SlideShare a Scribd company logo
1 of 19
Download to read offline
CA Virtual Network Assurance
Accelerate the conversion to the
software-defined world
2 © 2015 CA. ALL RIGHTS RESERVED.
90%
By 2019, video will make up 90% of all
internet traffic1
213M
213 million packets per second achieved
in recent NFV performance tests3
26B
By 2020, there will be 26 billion internet
connected devices2
1 Cisco Visual Network Index: Forecast and Methodology, 2014-2019 White Paper, 27 May 2015, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html
2 Gartner: IoT and SDN Spark the Network Transformation Into a Universal Utility, 06 March 2015, http://www.gartner.com/document/3000917
3 Red Hat Satack: Scaling NFV to 213 Million Packets per Second with Red Hat Enterprise Linux, Open Stack, and DPDK, 19 Aug 2015, http://redhatstackblog.redhat.com/2015/08/19/scaling-nfv-to-213-million-packets-per-second-with-red-hat-enterprise-linux-openstack-and-dpdk/
welcome
to the
Application
Economy
3 © 2015 CA. ALL RIGHTS RESERVED.
who is
leading
the
Transformation?
Senior executive vice president of
AT&T Technology and Operations
“We are currently running traffic from millions of wireless
customers over our software defined network.”
- John Donovan
http://www.fiercewireless.com/story/atts-donovan-traffic-millions-wireless-customers-now-running-sdn-architectu/2015-10-08
Telefonica to have 30% of
its network virtualized by
2016.
http://saladeprensa.telefonica.com/jsp/base.jsp?contenido=/jsp/notasdeprensa/notad
etalle.jsp&id=0&origen=portada&idm=eng&pais=1&elem=20598
CenturyLink offers NFV-enhanced
services to enterprise and SMB
customers.
http://uk.reuters.com/article/2015/03/12/ca-cyan-idUKnBw125182a+100+BSW20150312
4 © 2015 CA. ALL RIGHTS RESERVED.
SO WHAT’S THE PROBLEM?
We’re at the Beginning of a Revolution…Are you Ready?
SDN/NFV will fuel the Application Economy
5 © 2015 CA. ALL RIGHTS RESERVED.
SDN Requires Your Immediate Attention
Can you afford to lose control of your network?
NO
SELF
HEALING
REDUCED
FLEXIBILITY
IMPAIRED
TROUBLE
SHOOTING
LIMITED
VISIBILITY
What, when, where and why did something happen?
6 © 2015 CA. ALL RIGHTS RESERVED.
Today’s Infrastructure Management solutions will not
work for SDN/NFV
Today’s Infrastructure Management
The complexity & static nature of traditional networks creates a siloed infrastructure management approach based on manual consumption.
Support Service Operation NOC Engineer Lab
Complex, Disparate Steps
Service Provisioning
Manual Processes
Polled Data Collection
Infrastructure Management
Traditional Networks
Over-provisioned, Static, Long Service Up-Time
7 © 2015 CA. ALL RIGHTS RESERVED.
Operational Challenges
Customers, users
WAN/WWW
LEGACY NETWORK
SDN/NFV ecosystem
WAN/WWW
Difficult to pinpoint
root cause of issues,
performance
suffers, slow MTTR
Inability to trace
performance issues
in highly complex
multi-layered stack
Complexity of
service chain breeds
performance
bottlenecks
No visibility into
physical/virtual
network relationships
and dependencies
Hosted Online Store
WAN/WWW
LEGACY NETWORK
Service Orchestrator
Controller OpenStack
Service
Chain
Virtual
Machines
L2
Tunnels/vNet
vRouters
vSwitches
Hypervisors
Host OS
Physical
Hosts
FW LB Cache Opt
8 © 2015 CA. ALL RIGHTS RESERVED.
SELF SERVICE CUSTOMIZED INSTANT
FULLFILLMENT
OPTIMIZED
Business Expectations of SDN
How do you ensure success?
Faster time to market – Faster time to revenue – Faster pace of innovation
9 © 2015 CA. ALL RIGHTS RESERVED.
to
DYNAMIC
Move from
STATIC
10 © 2015 CA. ALL RIGHTS RESERVED.
