization of network resources. Packet switched technologies, on the other hand, are designed to use the network resources only when meaningful data is subject to transport. Hence, packet switched networks utilize network resources more efficiently through bandwidth sharing.  Another aspect of packet switched networks is their capabilities in carrying different types of services. Many modern packet-based technologies like ATM and IP are designed to be able to carry different types of services; however, specific technologies/protocols must be implemented for different services. INFINITY Training Partners 2011

30 INFINITY Training Partners 2011
3 The Internet The emergence of the Internet, which interconnects billions of IP-based devices like computers to each other, may be seen as one of the most important changes in the ICT sector in recent times. The Internet was in the beginning primarily used for data services. and World Wide Web (WWW) were the most important services on the Internet. In further development, however, the number of services over the Internet has expanded, and today these include a variety of audio/video services like Internet radio and IPTV, Internet telephony (VoIP), blogs and computer games as well as various ICT applications (e-education, e-government, e-health, e-commerce, etc.). The next development we are witnessing is the emergence of ‘Internet of things’, which is mainly connected to the development of RFID technology and ‘sensor networks’. While a number of issues related to the organization of the general Internet are in place, there are a number of unsolved problems and challenges related to the ‘Internet of things’ which will be on the political agenda in the coming years. INFINITY Training Partners 2011

31 INFINITY Training Partners 2011
3 The Internet 2.1 Internet Protocol (IP) Internet protocol (IP) was first developed in the mid-1970s, when the Defense Advanced Research Projects Agency (DARPA) became interested in establishing a packet-switched network that would facilitate communication between dissimilar computer systems at research institutions. With the goal of heterogeneous connectivity in mind, DARPA funded research by Stanford University and Bolt, Beranek, and Newman (BBN). The result of this development effort was the Internet protocol suite, completed in the late 1970s. TCP/IP (Transmission Control Protocol/Internet Protocol) was later included with Berkeley Software Distribution (BSD) UNIX, and has since become the foundation on which the Internet and the World Wide Web (WWW) are based. The IP packets contain all the addressing information, which is necessary to be routed in IP networks. The IP routers transmit the IP packets within the network based on the destination address available in the IP packet in a connection-less manner. This reduces network complexity immensely. However, to provide services in the IP network, connection oriented protocols like TCP and UDP (User datagram protocol) must be implemented to establish a session and make sure that it functions properly. INFINITY Training Partners 2011

32 INFINITY Training Partners 2011
3 The Internet 2.2 Internet Design Principles IP technology is designed in a way that enables a radically different environment for service development, innovation and competition when it comes to infrastructure platforms and service development platforms. The wide spread success of the Internet is based on four important characteristics: Separation between network technology and services End-to-End architecture, and extension of intelligence from the core to the edge of a network Scalability Distributed design and decentralized control These characteristics of the technology create good conditions for development and competition where several actors can be involved in service creation and provision. INFINITY Training Partners 2011

33 INFINITY Training Partners 2011
3 The Internet 2.3 QoS QoS on the Internet is affected by a number of factors, including: Delay Bit Error & Packet loss Speech compression Echo Firewalls 2.4 Security In regular telephony services the security and consumer protection standards have been defined and are generally found adequate. With regard to the IP services, there is no one-to-one relation between the service and the physical infrastructure. In the IP networks, anyone with access to the network can tap the signal and actively damage the integrity of the message and the signal. For example, to ensure privacy in VoIP application, the VoIP provider can implement end-to-end encryption, which is not 100% secure, but can establish security levels comparable to those of regular telephony. INFINITY Training Partners 2011

34 INFINITY Training Partners 2011
3 The Internet 2.5 Mobility and Nomadicity Generally we can distinguish between two types of mobility: Terminal mobility: A mobile terminal can move around the network without disrupting the service; Personal mobility (nomadicity):  A user can move to different terminals and networks and still be connected. Terminal mobility requires a wireless connection, while personal mobility can be implemented without necessarily having wireless connections. 2.6 IPv6 The current Internet Protocol, which is primarily based on IPv4 (IP version 4) has had rapid growth both when it comes to the number of IP enabled devices and when it comes to applications and services. IPv4 suffers from major weaknesses when it comes to dealing with the rapid growth in the number of devices connected to the Internet and the new applications and services. This has resulted in the standardization of a new version of Internet Protocol, IPv6 (IP version 6) with 128 bits addressing to cope with the shortcomings of IPv4 with only 32 bits addressing. INFINITY Training Partners 2011

35 INFINITY Training Partners 2011
3 The Internet 2.7 Peer 2 Peer The Internet is traditionally based on a client-server approach. There are a number of servers in the networks doing specific tasks, such as server and web server. The end-users install clients on their IP terminals, such as computers, mobile phones and PDAs, and connect to the servers for specific services. There is, however, another approach that is used more and more, where the end-user's IP terminals act as both a client and a server. In this approach the IP terminals connect directly to each other and share information such as files. This approach is called Peer 2 Peer to indicate that the peers communicate directly with each other.  INFINITY Training Partners 2011

36

37 Why All IP Core Network

38

39 Why All IP Core Network

40 NGN (Next Generation Networks)
NGN is coming! Needs Seeds individuals Business Technologies ・Broadband/mobile gets popular ・network is now a part of life ・Opt/IP/mobile technologies ・Intl. standardization ・Expansion of biz-use net ・Emerges net-based business needs meets seeds NGN (Next Generation Networks) (Evolution of architecture and revolutionary services) Evolution of telecommunications FMC Telecommunication- broadcast convergence Evolution of enterprise networks Decrease of $/Bit Next generation Internet WEB2.0、RSS Lifestyle changes New business changes Network business leap Starting of new evolution

