SlideShare a Scribd company logo
1 of 16
Download to read offline
Network Intelligence


Mauricio Arango
Sun Microsystems
January 21, 2010
Introduction
• Telco industry needs to steer away
  from "dumb pipe provider" concerns
  and focus on smart networks
• Business reality presents large
  challenges and opportunities
• Smart telco networks are about
  extracting higher business value from
  network infrastructure – via Network
  Intelligence layer
4G Business Challenges and
       Opportunities
• Faster pace of business with more
  dynamic & complex network
  – Smartphones
  – Device-based applications
  – Femtocells
• Enhaced service quality and customer
  experience
4G Business Challenges and
       Opportunities
• Increased regulation
  – Higher operations visibility
  – Restrictions while driving
• Interaction with other complex systems
  – Transportation
  – Power grid
  – Social networks
Need for Network Intelligence
           layer
• Extract higher business value from
  network events in realtime via:
  – Continous monitoring
  – Simplified integration of network and
    business application layers – event-driven
  – Connecting dots in realtime – correlation
Network Intelligence builds on:
•   Business Intelligence
•   Performance monitoring
•   Traffic monitoring
•   Fault management
•   Policy-based management
•   Deep Packet Inspection (DPI)
Network Inteligence adds:
• Sharing of events across management
  silos
• Connecting dots in realtime – event
  correlation
• Integration of business processes with
  network operations processes
• Event-driven architecture
SLA management use case -
    consumer mobile broadband
•
                   access throughput,
    Service level guarantees:
  packet loss, latency, jitter
• Monitoring via: DPI, device agent
• SLA tracker – detects SLA violation events
• Integrates: CRM, billing, device
  management, service portal, data
  warehouse
SLA management use case -
consumer mobile broadband
                 Event stream
                 processing app
                 (CEP)
  Data             SLA                                                Service
                                              CRM           Billing
warehouse         Tracker                                              Portal
                              SLA violation
                              event

                    Event routing – Messaging system
            Packet loss & delay               Throughput
            measurement                       measurement

                                      Device
       DPI
                                      Mgmt
Service restriction while driving
           use case
• Block usage while user is in a moving
  motor vehicle
• Monitor: device location, vehicle device
  presence
Service restriction while driving
           use case
                 Event stream processing app
                 (CEP)
                       In-vehicle
  Data                                                              Service
                    usage tracking &                      CRM
warehouse                                                            Portal
                       restriction
                         Disable           Enable
                         device event      device event

                    Event routing – Messaging system
            Location change         In-vehicle presence
            event                   event

                              In-vehicle
     Location                                                   Device
                              presence
     collector                                                  Mgmt
                               collector
Service problem monitoring via
       social networks
• Identify potential service problems by
  from patterns of communication in
  social networks such as Twitter
• Search for keywords related to service
  problems, track over time and location
• Generate trouble investigation events
Service problem monitoring via
       social networks
            Event stream processing app
            (CEP)
                                            Problem
  Data      Text streams                  investigation
warehouse     tracking                      workflows
                       Investigation
                       event

            Event routing – Messaging system



                     Twitter event
                       collector
Technologies and Products for
    Network Intelligence
• Event stream processing – Complex
  event processing (CEP)
• Application servers
• Messaging middleware
• Data caching – fast access to state info
• Databases
Event-driven Architecture
 Event              Event
consumer           consumer   • Simplified integration via
                                decoupling between
                                producers & consumers
       Event routing
                              • Producers don't know
                                about consumers and
  Event             Event       viceversa
consumer/         consumer/
 producer          producer   • Events are common info
                              • Horizontal scaling
        Event routing


  Event             Event
 producer          producer
Conclusions
• Smart not dumb networks – higher
  complexity of network infrastructure
• Extraction of higher business value from
  network requires new functional layer –
  Network Intelligence (NI)
• NI offers simplified integration via Event-
  driven Architecture
• NI enables realtime analysis via
  Complex Event Processing

More Related Content

What's hot

Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
Lilian Schaffer
 
6.smart services
6.smart services6.smart services
6.smart services
kaseyaindia
 

What's hot (13)

Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
 
6.smart services
6.smart services6.smart services
6.smart services
 
MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)
 
myLink - Account Interface
myLink - Account InterfacemyLink - Account Interface
myLink - Account Interface
 
Nagios Conference 2011 - Anders Haal - Business Activity Monitoring With The ...
Nagios Conference 2011 - Anders Haal - Business Activity Monitoring With The ...Nagios Conference 2011 - Anders Haal - Business Activity Monitoring With The ...
Nagios Conference 2011 - Anders Haal - Business Activity Monitoring With The ...
 