CA’s Solution to the SDN/NFV Assurance Challenges
CA Performance
Management
CA Spectrum®
CA Unified Infrastructure
Management
(Future)
MULTI-VENDOR
SESSION BROKER
Normalizes data
from Collector and
multi-vendor variants
and applies
relationship map to
track correlation
MULTI-PURPOSE
OPEN COLLECTOR
Provides multiple
means of collecting
real-time, high volume
inventory and
performance data
from SDN-NFV
environments
CA Virtual Network Assurance
Service Chain
Service Chain
Service Chain
Integrated Hybrid
Monitoring
Self-Healing (Future)
Network Service & Multi-
tenant Awareness
Multi-Layer Inventory
Tracking and Performance
Authority (Future)
SDN/NFV stack
Service Orchestrator
Controller OpenStack
Service
Chain
Virtual
Machines
L2
Tunnels/vNet
vRouters
vSwitches
Hypervisors
Host OS
Physical
Hosts
FW LB Cache Opt
CA Virtual Network Assurance is a flexible and scalable solution providing extended visibility into the multi-
layered SDN/NFV stack and its physical network relationships for improved orchestration and agility.
11 © 2015 CA. ALL RIGHTS RESERVED.
Operational Confidence
Quickly pinpoint
root cause of issues
for improved
performance and
faster MTTR
Accurate
identification of
data plane
performance issues
Remove management
complexity with deep
performance analysis
of all layers in stack
Extended visibility
and mapping of
physical/virtual
network worlds
Focus on the user experience, not technology complexity
Customers, users
WAN/WWW
LEGACY NETWORK
WAN/WWW
Hosted Online Store
WAN/WWW
LEGACY NETWORK
SDN/NFV ecosystem
Service Orchestrator
Controller OpenStack
Service
Chain
L2
Tunnels/vNet
vRouters
vSwitches
Hypervisors
Host OS
Physical
Hosts
Virtual
Machines
12 © 2015 CA. ALL RIGHTS RESERVED.
Tomorrow’s Infrastructure Management Solutions
The closed loop journey to agility
without complexity
Service Orchestrator
Controller OpenStack
Service
Chain
Virtual
Machines
L2
Tunnels/vNet
vRouters
vSwitches
Hypervisors
Host OS
Physical
Hosts
FW LB Cache Opt
SERVICE
ASSURANCE
SDN/NFVStack
Service Request
Assurance
Security
DevOps
13 © 2015 CA. ALL RIGHTS RESERVED.
Open Architecture for SDN/NFV Visibility, Versatility & Agility
Service Chaining
Utilization
Relationship/Dependency Mapping
Technical Specifications
Minimum Software
Requirements
• RHEL 6.x and 7.x
• Java 8 (1.8.0_45)
Supported SDN/NFV
Environments
• Controllers: Open Contrail 2.20-2.21, OpenDaylight (Helium),
VMware NSX 4.2.4, On-demand Plug-ins
• Cloud Orchestration: OpenStack (Juno, Kilo), On-demand Plug-ins
• NFV Orchestration: On-demand Plug-ins
SDN/NFV Supported
Use Cases
• Virtual Customer Premise Equipment (vCPE)
• vGiLAN
• Service Chaining
• Underlay-Overlay Topology Mapping
• SDN/NFV Health Dashboards
Management
Capabilities
• Communication Protocols: REST API, Web sockets
• Managed Entity Types: VNF, VM, vNet, Service Chains, vSwitch,
Hypervisor, Host
• Data Type: Inventory, Performance
• Data Transfer: Poll; Pub/Sub Notifications
Supported Clients • CA Performance Management 2.7
• CA Spectrum 10.1
• 3rd Party Infrastructure Management solutions
14 © 2015 CA. ALL RIGHTS RESERVED.
SDN/NFV
Health
API/SNMP
Metrics
Service Chain
Optimization
Leading the Industry in SDN/NFV Assurance
15 © 2015 CA. ALL RIGHTS RESERVED.
Gain Operational Confidence
IDENTIFY
VULNERABIL
ITIES
ENABLE
SELF
HEALING
DELIVER
FLEXIBILITY
EXTEND
VISIBILITY
Complete
awareness into
overlay/underlay
relationships and
dependencies
Single source of truth
for multi-vendor,
multi-communication
SDN/NFV and legacy
environments
High volume, real-time
data collection tracks
changes in highly
dynamic environment
while protecting
existing investments
Accurate
performance data
becomes trusted
component in
automation chain
16 © 2015 CA. ALL RIGHTS RESERVED.
Deliver Next Generation Services
COMPLETE
DEVOPS
MONETIZE
SERVICE
OFFERINGS
REDUCE
CAPEX
RE-INVENT
SERVICE
DELIVERY
Test and certify
earlier on live
networks to
safeguard releases
Maximize
infrastructure spend
and avoid over-
provisioning with
improved resource
efficiency
Accelerate
production
deployments and
tailor services in
real time
Ensure next
generation network
reliability to support
new service
identification &
offerings
17 © 2015 CA. ALL RIGHTS RESERVED.