41 Expectation and changes of NGN
For personal users For enterprise For network providers Increase of usability Flourish of services Easy to use, with ease Simple/cheap Infrastructure of biz Biz.expansion base Adoption to new biz models Reliable/cheap Rebuilding of business New source of profit CAPEX/OPEX decrease Business area expansion NGN: enabling technology Revolution for layman/enterprise as well as network providers

42 Technological necessity of NGN
Does the Internet continue to evolve? The Internet created various applications thanks to the freedom of end-users. Does it apply to IPTV, Web 2.0, or FMC? Best-effort QoS: New applications are hard to develop Commercial quality real-time communications are difficult to provide TV conference, streaming, … Security/Reliability: Not carrier-grade Children/elders can’t apply patches everyday Mobility: the next bonanza will be in mobile gadgets Current (ordinary) IP assumes fixed network Discussions at Linux Symposium (2006)

43 Limitation from IP’s principle
router Principle of IP router TE router TE Routing table Packet (header + payload) Routing table are updated in local manner; no network-wide, no equipment-wide sync  scalable and cheap, but no QoS guarantee becomes possible No state in routers; minimize memory access  expandable and faster, but traffic engineering becomes unavailable Very limited functions in networks  interoperable ‘Internet Protocol’, but no security, no QoS-awareness The problems tightly linked with IP principle and merits

44 IP Design Philosophy: Main Goals
Effective multiplexed utilization of existing networks Packet switching, not circuit switching Continued communication despite network failures Routers don’t store state about ongoing transfers End-hosts provide key communication services Support for multiple types of communication service Multiple transport protocols (e.g., TCP and UDP) Accommodation of variety of different networks Simple, best-effort packet delivery service Packets may be lost, corrupted, or delivered out of order Distributed management of network resources Multiple institutions managing the network Intradomain and interdomain routing protocols Grosshauser (2002)

45 Characteristics of the Internet
The Internet is Decentralized (loose confederation of peers) Self-configuring (no global registry of topology) Stateless (limited information in the routers) Connectionless (no fixed connection between hosts) These attributes contribute To the success of the Internet To the rapid growth of the Internet …and the difficulty of controlling the Internet :< Grosshauser (2002)

46 Operator Philosophy: Tension with IP
Accountability of network resources But, routers don't maintain state about transfer But, measurement isn’t part of the infrastructure Reliability/predictability of services But, IP doesn’t provide performance guarantees But, equipment is not very reliable (no ‘five-9s’) Downtime: IP networks: 471min/year, POTS: <5min/year Fine-grained control over the network But, routers don’t do fine-grain resource allocation But, network self-configures after failures End-to-end control over communication But, end hosts adapt to congestion But, traffic may traverse multiple domains Grosshauser (2002)

47 We must make Operator-friendly IP networks
IP traffic > telephone traffic May 2006: 524Gbps (Public Internet in Japan) > 20%/year Fiscal 2004: 34.1Gbps (in Japan: converted 533k Erlang using 64kbps/call) > -5%/year IP must be the base of future networks NTT: trial starts by the end of fiscal 2006 KDDI: Fixed network becomes all-IP by fiscal 2007 BT: by 2008 Korea: long-distance is by 2007, local by 2010 Timeline

48 INFINITY Training Partners 2011
4 Mobile Communication The development of Mobile Technologies and Services in the last two decades has had massive implications on the ICT landscape. Mobile technologies enable mobility and flexibility in the use of ICT services. Mobile technologies have primarily been driven by voice telephony but in their development, they embrace the whole portfolio of converged services,  particularly when it comes to wireless standards and the new generation mobile technologies. The emergence of mobile communication has influenced the telecom regulation at all different levels. Licensing and frequency management have been the main regulatory issues for the introduction of mobile services. Furthermore, the regulatory design related to interconnection and tariff regulation, pricing, numbering etc. have been important in making a competitive and innovative mobile market to develop. Due to its ‘time to market’ and flexibility, mobile communication has been important in offering telephony to developing countries. INFINITY Training Partners 2011

49 INFINITY Training Partners 2011
4 Mobile Communication 3.1 Mobile Standards First Generation (1G) : The first generation mobile standards were based on analogue technology. Second Generation (2G): The second generation mobile standards are based on digital technology. Digital technology utilizes the transmission resources in an efficient way, both due to advances in audio compression standards and also due to advances in digital modulation technologies. Evolution of Second Generation (2.5G): To increase the available capacity at the end user’s site in GSM networks, two approaches are used: Deployment of several time slots. This is called HSCSD (High Speed Circuit Switched Data). Deployment of packet oriented IP based technologies like GPRS and EDGE. Third Generation (3G): The 3G platforms on the one hand include new frequency bands for the provision of mobile services, and on the other hand deploy more efficient technologies than 2G, resulting in increased spectral efficiency. INFINITY Training Partners 2011

50 INFINITY Training Partners 2011
4 Mobile Communication 3.2 Mobile Services Mobile services in the 1G and 2G are dominated by regular voice services, offered primarily in circuit switched network architecture. In the 2G, however, the SMS service has also been an important service. Furthermore, IP connectivity and Internet access have been the drivers of the development towards 2.5G and 3G. It is generally accepted, particularly in 3G, that the data and Internet type of services will dominate the 3G markets. The mobile services can be divided in two categories: Inter-personal communication services: These are the main services in the current mobile networks, with voice services as the absolute dominant one. Data and other communication services: These are primarily communication services between a service provider (or a workplace, machine or application) and the end-user. These services are developed rapidly on the Internet and the majority of them are based on IP protocols provided on the Internet and /or other IP based networks. INFINITY Training Partners 2011

