SlideShare a Scribd company logo
1 of 22
Download to read offline
How To Track Performance and Fault in a
Multi-layer, Software-Defined Network
(SDN) Environment
Timothy Diep
DevOps: Agile Ops
CA Technologies
Director, Product Management
DO5X89E
@timdiep
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA
World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer
references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in
this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such
release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-
available basis. The information in this presentation is not deemed to be incorporated into any contract.
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Software-Defined Networking (SDN) adds virtual and
logical layers to the underlying physical network. In order
to understand monitoring requirements for performance
and fault management, you need to have the multi-layer
metadata readily available for reconciliation. In this
session, we will go through some scenarios and
workflows to demonstrate how CA Technologies solutions
solves these problems.
Timothy Diep
CA Technologies
Director,
Product Management
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHY CA AND SDN/NFV?
ADDRESSING CHALLENGES OF SDN/NFV
MANAGEMENT NEEDS OF SDN/NFV ENVIRONMENTS
INTRO TO CA VIRTUAL NETWORK ASSURANCE
EARLY ADOPTER USE CASES
1
2
3
4
5
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Why Is CA Involved In SDN/NFV?
Our customers are deploying SDN/NFV
AT&T to virtualize 75% of its
network by 2020
Fidelity, Intel, Verizon,
CenturyLink, Comcast, BT,
Barclays, Rackspace, Bell Canada…
45% of Enterprise expect to increase
their investments in SD-WAN over the
next two yearsJohn Donavan, Senior EVP, AT&T IHS Infonetics, 2015
And CA is The Assurance Expert
Products
SPECTRUM
Experience Added Capabilities
Unified Infrastructure Management
Performance Management
Application Performance Management
20 years in Network Management
Multi-vendor normalization IP
Open Source Contribution
Access Security
DevOps
Eco-system partners
BUT THERE ARE PROBLEMS IN ASSURING THESE NETWORKS
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What are the Challenges Facing SDN/NFV Assurance?
MONITORINGPROVISIONING
g
COMPLEX LAYERING
Correlation w/ underlay relationship tracking
VULNERABILITY
The data-plane will crack
AUTOMATION
Auto-healing
MIGRATION
How to reuse existing assets
VELOCITY
Staying on top of relationship, visualization
END-USER DRIVEN
Service Chains, Subscribers, Tenants
The Old Network
Controller
Cloud
Orch. Service
Orch.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Unraveling The New Stack
Controller
Cloud
Orch. Service
Orch.
How do I keep track of the
relationship between these layers
when it is constantly transforming
Where is a weak performance spot
in this stack and what do I monitor
to stay on top of it
How do I relate stack performance
to the health of the service chain
How is the overlay using these
resources? Are these CAPEX
resources optimized
How do I rebuild the stack when
each layer comes from different
systems
How is the performance of this
stack relate to the performance of
the older part of my network
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Management Needs For SDN/NFV Assurance
 Evolving Existing Tools
– Dissect the Multi-layer stack
– Pinpoint known weak areas
– Get closer to real-time
– Capitalize on service chain
– Participate in auto-healing
– Managing the old and the new
 Beyond Infrastructure Management
– Access Security
– Inter-Org DevOps
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA’s Solution to the Assurance Challenges
CA Virtual Network Assurance
CA UIM
CA PM
MULTI-VENDOR
SESSION BROKER
Normalizes data
from Collector and
multi-vendor
variants and applies
relationship map to
track correlation
MULTI-PURPOSE
OPEN COLLECTOR
Provides multiple
means of collecting
real-time high
volume inventory
and performance
data from SDN-NFV
environments
CA Virtual Network Assurance
The ability to reuse existing
asset and integrating
underlay knowledge
Integrated Hybrid
Monitoring
Visibility, Correlation, Planning,
and Proactive Safeguarding
Auto-Healing (Future)
Service Chain Grouping and
Building Blocks, Tenant
Grouping
Service Chain & Multi-
tenant Awareness
Injecting policy
enforcements, metrics for
application-aware routing
Multi-Layer Inventory
Tracking and Performance
Monitoring provisioning
systems’ integrity, access,
accuracy against policy,,
health, and security
Authority (Future)
CA Spectrum®
CA APM
3rd parties
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Performance Management
CA Spectrum®
MULTI-VENDOR
SESSION BROKER
MULTI-PURPOSE
OPEN COLLECTORService Chain
Service Chain
Traditional Networks
REST-Websocket
UIM Data Model
Light weight,
Universal, adaptable
to new entities
Inventory Engine
Relationship Tracking
Reconciliation
Normalizes unstructured
data from disparate sources
Policy Enforcement Driver
Pushes normalized decisions
from clients to disparate
ecosystems
Extensible Plugin
Allows for fast and
OOB certification of
new ecosystem
components
Open
Collector
Flexible,
Multi-
protocol
collector
allows for
easy
expansion
RESTsetupandWebsocketdelivery
adaptstotransientenvironments
Multi-Tenancy
Multi-Tenancy
CA Virtual Network Assurance
OpenStack Cloud
Network Virtualization
SDN/NFV
PERFORMANCE MANAGEMENT - CAPM
• SDN/NFV Dashboards