SPEED
Faster, Agile Monitoring
SCALE
Future Proofing Business
QUALITY
Differentiate by Experience
70% 65%
30%
Increased visibility2 Productivity improvement3
70%
1 –BlueCross BlueShield Tennessee Customer Success Story
2 - CA Technologies and Tech Validate survey of 81 current Infrastructure Management customers, 2013
3 – CA Technologies and Gateway Research survey of current Infrastructure Management customers, 2015
4 – CA Technologies case study on third largest US telecommunications provider
Extending Our Best of Breed Expertise
AGILITY WITHOUT COMPLEXITY
Improved MTTR2
80%
Components managed4
2M+
Management server reduction3
50%
18 © 2015 CA. ALL RIGHTS RESERVED.© 2015 CA. ALL RIGHTS RESERVED.
Get more info
http://cainc.to/kYDm0s

More Related Content

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

CA Virtual Network Assurance for SDN/NFV

  • 1. CA Virtual Network Assurance Accelerate the conversion to the software-defined world
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED. 90% By 2019, video will make up 90% of all internet traffic1 213M 213 million packets per second achieved in recent NFV performance tests3 26B By 2020, there will be 26 billion internet connected devices2 1 Cisco Visual Network Index: Forecast and Methodology, 2014-2019 White Paper, 27 May 2015, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html 2 Gartner: IoT and SDN Spark the Network Transformation Into a Universal Utility, 06 March 2015, http://www.gartner.com/document/3000917 3 Red Hat Satack: Scaling NFV to 213 Million Packets per Second with Red Hat Enterprise Linux, Open Stack, and DPDK, 19 Aug 2015, http://redhatstackblog.redhat.com/2015/08/19/scaling-nfv-to-213-million-packets-per-second-with-red-hat-enterprise-linux-openstack-and-dpdk/ welcome to the Application Economy
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED. who is leading the Transformation? Senior executive vice president of AT&T Technology and Operations “We are currently running traffic from millions of wireless customers over our software defined network.” - John Donovan http://www.fiercewireless.com/story/atts-donovan-traffic-millions-wireless-customers-now-running-sdn-architectu/2015-10-08 Telefonica to have 30% of its network virtualized by 2016. http://saladeprensa.telefonica.com/jsp/base.jsp?contenido=/jsp/notasdeprensa/notad etalle.jsp&id=0&origen=portada&idm=eng&pais=1&elem=20598 CenturyLink offers NFV-enhanced services to enterprise and SMB customers. http://uk.reuters.com/article/2015/03/12/ca-cyan-idUKnBw125182a+100+BSW20150312
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED. SO WHAT’S THE PROBLEM? We’re at the Beginning of a Revolution…Are you Ready? SDN/NFV will fuel the Application Economy
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED. SDN Requires Your Immediate Attention Can you afford to lose control of your network? NO SELF HEALING REDUCED FLEXIBILITY IMPAIRED TROUBLE SHOOTING LIMITED VISIBILITY What, when, where and why did something happen?
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED. Today’s Infrastructure Management solutions will not work for SDN/NFV Today’s Infrastructure Management The complexity & static nature of traditional networks creates a siloed infrastructure management approach based on manual consumption. Support Service Operation NOC Engineer Lab Complex, Disparate Steps Service Provisioning Manual Processes Polled Data Collection Infrastructure Management Traditional Networks Over-provisioned, Static, Long Service Up-Time
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED. Operational Challenges Customers, users WAN/WWW LEGACY NETWORK SDN/NFV ecosystem WAN/WWW Difficult to pinpoint root cause of issues, performance suffers, slow MTTR Inability to trace performance issues in highly complex multi-layered stack Complexity of service chain breeds performance bottlenecks No visibility into physical/virtual network relationships and dependencies Hosted Online Store WAN/WWW LEGACY NETWORK Service Orchestrator Controller OpenStack Service Chain Virtual Machines L2 Tunnels/vNet vRouters vSwitches Hypervisors Host OS Physical Hosts FW LB Cache Opt
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED. SELF SERVICE CUSTOMIZED INSTANT FULLFILLMENT OPTIMIZED Business Expectations of SDN How do you ensure success? Faster time to market – Faster time to revenue – Faster pace of innovation
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED. to DYNAMIC Move from STATIC
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED. CA’s Solution to the SDN/NFV Assurance Challenges CA Performance Management CA Spectrum® CA Unified Infrastructure Management (Future) MULTI-VENDOR SESSION BROKER Normalizes data from Collector and multi-vendor variants and applies relationship map to track correlation MULTI-PURPOSE OPEN COLLECTOR Provides multiple means of collecting real-time, high volume inventory and performance data from SDN-NFV environments CA Virtual Network Assurance Service Chain Service Chain Service Chain Integrated Hybrid Monitoring Self-Healing (Future) Network Service & Multi- tenant Awareness Multi-Layer Inventory Tracking and Performance Authority (Future) SDN/NFV stack Service Orchestrator Controller OpenStack Service Chain Virtual Machines L2 Tunnels/vNet vRouters vSwitches Hypervisors Host OS Physical Hosts FW LB Cache Opt CA Virtual Network Assurance is a flexible and scalable solution providing extended visibility into the multi- layered SDN/NFV stack and its physical network relationships for improved orchestration and agility.