51 INFINITY Training Partners 2011
4 Mobile Communication 3.3 Future Technologies So far in this section the development within the PLMN (Public Land Mobile Networks) has been analyzed.. Another important technological development which relates to PLMN as well as the new wireless systems is related to Software Defined Radio and Cognitive Radio. Software Defined Radio (SDR) is a flexible radio architecture programmed through software, which is reconfigured depending on the usage scenario. SDR consists of a programmable hardware base that is controlled through software, where different parameters, like power level, frequency band and modulation are changed/configured depending upon the environments in which users move. Cognitive Radio is a technology that could make efficient use of unused spectrum, potentially allowing large amounts of spectrum to become available for future high bandwidth applications. Most of today’s radio systems are unaware of their spectrum environment; they are designed to operate in a specific frequency band. A Cognitive Radio system senses and understands its local radio environment to identify a temporarily vacant spectrum to operate in. Cognitive Radio would hop into unused bands of the radio spectrum and hop out again if a primary user of a band required that spectrum. INFINITY Training Partners 2011

52 INFINITY Training Partners 2011
5 NGN/IMS 4.1 Definition ITU defines NGN as "a packet-based network” able to provide telecommunication services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport related technologies. It enables unfettered access for users to networks and to competing service providers and/or services of their choice. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users“. In this definition there is a major emphasis on one of the main characteristics of IP platforms namely the separation of network and service layers. INFINITY Training Partners 2011

53 INFINITY Training Partners 2011
5 NGN/IMS 4.2 The NGN Concept is mainly used in two ways: A broad concept encompassing the whole development of new network technologies, new access infrastructures and even new services, and A focused concept of specific network architecture and related equipments, with one common IP core network deployed for the entire legacy, current and future access networks. The first definition is so broad that in a sense it covers the whole current chapter on technological trends. The second definition relates to the transition path towards a converged IP-based core and access network.  In this report, the concept of NGN denotes the second definition. Here we distinguish between the Next Generation Core Network (NGCN) and Next Generation Access Network (NGAN). The NGCN is about the new switching, gateways and transmission equipments in the core network, enabling several access networks to use the same core network. The NGAN is about new access networks, like deployment of optical fibers, and the challenges derived from that. INFINITY Training Partners 2011

54 INFINITY Training Partners 2011
5 NGN/IMS 4.3 Next Generation Core Networks (NGCN) Today's Networks and Next Generation Networks INFINITY Training Partners 2011

55 NGN (Next Generation Networks)
NGN is coming! Needs Seeds individuals Business Technologies ・Broadband/mobile gets popular ・network is now a part of life ・Opt/IP/mobile technologies ・Intl. standardization ・Expansion of biz-use net ・Emerges net-based business needs meets seeds NGN (Next Generation Networks) (Evolution of architecture and revolutionary services) Evolution of telecommunications FMC Telecommunication- broadcast convergence Evolution of enterprise networks Decrease of $/Bit Next generation Internet WEB2.0、RSS Lifestyle changes New business changes Network business leap Starting of new evolution

56 Expectation and changes of NGN
For personal users For enterprise For network providers Increase of usability Flourish of services Easy to use, with ease Simple/cheap Infrastructure of biz Biz.expansion base Adoption to new biz models Reliable/cheap Rebuilding of business New source of profit CAPEX/OPEX decrease Business area expansion NGN: enabling technology Revolution for layman/enterprise as well as network providers

57 Technological necessity of NGN
Does the Internet continue to evolve? The Internet created various applications thanks to the freedom of end-users. Does it apply to IPTV, Web 2.0, or FMC? Best-effort QoS: New applications are hard to develop Commercial quality real-time communications are difficult to provide TV conference, streaming, … Security/Reliability: Not carrier-grade Children/elders can’t apply patches everyday Mobility: the next bonanza will be in mobile gadgets Current (ordinary) IP assumes fixed network Discussions at Linux Symposium (2006)

58 NGN: best mix of packet and circuit
"Service Stratum" for per-session control of packet transmission Data is transmitted with IP packet for interoperability All necessary functions are in the network (fat network approach) Operators can maintain every aspect of functions  increase reliability All the terminals can do is just to call network’s functions  increase security Control interface is open  promotes development of applications Video Services (TV, movie, etc) Data Services (WWW, , etc) (Any/All Applications Telephone Services e.g. voice , data , video) NGN service control functions Anything & Everything "Service Stratum" (Session control by using SIP, etc.) Scope Internet Protocol Of (IP) "Internet" NGN transport functions Everything (Any & All Network technologies) "Transport Stratum" (managed IP network) Hourglass model of IP ITU-T Y.2011 "General principles and general reference model for Next Generation Networks"

59 Key convergence enablers are Next Generation Networks which will replace the legacy core network with an all-IP based core Definition of NGN Access Network 3 Access Network 2 Fibre Wireless Copper Metro 2 Aggregation NGN From 3 to 2 layers Core 1 IP Core 1

60 Impact of Convergence and NGN on Regulations
Convergence and NGN could impact the regulatory value chain from policy making to regulatory levers Policies Governance Regulations NON EXHAUSTIVE Impact of Convergence and NGN on Regulations Sector Objectives: Economic Social Policy Impact Media vs Telecom Regulators Industry led (NGNuK) versus Authority-led Spectrum Numbering Interconnection QoS Content regulation Access Market definition Impact on Regulations Light Heavy

61 With convergence and NGN, new interconnection obligations could arise to address new bottlenecks
Interconnection under NGN Interconnection Routes NGN Interconnection Bottlenecks NGN Legacy Network Network capabilities (block, delay or degrade service) Elementary services (use of proprietary standards) Service access (Walled Gardens: restricting access to certain addresses and services) Control and user information (user authentication, location data, and other data to help resolve naming and numbers)