Jai Keven Kumar
Jai Keven KumarJai Keven Kumar
Jai Keven Kumar
 
Building Event Driven Systems
Building Event Driven SystemsBuilding Event Driven Systems
Building Event Driven Systems
 
LiveAction Brochure
LiveAction BrochureLiveAction Brochure
LiveAction Brochure
 
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
Simple, effective 'Synthetic End-User Experience Monitoring' with ManageEngin...
 
Nairobi Water
Nairobi WaterNairobi Water
Nairobi Water
 
Event Driven Architecture
Event Driven ArchitectureEvent Driven Architecture
Event Driven Architecture
 
iTel switch | Softswitch platform for global Retail, Wholesale, Calling card ...
iTel switch | Softswitch platform for global Retail, Wholesale, Calling card ...iTel switch | Softswitch platform for global Retail, Wholesale, Calling card ...
iTel switch | Softswitch platform for global Retail, Wholesale, Calling card ...
 

Viewers also liked

Microsoft history
Microsoft historyMicrosoft history
Microsoft history
Virus91
 
Test 2 Polymer Notes
Test 2 Polymer NotesTest 2 Polymer Notes
Test 2 Polymer Notes
sad asad
 
before traveling
before travelingbefore traveling
before traveling
June Song
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability management
Sasha Nunke
 
Plan estratgicoparalaspersonasconte aysusfamilias
Plan estratgicoparalaspersonasconte aysusfamiliasPlan estratgicoparalaspersonasconte aysusfamilias
Plan estratgicoparalaspersonasconte aysusfamilias
Pepe Jara Cueva
 
Talleres halloween 2012
Talleres halloween 2012Talleres halloween 2012
Talleres halloween 2012
XXX XXX
 

Viewers also liked (20)

Ogunte intro feb2013
Ogunte intro feb2013Ogunte intro feb2013
Ogunte intro feb2013
 
Microsoft history
Microsoft historyMicrosoft history
Microsoft history
 
Zend Certified Engineer & Zend Framework
Zend Certified Engineer & Zend FrameworkZend Certified Engineer & Zend Framework
Zend Certified Engineer & Zend Framework
 
API Design
API DesignAPI Design
API Design
 
лэндинги
лэндингилэндинги
лэндинги
 
Sph 107 Ch 7
Sph 107 Ch 7Sph 107 Ch 7
Sph 107 Ch 7
 
Bonsai
BonsaiBonsai
Bonsai
 
ikh311-08
ikh311-08ikh311-08
ikh311-08
 
SPH 107 Ch 3
SPH 107 Ch 3SPH 107 Ch 3
SPH 107 Ch 3
 
Hr Managers Presentation
Hr Managers PresentationHr Managers Presentation
Hr Managers Presentation
 
ikh331-05-transaction
ikh331-05-transactionikh331-05-transaction
ikh331-05-transaction
 
Sph 106 Ch 16
Sph 106 Ch 16Sph 106 Ch 16
Sph 106 Ch 16
 
Test 2 Polymer Notes
Test 2 Polymer NotesTest 2 Polymer Notes
Test 2 Polymer Notes
 
Why Have A Will
Why Have A WillWhy Have A Will
Why Have A Will
 
before traveling
before travelingbefore traveling
before traveling
 
Hibernating DDS
Hibernating DDSHibernating DDS
Hibernating DDS
 
Cost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability managementCost-effective approach to full-cycle vulnerability management
Cost-effective approach to full-cycle vulnerability management
 
Plan estratgicoparalaspersonasconte aysusfamilias
Plan estratgicoparalaspersonasconte aysusfamiliasPlan estratgicoparalaspersonasconte aysusfamilias
Plan estratgicoparalaspersonasconte aysusfamilias
 
Talleres halloween 2012
Talleres halloween 2012Talleres halloween 2012
Talleres halloween 2012
 
2009 Eclipse Con
2009 Eclipse Con2009 Eclipse Con
2009 Eclipse Con
 

Similar to Network Intelligence

Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
Mauricio Godoy
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
OpenStorageSummit
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
Liviu Claudiu Cismaru
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
ewickline
 

Similar to Network Intelligence (20)

Verve Nms
Verve NmsVerve Nms
Verve Nms
 
Track and Trace Solution Details
Track and Trace Solution DetailsTrack and Trace Solution Details
Track and Trace Solution Details
 
Spark meetup stream processing use cases
Spark meetup   stream processing use casesSpark meetup   stream processing use cases
Spark meetup stream processing use cases
 
Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).
 
