THE EASY WAY TO MEASURE, MONITOR, AND
MONETIZE YOUR MOST PRECIOUS RESOURCE
Image:	
  Flickr	
  user	
  mecookie	
  h2p://w...
Whether it’s subscriber usage information, congestion details, or
hardware issues, knowing more about your network will he...
ARE YOU TAKING
FULL ADVANTAGE
OF THIS INFORMATION?
Image:	
  Flickr	
  user	
  Colin_K	
  www.flickr.com/photos/colinkinner...
WHEN USED CORRECTLY, NETWORK
INTELLIGENCE IS WORTH ITS WEIGHT IN GOLD.
IT LETS YOU ENHANCE THE
SUBSCRIBER EXPERIENCE AND H...
BUT FIRST, YOU NEED
TO KNOW WHERE TO
DIG (AND HOW).
Image:	
  Flickr	
  user	
  BigTallGuy	
  h2p://www.flickr.com/photos/b...
MULTIPLE DATA SOURCES CAN HELP
IN YOUR QUEST FOR THIS TREASURE
IPDR
DPI
sFlow
SNMP
Image:	
  Flickr	
  user	
  Tony	
  Fis...
SO HOW DO YOU KNOW WHICH
ONE IS RIGHT FOR YOU?
Image:	
  Flickr	
  user	
  Steve	
  A	
  Johnson	
  www.flickr.com/photos/a...
THE PROSPECTOR: IPDR
THINK OF INTERNET PROTOCOL DETAIL RECORD AS THE
RUGGED HERO IN THE SEARCH FOR NETWORK INTELLIGENCE.
I...
•  Streaming music
•  Browsing websites and checking email
•  Over-the-top video streaming
•  Peer-to-peer traffic
•  Othe...
IPDR:
• Instructs the CMTS to gather and
dispatch subscriber usage data for analysis
• Tracks down heavy users
“over-minin...
USE IPDR DATA TO DECIDE WHETHER TO INVEST IN
ADDITIONAL INFRASTRUCTURE, OFFER METERED
PLANS, OR DEVELOP NEW SERVICE OFFERI...
THE ACCOMPLICE: SNMP
SIMPLE NETWORK MANAGEMENT PROTOCOL
(SNMP) CAN PROVIDE VALUABLE
INFORMATION ABOUT SERVICE QUALITY.
LIK...
This includes quantitative measures, like the numbers
of bytes or packets sent and received through an
interface on the ne...
BUT…
SNMP isn't very efficient when
polling a CMTS for subscriber
information and can overtax the
CMTS when used for this ...
Cross-reference SNMP network data, like device
lease information, with IPDR subscriber usage
information to create a compl...
THE BOUNTY HUNTER: DPI
Deep packet inspection (DPI) is a protocol
that tracks down data for bandwidth
monitoring and polic...
DPI SCANS ALL TRAFFIC ON A NETWORK AND CREATES
STATISTICS BASED ON SPECIFIC PARAMETERS.
DPI REVEALS THE DETAILS OF EVERY
P...
FOR EXAMPLE, THE DETAILS OF WHAT EMAILS
ARE SENT TO WHOM, AND THE CONTENT
CONTAINED.
AS A RESULT, MANY IN THE USER COMMUNI...
DPI CAN BE MORE EXPENSIVE THAN OTHER BANDWIDTH
MONITORING OPTIONS, SUCH AS IPDR, BECAUSE IT
REQUIRES REQUIRES ADDITIONAL H...
The New Face in Town: sFlow
A newer protocol called sFlow is now being
used in smaller multi-dwelling, unit-based
networki...
SO WHICH ONE IS RIGHT FOR YOU?
Image:	
  Flickr	
  user	
  rexboggs5	
  h2p://www.flickr.com/photos/rexboggs5/8171683448/	
...
DIFFERENT DATA SOURCES WILL GIVE YOU INSIGHT
INTO DIFFERENT ASPECTS OF YOUR NETWORK.
THERE MAY BE MORE THAN ONE ANSWER
Ima...
THE KEY TO NETWORK INTELLIGENCE
COLLECTING DATA FROM MULTIPLE SOURCES, OVER REGULAR
TIME INTERVALS, WILL GIVE YOU ENOUGH I...
Image:	
  Used	
  with	
  permission	
  from	
  Microso	
  CorporaBon.	
  	