62 NGN and convergence will put even more strain on spectrum availability forcing regulators to optimize spectrum use Spectrum Management Requirements and Initiatives Convergence and NGN Spectrum Requirements EU Spectrum Management Initiatives Adopting technology development, i.e. smart radios Allowing primary licensees or spectrum brokers to lease spectrum rights to secondary users Registering the use of license-exempt spectrum such as WiFi to avoid overrunning capacity Re-farming spectrum held by users such as governments Trading spectrum (as per the EU Regulatory Package for Electronic Communications of March 2002)

63 Additional Regulatory Dimensions
Other regulatory dimensions would be impacted with the advent of convergence and NGN Additional Regulatory Dimensions Numbering Regulators should be ready for ENUM It will allow even more convergence and should be encouraged QoS NGN will allow more flexibility when defining quality of service parameters per client QoS obligations need to be revisited in light of this flexibility Access Access networks are evolving Legacy regulations might prohibit investments and hence delay faster networks Content Convergence and NGN will enable a wider and richer delivery of content over telecom infrastructures Content regulation will soon become quite relevant to telcos and hence need to be properly adapted 1 3 2 4

64 INFINITY Training Partners 2011
5 NGN/IMS 4.4 Next Generation Access Networks (NGAN) Due to the wide spread of the installed base of the PSTN physical infrastructure, PSTN has been the basis for fast and efficient development and penetration of the Internet. In the pre broadband phase this was implemented by modulation of data signal in the same frequency spectrum as regular voice in the copper access lines. The data capacity in this frequency bandwidth is small and it can reach the maximum of 56 kbps. The next phase was introduction of ISDN, which improved the capacity and could offer 128 Kbps to residential households. While dial up PSTN modems and ISDN have had enormous impacts on the development of Internet access, today the Internet connectivity is mainly influenced by different broadband technologies. The new IP broadband infrastructures are in the literature denoted as the New/Next Generation Access technologies (NGAN). NGAN covers both the fixed (wired), wireless and mobile infrastructures, which enable IP connectivity to the households and companies. The terms NGAN and broadband can be used interchangeably. These subjects will be describe in detail in session 2. INFINITY Training Partners 2011

65 Overview Teknologi IMS
IMS atau IP Multimedia Subsystem adalah teknologi arsitektur yang dapat mengakomodasi konvergensi dari semua jaringan wireless dan wireline dengan berbagai layanan voice, video dan data yang ditanganinya. IMS dikembangkan dengan standarisasi 3GPP dengan menggunakan teknologi berbasis Session Initiation Protocol (SIP) signaling dan Internet Protocol (IP) IMS merupakan core network dengan teknologi multiple access yang dapat terhubung ke semua jaringan berbasis IP

66 Overview Teknologi IMS
IMS dibentuk untuk mencapai tiga tujuan utama : IMS merubah paradigma jaringan telekomunikasi menjadi all-IP network. Perubahan ini menimbulkan tantangan bagaimana menyediakan layanan yang aman dan terjamin pada IMS 1. Mencapai QoS 2. Charging dan Billing terintegrasi 3. Jaringan terintegrasi

67 Arsitektur Jaringan IMS
1 Service Layer 2 Control Layer 3 Connectivity Layer

68 Arsitektur Jaringan IMS
1 Layer yang berisi aplikasi dan content server untuk menjalakan layanan Value Added Services kepada user. Diimplementasikan sebagai SIP Application Server. Service Layer 2 Layer yang berisi network control servers yang berfungsi untuk mengatur call, session, release, charging, operation and maintenance, dan modifikasi. Komponen paling penting dalam layer ini adalah CSCF (Call Session Control Function) Control Layer 3 Layer yang berisi komponen yang terhubung langsung secara fisik kepada jaringan lain seperti 3G, WiFi, LTE, dan PSTN Connectivity Layer

69 Arsitektur Jaringan IMS

70 Jaringan inti IMS berada pada CSCF (Call Session Control Function)
Jaringan inti IMS berada pada CSCF (Call Session Control Function).Kerja CSCF dibagi lagi menjadi 3 yakni : S-CSCF (Serving-CSCF) merupakan sentral yang melayani semua sesi dari IMS. P-CSCF (Proxy-CSCF) merupakan interface external IMS ke client user (jaringan dibawahnya). I-CSCF (Interogatting-CSCF) merupakan interface external ke jaringan IMS yang lainnya (mengatur roaming dan inter-carrier calls). HSS (Home Subscriber Server) berisi database user, konfigurasi, dan database home subscriber dari S-CSCF. SIP-AS (Session Initiation Protocol –Application Server) berisi aplikasi layanan yang dilayani oleh jaringan IMS SLF (Subcription Locator Function) merupakan database yang menjembatani HSS antar jaringan IMS. Akan berguna kalau terhubung ke jaringan IMS yang lainnya. MGCF (Media Gateway Control Function) merupakan gateway yang menghubungkan jaringan berbasis non-IP (Circuit Switching) ke IMS. Contoh : PSTN

71 INFINITY Training Partners 2011
6 Convergence The Traditional Broadcasting and Telecommunication Industries have co-evolved with the Developing Internet, but the technological development is making this current sectoral distinction un-sustainable. Content and service provision has already taken place across the traditional sectoral boundaries for some time. Different services can be carried on different infrastructures and the end users’ access equipment will be designed to communicate with different services. This process of fusion of content, service, infrastructure and end user equipment is denoted as convergence. INFINITY Training Partners 2011

72 Convergence Definition
ICT Regulation Tool-Kit Fusion process of content, service, infrastructure and end user equipment

73 Convergence Impact (1) Paradigm Changes

74 Convergence Impact (2) Changing of Lifestyle
People get connected everywhere and anywhere without  dynamic community without limitation Implication for Business Big opportunity for small company to provide services Networks and services investment smaller than today New services could be brought to the market faster and cheaper Competition become tighter Changing in Regulation Mindset In Business, resources, consumer Protection, USO