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED. Operational Confidence Quickly pinpoint root cause of issues for improved performance and faster MTTR Accurate identification of data plane performance issues Remove management complexity with deep performance analysis of all layers in stack Extended visibility and mapping of physical/virtual network worlds Focus on the user experience, not technology complexity Customers, users WAN/WWW LEGACY NETWORK WAN/WWW Hosted Online Store WAN/WWW LEGACY NETWORK SDN/NFV ecosystem Service Orchestrator Controller OpenStack Service Chain L2 Tunnels/vNet vRouters vSwitches Hypervisors Host OS Physical Hosts Virtual Machines
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED. Tomorrow’s Infrastructure Management Solutions The closed loop journey to agility without complexity Service Orchestrator Controller OpenStack Service Chain Virtual Machines L2 Tunnels/vNet vRouters vSwitches Hypervisors Host OS Physical Hosts FW LB Cache Opt SERVICE ASSURANCE SDN/NFVStack Service Request Assurance Security DevOps
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED. Open Architecture for SDN/NFV Visibility, Versatility & Agility Service Chaining Utilization Relationship/Dependency Mapping Technical Specifications Minimum Software Requirements • RHEL 6.x and 7.x • Java 8 (1.8.0_45) Supported SDN/NFV Environments • Controllers: Open Contrail 2.20-2.21, OpenDaylight (Helium), VMware NSX 4.2.4, On-demand Plug-ins • Cloud Orchestration: OpenStack (Juno, Kilo), On-demand Plug-ins • NFV Orchestration: On-demand Plug-ins SDN/NFV Supported Use Cases • Virtual Customer Premise Equipment (vCPE) • vGiLAN • Service Chaining • Underlay-Overlay Topology Mapping • SDN/NFV Health Dashboards Management Capabilities • Communication Protocols: REST API, Web sockets • Managed Entity Types: VNF, VM, vNet, Service Chains, vSwitch, Hypervisor, Host • Data Type: Inventory, Performance • Data Transfer: Poll; Pub/Sub Notifications Supported Clients • CA Performance Management 2.7 • CA Spectrum 10.1 • 3rd Party Infrastructure Management solutions
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED. SDN/NFV Health API/SNMP Metrics Service Chain Optimization Leading the Industry in SDN/NFV Assurance
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED. Gain Operational Confidence IDENTIFY VULNERABIL ITIES ENABLE SELF HEALING DELIVER FLEXIBILITY EXTEND VISIBILITY Complete awareness into overlay/underlay relationships and dependencies Single source of truth for multi-vendor, multi-communication SDN/NFV and legacy environments High volume, real-time data collection tracks changes in highly dynamic environment while protecting existing investments Accurate performance data becomes trusted component in automation chain
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED. Deliver Next Generation Services COMPLETE DEVOPS MONETIZE SERVICE OFFERINGS REDUCE CAPEX RE-INVENT SERVICE DELIVERY Test and certify earlier on live networks to safeguard releases Maximize infrastructure spend and avoid over- provisioning with improved resource efficiency Accelerate production deployments and tailor services in real time Ensure next generation network reliability to support new service identification & offerings
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED. SPEED Faster, Agile Monitoring SCALE Future Proofing Business QUALITY Differentiate by Experience 70% 65% 30% Increased visibility2 Productivity improvement3 70% 1 –BlueCross BlueShield Tennessee Customer Success Story 2 - CA Technologies and Tech Validate survey of 81 current Infrastructure Management customers, 2013 3 – CA Technologies and Gateway Research survey of current Infrastructure Management customers, 2015 4 – CA Technologies case study on third largest US telecommunications provider Extending Our Best of Breed Expertise AGILITY WITHOUT COMPLEXITY Improved MTTR2 80% Components managed4 2M+ Management server reduction3 50%
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.© 2015 CA. ALL RIGHTS RESERVED.