  
ANALYZE SUBSCRIBER CONSUMPTION PATTERNS TO OFFER
SUBSCRIBERS NEW SERVICE BUNDLES, COMPLIMENTARY
UPGRADES, AND A WIDER RANG...
FAIR USE
Many providers are now starting to implement some kind of
chargeback or throttling model.
Keep in mind that some ...
WHATEVER STRATEGY YOU CHOOSE, ACCURATE BANDWIDTH MONITORING
TOOLS WILL GIVE YOU THE NETWORK INTELLIGENCE YOU NEED TO PUT
Y...
BANDWIDTH IS ONLY FREE IN
THE EYES OF THE CONSUMER.
You must be able to offer
enough bandwidth to provide
high quality of ...
SO MAKE THE MOST OF THE
RESOURCES THAT YOU
ALREADY HAVE.
MINE YOUR EXISTING NETWORK DATA TO OFFER THE BEST
POSSIBLE USER E...
WANT TO KNOW MORE?
LEARN WHY BANDWIDTH IS SO IMPORTANT BY
DOWNLOADING THE FREE WHITE PAPER HERE.
@incognito_sfwr
Incognito...
Upcoming SlideShare
Loading in...5
×

Find Hidden Information on Your Network

911

Published on

Service providers today face many challenges when trying to create a high quality of experience for subscribers. The combination of increased Internet traffic, an abundance of IP-connected devices, and the popularity of bandwidth-hogging over-the-top video applications make it difficult to efficiently manage bandwidth and deliver exceptional service. The solution lies in a technology that helps you harvest subscriber usage data that you already own: Internet Protocol Detail Record (IPDR).

IPDR utilizes hidden information in your network to provide superior network intelligence, allowing you to make informed planning decisions. Incorporated into DOCSIS, IPDR instructs the CMTS to periodically gather and dispatch subscriber consumption data into an external application for other departments to digest.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
911
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
9
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • I don’t really like this slide… but an idea of what it could look like.
  • Missing attribution information. I would suggest making the image smaller and placing it in the lower left corner and just have text in the white space (so you don’t have to have the box).

    http://www.flickr.com/photos/doug88888/2825008179/sizes/o/in/photostream/
  • Love this photo. Suggest downloading larger version, moving the image so that the man and horse is “lower” on the slide and making more room on the top for text. If you don’t have enough “sky” for that, you can enlarge the image. If not, I will teach you a cheap trick you can do in photo shop to make more sky.
  • The sentence in the top box does not lead well to the second box.

    IPDR can identify rich veins of gold by discovering how your subscribers use bandwidth. How much bandwidth is dedicated to:
    Streaming music? (technically, it is difficult to determine what exactly someone is downloading)
    browsing websites and checking emails

    Etc etc

  • I don’t think this image is fitting here.
  • Suggest removing box border and drop shadow effect. This is because we already have a lot going on here with the image and the text. The extra border and drop shadow makes it busier than it needs to be.

    I wonder if an image of a dog running back to its owner after playing a game of fetch would be even better image for this? Anyway, the image is missing attribution info.
  • Love the image. The boxes doesn’t need border and drop shadow for the same reasons as the slide above. Additionally, since there is so much color here, I suggest either using black or white for the base box color. I also suggest just using one box. Missing attribution information here though.
  • See comments on the above slide.