75 INFINITY Training Partners 2011
6 Convergence Convergence Process INFINITY Training Partners 2011

76 Telecommunication Convergence

77 Telecom Convergence Definitions
Taken from: Nokia Service Delivery Framework Convergence Electrical Engineering Department – Universitas Indonesia

78 Convergence Background
Convergence is driving telecommunications into an open, “horizontal” IT model Electrical Engineering Department – Universitas Indonesia

79 Convergence Background
NGN revolution is driving convergence of underlying infrastructure Electrical Engineering Department – Universitas Indonesia

80 Convergence Drivers

81 Market Drivers New Entrants New Entrants Mobile Operators
Traditionally push new services and capabilities to the consumer Need to retain market share and reduce customer churn Retain enterprise mobile phone access revenue at off-net rates WiFi threatens service revenue to carriers that operate over unlicensed bandwidth Already offering “triple play” service over their broadband cable networks. A wireless element could increase share of consumers’ telecoms spend through Partnership with a mobile operator (Sprint Nextel Cable and Wireless Joint Venture), Deployment of their own broadband wireless access technology, such as WiFi Mobile Operators Cable Operators IP Convergence Yahoo, eBay… New Entrants Google, Microsoft… Wireline Broadband Carriers New Entrants Integration of innovative, revenue-generating IP-based service bundles Already own the enterprise relationship Win back fixed minutes lost to mobile operators Deployment of centralized presence capabilities for multiple applications

82 Elements of Convergence
Device Convergence Identity Convergence ID Fixed phone number Mobile phone number SMS IM Network Convergence WiFi Landline Cellular WiMax Seamless in - call handoff Service Convergence Data, voice, video, multimedia One contact list, calendar and voice mail Single sign-on, multiple devices and applications Centralized presence status (online, busy, offline) for all applications and devices The Convergence I’m describing comprises four distinct yet interrelated domains -- each domain, and the individual elements build upon the other to create a holistic end-to-end converged service environment - - any device. any service, at any location, at any time. Device convergence addresses the convergence of devices – for example a single converged phone and PDA for business use Network Convergence: “Roaming” (Seamless in-call handoff) occurs between wireline and wireless networks while maintaining seamless application functionality in the most cost effective manner (access via LAN, WAN or off-net provider based upon availability) and using your device of choice. Identity Convergence: Identity convergence allows the end user to utilize one phone number, one voic , one contact list, etc. for all of their business uses - on the device and network of choice. Service Convergence: Voice, Data, and Multimedia services can now be delivered seamlessly across devices, via wireline and wireless access networks, with centralized identity and presence management information. This provides a very powerful combination of information and capabilities. End user profiles can now be managed with presence awareness that includes each users availability by device(s), network(s) and/or application. Some materials from Gartner Group

83

84 INFINITY Training Partners 2011
6 Convergence 5.1 Mobile Broadcast Convergence One of the main challenges that the mobile industry faces is the demand for increased broadband capacity that is necessary to distribute video, music, games and other digital content optimally to many mobile users at the same time. Parallel to this, the broadcast industry faces a decisive challenge in personalizing content and segmenting channels ttowards a still more fragmented market hat, apart from digital TV and radio, includes the Internet, which must be accessed through mobile terminals. In particular, young people have their requirements for content and communication through the Internet and mobile services covered, while their consumption of the traditional TV-media is correspondingly strongly reduced. This has caused broadcasters to look for new ways to target this mobile segment by offering streaming of video and music over the net and at the same time to integrate mobile SMS services, thereby creating interactivity in relation to existing radio and TV program platforms. INFINITY Training Partners 2011

85 INFINITY Training Partners 2011
6 Convergence 5.2 Fixed Mobile Convergence Fixed Mobile Convergence or Integration, FMC or FMI is a broad concept that covers various ways of integration of mobile and fixed (wired/wireless) technologies and services. FMC is not a new development and several FMC services have been on the market for the last five to seven years, but new technological and market developments have created new incentives for further development of FMC services and creation of new types of FMC services.  There are different reasons for the emergence of these services: A high proportion of mobile calls are made from the home and office environment. At the same time the fixed operators are losing voice minutes and want to reallocate some of their traffic from mobile to their fixed network. When it comes to data capacity mobile networks are lagging far behind the fixed networks. Hence it is much more efficient to connect to the fixed network when it is possible. VoIP is gaining momentum and many broadband operators offer VoIP services. Integration of mobile telephony and VoIP over broadband opens up new possibilities for competition in the Voice market. INFINITY Training Partners 2011

86 INFINITY Training Partners 2011
6 Convergence 5.3 Converged Services Services like VoIP and IPTV are important drivers of future ICT infrastructures. VoIP VoIP is an application that uses IP infrastructures, including the Internet to transmit voice telephony from point A to point B. IPTV For a number of years, Video and Audio services have been distributed within the IP-based network, including the Internet, using streaming technologies or by downloading the video/audio materials. IP TV/radio denotes the delivering of TV/radio over IP protocol. IPTV can be transmitted in different networks that are based on the IP protocol. One of the major IP networks is the Internet, but Internet is not the only IP network. Dedicated/Managed IP networks can be established, and in current networks the IP protocol can be used widely without having specific relations to the Internet. INFINITY Training Partners 2011

87 7 Information Society Technologies
The third wave of technologies builds on the technologies of the first and second waves and implements these technologies, broadly resulting in the use of ICT in other socio-economic sectors with decisive influence on efficiency and quality in the production processes. This is called “Information Society Technologies”. Examples on the deployment of ICT in private and public sectors include E-banking, E-health, E-government, E-learning and a range of other E-based processes/activities. These implementations are then likely to give rise to the further advanced development of infrastructure networks, including ubiquitous networks, the portable internet and the automated Internet of things, rather than people. Furthermore, many new technologies are expected to be smaller scale and cheaper to deploy, so this will change investment cycles and patterns.  Smaller players will be able to enter markets and fuel network expansion with relatively small scale investments. INFINITY Training Partners 2011