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataAdvanced Logging and Analysis for SOA, Social, Cloud and Big Data
Advanced Logging and Analysis for SOA, Social, Cloud and Big Data
 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Intellica evam summary
Intellica evam summaryIntellica evam summary
Intellica evam summary
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Mobility at a_crossroads
Mobility at a_crossroadsMobility at a_crossroads
Mobility at a_crossroads
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
BAM CEP / Business Activity Monitoring , Complex Event Processingomplex
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Oi
OiOi
Oi
 
IOT model to Unified Communication Events in SDN
IOT model to Unified Communication  Events in SDNIOT model to Unified Communication  Events in SDN
IOT model to Unified Communication Events in SDN
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Microsoft StreamInsight
Microsoft StreamInsight Microsoft StreamInsight
Microsoft StreamInsight
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overview
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Network Intelligence

  • 1. Network Intelligence Mauricio Arango Sun Microsystems January 21, 2010
  • 2. Introduction • Telco industry needs to steer away from "dumb pipe provider" concerns and focus on smart networks • Business reality presents large challenges and opportunities • Smart telco networks are about extracting higher business value from network infrastructure – via Network Intelligence layer
  • 3. 4G Business Challenges and Opportunities • Faster pace of business with more dynamic & complex network – Smartphones – Device-based applications – Femtocells • Enhaced service quality and customer experience
  • 4. 4G Business Challenges and Opportunities • Increased regulation – Higher operations visibility – Restrictions while driving • Interaction with other complex systems – Transportation – Power grid – Social networks
  • 5. Need for Network Intelligence layer • Extract higher business value from network events in realtime via: – Continous monitoring – Simplified integration of network and business application layers – event-driven – Connecting dots in realtime – correlation
  • 6. Network Intelligence builds on: • Business Intelligence • Performance monitoring • Traffic monitoring • Fault management • Policy-based management • Deep Packet Inspection (DPI)
  • 7. Network Inteligence adds: • Sharing of events across management silos • Connecting dots in realtime – event correlation • Integration of business processes with network operations processes • Event-driven architecture
  • 8. SLA management use case - consumer mobile broadband • access throughput, Service level guarantees: packet loss, latency, jitter • Monitoring via: DPI, device agent • SLA tracker – detects SLA violation events • Integrates: CRM, billing, device management, service portal, data warehouse
  • 9. SLA management use case - consumer mobile broadband Event stream processing app (CEP) Data SLA Service CRM Billing warehouse Tracker Portal SLA violation event Event routing – Messaging system Packet loss & delay Throughput measurement measurement Device DPI Mgmt
  • 10. Service restriction while driving use case • Block usage while user is in a moving motor vehicle • Monitor: device location, vehicle device presence
  • 11. Service restriction while driving use case Event stream processing app (CEP) In-vehicle Data Service usage tracking & CRM warehouse Portal restriction Disable Enable device event device event Event routing – Messaging system Location change In-vehicle presence event event In-vehicle Location Device presence collector Mgmt collector
  • 12. Service problem monitoring via social networks • Identify potential service problems by from patterns of communication in social networks such as Twitter • Search for keywords related to service problems, track over time and location • Generate trouble investigation events
  • 13. Service problem monitoring via social networks Event stream processing app (CEP) Problem Data Text streams investigation warehouse tracking workflows Investigation event Event routing – Messaging system Twitter event collector
  • 14. Technologies and Products for Network Intelligence • Event stream processing – Complex event processing (CEP) • Application servers • Messaging middleware • Data caching – fast access to state info • Databases
  • 15. Event-driven Architecture Event Event consumer consumer • Simplified integration via decoupling between producers & consumers Event routing • Producers don't know about consumers and Event Event viceversa consumer/ consumer/ producer producer • Events are common info • Horizontal scaling Event routing Event Event producer producer
  • 16. Conclusions • Smart not dumb networks – higher complexity of network infrastructure • Extraction of higher business value from network requires new functional layer – Network Intelligence (NI) • NI offers simplified integration via Event- driven Architecture • NI enables realtime analysis via Complex Event Processing