    Because the background image has relatively plain colors, you can play around with bright color text or boxes….
  • Not sure if this image is appropriate. I think a bird’s eye view of a city or something like that would be better. Missing attribution information.
  • Though fitting, I’m worried about the batman image….
  • Suggest a close up image of something with lots of detail. (ie: leaves?)
  • Because of the seriousness of the message, suggest using black box with white text instead of colorful blue box.
  • I think the image and color is too cute for the message here.
  • There is a strange white and black border on the top and left side…but not on the other sides?
  • Love this…but I wish there wasn’t such a distracting watermark.
  • Suggest flipping hammer horizontally (so that the top part is on the right corner) and moving the text accordingly since text is normally read from left to right. Hammer should be a bit smaller and text can be bigger.
  • See comment about the colorful boxes and borders being distracting on a colorful/busy background.
  • Dry foot print gives me a negative feeling (like I’m gonna be lost). Right path should be…cheerier?
  • Message is a serious one. Suggest a more serious looking image.
  • The call to action is not very attractive. “Why bandwidth is important” isn’t really what the paper is about, and is something the audience most likely already agrees with.

    Here’s the link to the landing page: http://go.incognito.com/l/16142/2013-01-28/3fy6q
  • Find Hidden Information on Your Network

    1. 1. THE EASY WAY TO MEASURE, MONITOR, AND MONETIZE YOUR MOST PRECIOUS RESOURCE Image:  Flickr  user  mecookie  h2p://www.flickr.com/photos/mecookie/3374589349/  CC  A2ribuBon  License   FIND HIDDEN INFORMATION ON YOUR NETWORK
    2. 2. Whether it’s subscriber usage information, congestion details, or hardware issues, knowing more about your network will help you provide better service and increase revenue… YOUR NETWORK IS HIDING A GOLDMINE OF INFORMATION Image:  Flickr  user  s58y    h2p://www.flickr.com/photos/s58y/5886685932/  CC  A2ribuBon  License  
    3. 3. ARE YOU TAKING FULL ADVANTAGE OF THIS INFORMATION? Image:  Flickr  user  Colin_K  www.flickr.com/photos/colinkinner/2200500024/  CC  A2ribuBon  License  
    4. 4. WHEN USED CORRECTLY, NETWORK INTELLIGENCE IS WORTH ITS WEIGHT IN GOLD. IT LETS YOU ENHANCE THE SUBSCRIBER EXPERIENCE AND HELP YOU MAKE THE MOST OF YOUR EXISTING RESOURCES. Image:  Flickr  user  covilha  h2p://www.flickr.com/photos/11139043@N00/1439804758/  CC  A2ribuBon  License  
    5. 5. BUT FIRST, YOU NEED TO KNOW WHERE TO DIG (AND HOW). Image:  Flickr  user  BigTallGuy  h2p://www.flickr.com/photos/bigtallguy/498260191/  CC  A2ribuBon  License  
    6. 6. MULTIPLE DATA SOURCES CAN HELP IN YOUR QUEST FOR THIS TREASURE IPDR DPI sFlow SNMP Image:  Flickr  user  Tony  Fischer  Photography  www.flickr.com/photos/tonythemisfit/3603754835  /  CC  A2ribuBon  License  
    7. 7. SO HOW DO YOU KNOW WHICH ONE IS RIGHT FOR YOU? Image:  Flickr  user  Steve  A  Johnson  www.flickr.com/photos/artbystevejohnson/5650007134/  CC  A2ribuBon  License  