88 INFINITY Training Partners 2011
8. Cloud Computing INFINITY Training Partners 2011

89 What is Cloud Computing?
Date Cloud Computing - The Coming Storm What is Cloud Computing? “Cloud” is the aggregation of Servers, Low end computers and storage hosting the program and data Accessed via Internet anywhere from world User Centric – Easier for group members to collaborate Task Centric – User’s need is more important than features of application Powerful – All resources together create a wealth of computing power Programmable – Automated distribution of computing power and data across cloud. Data loss become a history now Cloud Computing

90 What Cloud Computing “IS NOT”?
Date Cloud Computing - The Coming Storm What Cloud Computing “IS NOT”? It is not Network Computing Application and Data are not confined to any specific Company’s Server No VPN Access Encompasses multiple companies, multiple servers and multiple networks It is not Traditional Outsourcing Not a contract to host data by 3rd party Hosting Business No subcontracting for computing services for specific outside firm Cloud Computing

91 So exactly what Cloud Computing is?
Date Cloud Computing - The Coming Storm So exactly what Cloud Computing is? A style of computing where massively scalable IT-enabled capabilities are provided "as a service" over the network Acquisition Model Service Based Business Model Usage Based Access Model Network Technical Model Dynamic Cloud Computing

92 Cloud Computing from different viewpoint
Date Cloud Computing - The Coming Storm Cloud Computing from different viewpoint “A buyer centric view of technology where applications are available, through purchase, rental or even development, wherever and whenever.” Line of Business Executive CFO “An approach to consume technology in a pay-as-you-go model where consumers only pay for what they use.” “A comprehensive virtualization model for technology from infrastructure through application delivery .” CIO Cloud Computing is all of these things! Cloud Computing

93 Evolution of Cloud Computing
Date Cloud Computing - The Coming Storm Evolution of Cloud Computing Grid Computing Utility Computing SaaS Computing Cloud Computing Solving large problems with Parallel computing Made mainstream By Global Alliance Offering resources as a metered service Introduced in late 1990s Network-based subscriptions to applications Gained momentum in 2001 Next-Generation Internet computing Data Centers Cloud Computing

94 Cloud Computing Characteristics
Date Cloud Computing - The Coming Storm Cloud Computing Characteristics Accessibility Agility Service Management Flexibility User Metering Cost Efficiency Automation Virtualization Cloud Computing is a model of how IT should operate as a business! Cloud Computing

95 Cloud Computing Framework
Date Cloud Computing - The Coming Storm Cloud Computing Framework Cloud Framework System Business Process as a Service Application/Software as a Service Platform as a Service Infrastructure as a Service Cloud Computing

96 Physical Consolidation
Cloud Computing - The Coming Storm Technology Roadmap to Cloud Service oriented architecture infrastructure Rapid provisioning of IT resources, massive scaling Dynamic service mgmt Energy saving via auto workload distribution IT assets & datacenters kept growing Desperate system tools Inconsistent processes Soaring IT and power costs Infrastructure Complex Sprawl Cloud Computing Technology Roadmap to cloud Virtualized infrastructure - increased system utilization Unify virtual & physical mgmt Promote resource sharing across organization Energy saving – maximize effective use Physical Consolidation Virtualization Consolidate IT assets & datacenters Standardize and centralize management Streamline processes with ITIL best practices Energy saving - Phase out inefficient HW Cloud Computing

97 What is the landscape of Cloud Computing?
Date Cloud Computing - The Coming Storm What is the landscape of Cloud Computing? Three primary models for Cloud Computing have emerged: SaaS (Software as a Service) PaaS (Platform as a Service) IaaS (Infrastructure as a Service) Applications, typically available via the browser: Google Apps Salesforce.com Hosted application environment for building and deploying cloud applications: Salesforce.com Amazon E2C Microsoft Azure Utility computing data center providing on demand server resources: HP Adaptive Infrastructure as a Service Rackspace Amazon E2C & S3 SaaS and IaaS are the key cloud capabilities for 80% of our customers Cloud Computing

98 Software as a Service (SaaS)
Cloud Computing - The Coming Storm Software as a Service (SaaS) Applications (word processor, CRM, etc.) or application services (schedule, calendar, etc.) execute in the “cloud” using the interconnectivity of the internet to propagate data Custom services are combined with 3rd party commercial services via orchestration (SOA) to create new applications Requires investment to build an enabling layer with governance, security and data management functionality May require integration with back-office systems Pay-as-you-go model SaaS will disrupt the application management functions for both internal IT and outsourcers Cloud Computing

99 What are the benefits & challenges of SaaS?
Date Cloud Computing - The Coming Storm What are the benefits & challenges of SaaS? Benefits Speed Reduced up-front cost, potential for reduced lifetime cost Transfer of some/all support obligations Elimination of licensing risk Elimination of version compatibility Reduced hardware footprint Challenges Extension of the security model to the provider (data privacy and ownership) Governance and billing management Synchronization of client and vendor migrations Integrated end-user support Scalability Strong governance required to prevent lines of business from purchasing application services externally without IT involvement Cloud Computing

100 Platform as a Service (PaaS)
Cloud Computing - The Coming Storm Platform as a Service (PaaS) Applications are built in the “cloud” on the platform using a variety of technologies Simplifies orchestration of cloud services Development, testing, and production environments (servers, storage, bandwidth, etc.) are billed monthly like hosting Pay-as-you-go model Environments scale up & down at the click of a button Concerns include code & data privacy, security and scalability PaaS will disrupt the application development and management functions for internal IT Cloud Computing

101 What are the benefits & challenges of PaaS?
Date Cloud Computing - The Coming Storm What are the benefits & challenges of PaaS? Benefits Pay-as-you-go for development, test, and production environments Enables developers to focus on application code Instant global platform Elimination of H/W dependencies and capacity concerns Inherent scalability Simplified deployment model Challenges Governance Tie-in to the vendor Extension of the security model to the provider Connectivity Reliance on 3rd party SLA’s Strong governance required to prevent lines of business from building applications without IT involvement Cloud Computing

102 Infrastructure as a Service (IaaS)
Cloud Computing - The Coming Storm Infrastructure as a Service (IaaS) Compute resources (processors, memory, storage, bandwidth, etc.) are provided in an as-needed, pay-as-you-go model Able to provide from single server up to entire data centers Creates new opportunities such as Cloud bursting: shifting usage spike traffic to alternate resources Infrastructure scales up and down quickly to meet demand Built on a utility computing architecture to host a SOA application layer IaaS will disrupt the infrastructure management functions for both internal IT and outsourcers Cloud Computing

103 What are the benefits & challenges IaaS?
Date Cloud Computing - The Coming Storm What are the benefits & challenges IaaS? Benefits Systems managed by SLA should equate to fewer breaches Higher return on assets through higher utilization Reduced cost driven by Less hardware Less floor space from smaller hardware footprint Higher level of automation from fewer administrators Lower power consumption Able to match consumption to demand Challenges Portability of applications Maturity of systems management tools Integration across the Cloud boundary Extension of internal security models IaaS is the onramp for corporate IT to Cloud Computing! Cloud Computing

104 How do SaaS, PaaS, and IaaS compare?
Date Cloud Computing - The Coming Storm How do SaaS, PaaS, and IaaS compare? SaaS Easy first step to adopt alternative desktop office application Requires nothing more than a credit card to start Will drive home the SOA value proposition PaaS Aimed primarily at small & new companies but models apply to all Large companies will benefit as services scale up and model is driven into internal software development tools and processes IaaS Galvanizing approach to Utility Computing to drive high ROA Overflow to external provider to avoid cap-ex to meet peaks Longer term play due to immature tools and resistance to change Cloud Computing

105 Solutions and vendors are emerging daily
Date Cloud Computing - The Coming Storm Solutions and vendors are emerging daily Software as a Service (Saas) Platform as a Service Google Apps Zoho Office Workday Microsoft Office Live Oracle On Demand Apps NetSuite ERP Salesforce.com SFA Amazon E2C Salesforce.com Force.com Google App Engine Coghead Etelos LongJump Boomi Microsoft Azure* External IaaS Internal IaaS HP/EDS (TBD) IBM Blue Cloud Sun Grid Joyent Rackspace Jamcracker HP Adaptive Infrastructure as a Service Utility Systems Management Tools+ Utility Application Development VMWare IBM Tivoli Cassatt Parallels Xen Zuora Aria Systems eVapt Data Synapse Univa UD Elastra Cloud Server 3tera App Logic IBM WebSphere XD BEA Weblogic Server VE Mule Cloud Computing

106 Possibilities of Cloud Computing
Date Why should we care - The gathering storm Possibilities of Cloud Computing Increases business responsiveness Accelerates creation of new services via rapid prototyping capabilities Reduces acquisition complexity via service oriented approach Uses IT resources efficiently via sharing and higher system utilization Reduces energy consumption Handles new and emerging workloads Scales to extreme workloads quickly and easily Simplifies IT management Platform for collaboration and innovation Cultivates skills for next generation workforce Cloud Computing

107 What is the Cloud Computing opportunity?
Date Why should we care - The gathering storm What is the Cloud Computing opportunity? Next evolutionary step in computing with >30yrs of momentum Requires a new way of thinking, new processes, new skills, and new tools Enables the business to work around IT departments who are seen as part of the problem Companies will reduce IT operating costs and improve agility Clients should consider cloud computing as part of their blueprint refresh, application rationalization, and outsourcing activities Client should investigate cloud strategies with their systems management, application and outsourcing vendors Cloud Computing will meet prime time in the 2010 timeframe Cloud Computing

108 What IT must do to compete
Date Why should we care - The gathering storm What IT must do to compete People Adopt a service provider mentality Inform the business without involving them in issues Realign teams to present a unified relationship model to customers Process Provide services with appropriate service levels Support the user from their point of view Respond quickly, act efficiently Technology Pool technology resources Manage the resources to deliver the required service Automate wherever possible Incorporate technology resources beyond the company data center Cloud Computing

109 What disruptions will Cloud cause?
Date Why should we care - The gathering storm What disruptions will Cloud cause? People Process Technology Strategy Structure Alignment of roles & responsibilities to service delivery Staff training Reorganization to adopt a service focus Update of success metrics Knowledge management Project planning Capacity planning and compute resource procurement Application prioritization Developing & managing service levels Technology Adoption (PoC, Pilot, Deploy) End-user support Utility Computing architecture Identity management Data security Data management Systems management strategy Vendor evaluation & implementation Defining a Cloud enabled IT strategy Budgeting and project funding Standards and guidelines Reference architectures for SaaS, PaaS, and IaaS Enterprise architecture Governance model Defining and implementing controls Identifying audit procedures Cloud Computing is a disruptive technology which will transform how IT does business Cloud Computing

110 What new capabilities/models will IT gain?
Date Why should we care - The gathering storm What new capabilities/models will IT gain? Ability to overflow workload to external compute resources as needed when internal resources are maxed out Adopting in-network redundancy with automated recovery to eliminate disaster recovery risks and costs Data as a Service built on the concepts of Master Data Management and the Semantic Web Rapid deployment (SaaS) or development (PaaS) to meet the immediate needs of the business New models and tools for improving & evolving internal IT Additional capabilities will emerge as more Cloud Computing gains momentum Cloud Computing