    8. 8. THE PROSPECTOR: IPDR THINK OF INTERNET PROTOCOL DETAIL RECORD AS THE RUGGED HERO IN THE SEARCH FOR NETWORK INTELLIGENCE. Image:  Flickr  user  slopjop  h2p://www.flickr.com/photos/slopjop/2148215556  /  CC  A2ribuBon  License  
    9. 9. •  Streaming music •  Browsing websites and checking email •  Over-the-top video streaming •  Peer-to-peer traffic •  Other applications IPDR CAN IDENTIFY RICH VEINS OF GOLD BY DISCOVERING HOW MUCH BANDWIDTH IS DEDICATED TO:
    10. 10. IPDR: • Instructs the CMTS to gather and dispatch subscriber usage data for analysis • Tracks down heavy users “over-mining” bandwidth • Provides data that can assist with capacity planning Image:  Flickr  user  Randy  PerBet  h2p://www.flickr.com/photos/34652102@N04/5059846582/  CC  A2ribuBon  License  
    11. 11. USE IPDR DATA TO DECIDE WHETHER TO INVEST IN ADDITIONAL INFRASTRUCTURE, OFFER METERED PLANS, OR DEVELOP NEW SERVICE OFFERINGS. BASE YOUR DECISIONS ON REAL USAGE PATTERNS TO PROVIDE A BETTER QUALITY OF SERVICE.
    12. 12. THE ACCOMPLICE: SNMP SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) CAN PROVIDE VALUABLE INFORMATION ABOUT SERVICE QUALITY. LIKE MOST ACCOMPLICES, THOUGH, IT WORKS BEST IN PARTNERSHIP. Image:  Used  with  permission  from  Microso  CorporaBon.    
    13. 13. This includes quantitative measures, like the numbers of bytes or packets sent and received through an interface on the network, and qualitative data, such as the number of dropped packets and re-transmissions. SNMP ALLOWS YOU TO EXTRACT DATA FROM MOST NETWORKING EQUIPMENT Image:  Flickr  user  zhouxuan12345678  h2p://www.flickr.com/photos/53921113@N02/5645102295/  CC  A2ribuBon  License  
    14. 14. BUT… SNMP isn't very efficient when polling a CMTS for subscriber information and can overtax the CMTS when used for this purpose. SNMP is therefore best used for information about network health. Image:  Used  with  permission  from  Microso  CorporaBon.    
    15. 15. Cross-reference SNMP network data, like device lease information, with IPDR subscriber usage information to create a complete overview of network traffic, right down to the individual CMTS or port. Image:  Flickr  user  S  J  Pinkney  h2p://www.flickr.com/photos/spinkney/4742074137/  CC  A2ribuBon  License  
    16. 16. THE BOUNTY HUNTER: DPI Deep packet inspection (DPI) is a protocol that tracks down data for bandwidth monitoring and policy enforcement. It is an application-based method that sits between the subscriber and the internet. Like all bounty hunters, its methods can be controversial. Image:  Flickr  user  zachd1_618  h2p://www.flickr.com/photos/zachd1_618/4851505872/  CC  A2ribuBon  License  
    17. 17. DPI SCANS ALL TRAFFIC ON A NETWORK AND CREATES STATISTICS BASED ON SPECIFIC PARAMETERS. DPI REVEALS THE DETAILS OF EVERY PACKET SENT ON THE NETWORK. Image:  Flickr  user  marfis75  www.flickr.com/photos/marfis75/6382976417/  CC  A2ribuBon  License  
    18. 18. FOR EXAMPLE, THE DETAILS OF WHAT EMAILS ARE SENT TO WHOM, AND THE CONTENT CONTAINED. AS A RESULT, MANY IN THE USER COMMUNITY HAVE REJECTED DPI OVER PRIVACY CONCERNS. Image:  Flickr  user  visualpanic  www.flickr.com/photos/visualpanic/2246514490/  CC  A2ribuBon  License  