111 Cloud Computing Success Stories
Cloud cover Cloud Computing Success Stories GE Global procurement hosting 500k suppliers and 100k users in six languages on SaaS platform to manage $55B/yr in spend Bechtel Reduced infrastructure cost by 30% in part by achieving 70% server utilization Washington DC - Google Apps used by 38k employees reducing costs to $50/user per year for , calendaring, documents, spreadsheets, wikis, and instant messaging Eli Lilly Using Amazon Web Services can deploy a new server in 3min vs 50days and a 64-node Linux cluster in 5min vs 100days NASDAQ Using Amazon Storage to store 30-80GB/day of trading activity Others leaders include Hasbro, ESPN, Major League Baseball, New York Times and British Telecom Cloud Computing

112 Cloud Computing Success Stories
Cloud cover Cloud Computing Success Stories Cloud Computing

113 New services will emerge
Date Cloud cover New services will emerge Data Warehousing & Business Intelligence as a Service Today companies are challenged to find and build in-house expertise in both technologies, and expertise directly correlates with value. A service would obviate the large investment in people and technology focusing expenditures on results Business Process Outsourcing as a Service Outsourcing business processes requires adoption for the outsourcer or migration for the customer. Service enablement obviates the need for platform changes focusing instead on pushing data through the process in a seamless stream Business Continuity & Disaster Recovery as a Service Clouds break the link between applications and hardware enabling lightening fast responses to outages and disasters without disruption. Billions of dollars spent provisioning “just in case” environments can be saved while improving service. Entrepreneurs identify new ways to leverage clouds to address corporate headaches Cloud Computing

114 Where do we start - the weather forecast
As part of an IT transformation adopting cloud would look something like this… Rationalize infrastructure & applications Reduce the complexity by identifying redundant, outdated, or underperforming components and consolidate servers. Define the cloud architecture Create a cloud architecture leveraging SOA for applications, utility computing for infrastructure, and ESB for integration with appropriate standards, governance, and reference architectures Build cost profiles for each application Identify the costs to support, update, and operate each application on a per user basis Identify and assess SaaS alternatives Target SaaS alternatives offering a better economic model than internal hosting. If not available target SOA alternatives. Cloud Computing

115 …and this… 5. Migrate infrastructure to a cloud bursting model
Where do we start - the weather forecast …and this… 5. Migrate infrastructure to a cloud bursting model Further consolidate servers from just-in-case to average load provisioning using the internal pool of servers left over or an external IaaS provider to handle peak loads Identify systems management gaps and discuss with vendors 6. Build new applications on a SOA foundation Applications requiring significant development or new applications should be constructed on a SOA foundation with a particular focus on application virtualization 7. Create cloud enablement roadmap for retained applications Define a development roadmap which migrates retained applications to a cloud model through outsourcing (SaaS), replacement (SaaS or SOA), or development (SOA). Cloud Computing

116 …but there are many onramps to Cloud Computing:
Date Where do we start - the weather forecast …but there are many onramps to Cloud Computing: External SaaS External IaaS PaaS Internal IaaS Internal SaaS Driver Quickly gain new capabilities Select best in class point solutions with already well defined integration methods (EDI) Requires Nothing Challenges Governance Data security, privacy, and ownership 3rd party SLA’s Integrated support Driver Cloudbursting – overflowing from internal to external compute resources Storage on demand New compute intensive services Requires Scheduler to move jobs to cloud Internet bandwidth Challenges Security Driver Development of external facing web solutions Requires Understanding of SaaS application and data models Challenges Integration to backend systems Data security, privacy and ownership 3rd party SLA’s Driver Agility Maximize efficiency Maximize ROA Requires Server virtualization Service level agreements Automated infrastructure provisioning and orchestration Integrated systems management suite Challenges Application silos Driver Agility Maximize reuse SOA Requires Internal IaaS Application virtualization Challenges Application monitoring tools Cloudbursting is fast emerging as the Cloud Computing killer app! Cloud Computing

117 Where do we start - the weather forecast
A variety of cloud computing usage patterns are emerging from the primary two models of SaaS and IaaS Today Emerging Prime Time Standalone External Cloudbursting (Overflow) Early Adopter Maturity Back-office Component Based Internal Internal w/ SaaS Evolving Outsourced Outsourced w/ SaaS Complexity Software as a Service Infrastructure as a Service Cloud Computing

118 Definition of Cloud Computing patterns
Cloud Patterns Definition of Cloud Computing patterns Software as a Service (SaaS) Standalone: External applications with little to no required integration Back Office: External applications such as sales force automation, customer relationship management and enterprise resource planning which require integration with one or more internal systems Component Based: External application components used by internal or external applications to provide functionality through any of several integration methods typically built on a Service Oriented Architecture Cloud Computing

119 Definition of Cloud Computing patterns
Cloud Patterns Definition of Cloud Computing patterns Infrastructure as a Service (SaaS) Cloudbursting: On demand provisioned external infrastructure (via cloud provider) to handle traffic spikes beyond the ability of internal systems Internal: Internal cloud oriented infrastructure with economic and service models models competitive with external clouds Internal with SaaS: Hybrid model building an internal SaaS model on top of an internal cloud infrastructure to create an internal cloud. Outsourced: Traditional outsourcing model where infrastructure is migrated to an external cloud Outsourced with SaaS: Hybrid model similar to Internal with SaaS but using an outsourced provider Cloud Computing


Download ppt "INFINITY Training Partners 2011"

Similar presentations


Ads by Google