    19. 19. DPI CAN BE MORE EXPENSIVE THAN OTHER BANDWIDTH MONITORING OPTIONS, SUCH AS IPDR, BECAUSE IT REQUIRES REQUIRES ADDITIONAL HARDWARE. Image:  Flickr  user  Images  of  Money  www.flickr.com/photos/59937401@N07/5475014890/  CC  A2ribuBon  License  
    20. 20. The New Face in Town: sFlow A newer protocol called sFlow is now being used in smaller multi-dwelling, unit-based networking equipment, used in high density areas like apartments and student housing. Like IPDR and DPI, sFLOW represents subscriber information and gives providers visibility into the network to understand where bandwidth is used. Image:  Flickr  user  jeremymates  h2p://www.flickr.com/photos/jeremymates/3692426935/  CC  A2ribuBon  License  
    21. 21. SO WHICH ONE IS RIGHT FOR YOU? Image:  Flickr  user  rexboggs5  h2p://www.flickr.com/photos/rexboggs5/8171683448/  CC  A2ribuBon  License  
    22. 22. DIFFERENT DATA SOURCES WILL GIVE YOU INSIGHT INTO DIFFERENT ASPECTS OF YOUR NETWORK. THERE MAY BE MORE THAN ONE ANSWER Image:  Flickr  user  Rusty  Clark  www.flickr.com/photos/rusty_clark/8161827144/  CC  A2ribuBon  License  
    23. 23. THE KEY TO NETWORK INTELLIGENCE COLLECTING DATA FROM MULTIPLE SOURCES, OVER REGULAR TIME INTERVALS, WILL GIVE YOU ENOUGH INFORMATION TO CREATE A COMPLETE OVERVIEW OF YOUR NETWORK. Image:  Used  with  permission  from  Microso  CorporaBon.    
    24. 24. Image:  Used  with  permission  from  Microso  CorporaBon.    
    25. 25. ANALYZE SUBSCRIBER CONSUMPTION PATTERNS TO OFFER SUBSCRIBERS NEW SERVICE BUNDLES, COMPLIMENTARY UPGRADES, AND A WIDER RANGE OF OFFERINGS. YOU MAY EVEN BE ABLE TO CREATE CUSTOM PACKAGES BASED ON REAL USER TRENDS. Image:  Flickr  user  Bert  Kaufmann  h2p://www.flickr.com/photos/22746515@N02/4649517754/  CC  A2ribuBon  License  
    26. 26. FAIR USE Many providers are now starting to implement some kind of chargeback or throttling model. Keep in mind that some subscribers may not realize just how much bandwidth they are using. Avoid bill shock by creating a web-based portal, where subscribers can see what applications use the most data, how much is consumed in a billing cycle, and find a way to mitigate their use. Image:  Used  with  permission  from  Microso  CorporaBon.    
    27. 27. WHATEVER STRATEGY YOU CHOOSE, ACCURATE BANDWIDTH MONITORING TOOLS WILL GIVE YOU THE NETWORK INTELLIGENCE YOU NEED TO PUT YOU ON THE RIGHT PATH TO OFFER THE BEST CUSTOMER EXPERIENCE. Image:  Flickr  user  forestwander-­‐nature-­‐pictures  h2p://www.flickr.com/photos/forestwander-­‐nature-­‐pictures/6242766617/  CC  A2ribuBon  License  
    28. 28. BANDWIDTH IS ONLY FREE IN THE EYES OF THE CONSUMER. You must be able to offer enough bandwidth to provide high quality of service or your subscribers will desert you. Image:  Flickr  user  Moyan  Brenn  www.flickr.com/photos/aigle_dore/5951683083/  CC  A2ribuBon  License  
    29. 29. SO MAKE THE MOST OF THE RESOURCES THAT YOU ALREADY HAVE. MINE YOUR EXISTING NETWORK DATA TO OFFER THE BEST POSSIBLE USER EXPERIENCE –– AND CREATE A SUSTAINABLE FUTURE FOR YOUR BUSINESS. Image:  Used  with  permission  from  Microso  CorporaBon.    
    30. 30. WANT TO KNOW MORE? LEARN WHY BANDWIDTH IS SO IMPORTANT BY DOWNLOADING THE FREE WHITE PAPER HERE. @incognito_sfwr Incognito-software www.incognito.com
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×