• Service Chain Building Block View
FAULT MANAGEMENT - SPECTRUM
• New Topology
• Service Chain Spotlight
VNA v1.0
• Multi-Vendor, Multi-OpenSource Systems
• Virtual Inventory & Performance Collection
• Dynamic Relationship Tracking
• Uniform, extensible data model
• Poll/Push data transfer
• Supports CAPM & SPECTRUM
OpenStack Juno
OpenStack Kilo
Open-Contrail
ODL Helium
OOB Plugin
Virtual Network Assurance 1.0 Overview
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Virtual Network Assurance 1.0 Features
*Overlay-Underlay Topology
*Multi-Layer Correlation
*SDN Fault Isolation
*Service Chain Building Block View
*SDN/NFV Lifecycle Trend
*SDN/NFV Resource Utilization Dashboard
*OVS Data-Plane Performance
*Integrated VNA & SNMP metrics
*Multi-Vendor Data Normalization
*OOB Plugin for new systems
*Near real-time Inventory Discovery
*Service Chain & vCPE use cases
*Contrail Maestro
*Oracle NSO
*Checkpoint VNF
*OpenStack Juno
*OpenStack Kilo
*OpenContrail
*NSX-MH
*ODL Helium
*OVSDB
CA PM 2.7 SPECTRUM 10.0 P
Subscription
VNA1.0
Subscription
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Service Chain Connects Infrastructure to End-users
Provides the necessary linkage
between end-user experience &
infrastructure
A tangible entity to
apply/aggregate traditional
assurance metrics and analytics
A trusted resource to validate that
your customers are getting the
services they need
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Early Adopters/Use Cases
vCPE - Working with a North American CSP who is deploying a vCPE service for their Enterprise Business Services.
Key challenges involve how to integrate discovery workflow in a hybrid SNMP and NFV environment
SD Data Center - Working with a large Tech Enterprise to gain visibility into their deployed SDDC. Key challenges
involve providing visibility into self-serviced usage and production/non-production population
SDN Core - Working with a Mega North American CSP on providing performance monitoring of their SDN controlled
core networks with specific interest in understanding the systems performance and impact on infrastructure
SD WAN - Working with a North American customer in providing performance analytics on the application routing
aspect of SD WAN
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agile Gateway Architecture
Multi-vendor and
Open Source
SDN/NFV
Ecosystem
Components
CA and 3rd
party Client
Systems
REST-Websocket
UIM Data Model
Light weight,
Universal, adaptable
to new entities
Inventory Engine
Relationship Tracking
Reconciliation
Normalizes unstructured
data from disparate sources
Policy Enforcement Driver
Pushes normalized decisions
from clients to disparate
ecosystems
Extensible Plugin
Allows for fast and
OOB certification of
new ecosystem
components
Open
Collector
Flexible,
Multi-
protocol
collector
allows for
easy
expansion
RESTsetupandWebsocketdelivery
adaptstotransientenvironments
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Key Technologies
Unified Data Model
 We implement a standard data
model to the clients that hides all the
disparate location of information
from infrastructure systems
Integrated Metrics
 We implement a standard data
model to the clients that hides all the
disparate location of information
from infrastructure systems
Relationship Mapping
 We implement a scheme to track
each layer independently and how it
relates to adjacent layers
OOB Plugin
 We can certify new infrastructure
systems independent of the VNA
release train
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How to Start Assuring SDN/NFV
 Fault Management
– I want to see Overlay in relation to the Underlay Topology
– I want to see topology that the Service Chain traverses
– I want to correlate in real-time the relationship between all the layers
– I want to isolate an event in the underlay to the affected overlay component
 Performance Management
– I want to see the self-serviced inventories & its lifecycle trends
– I want to see how much resources are being utilized
– I want to threshold on the vulnerable layers are in this virtualized network
– I want to understand the complete building blocks of service chains
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Demo/Lab
Recommended Sessions
SESSION # TITLE DATE/TIME
DO5T15S
Case Study: Intel Corporation – The Benefits of, and
Need for Agile Operations in Network Transformation
(DevOps Theater 5)
11/18/2015 at 12:15pm
DO5X131S
Case Study: Bell Canada Evolves Traditional Performance
& Fault Systems for Software-Defined Networking (SDN)
& Network Functions Virtualization (NFV) (Breakers D)
11/19/2015 at 3:00 pm
DO5T27T
Tech Talk: Introduction to CA Virtual Network Assurance
(Theater 5)
11/19/2015 at 3:45 pm
DO5X153S
Juniper Networks, Tech Mahindra and CA Technologies
Discuss New Perspectives and Partnerships for Design
and Assruance of SDN/NFV
11/19/2015 at 4:30 pm
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Deploy SDN/NFV
without Adding
More Monitoring
Tools
CA Virtual Network
Assurance
Theater 5
CA UIM
CA Unified
Infrastructure
Management
Theater 5
Integrate Event
Mgmt, Fault
Isolation and Root
Cause Analysis
CA Spectrum
Theater 5
Ensure Service
Delivery Across
Complex
Infrastructures
CA Performance
Management
Theater 5
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow On Conversations At…
Tech Talks
Intro to CA Virtual
Network Assurance
3:45pm-4:15pm
Thursday, Nov 19
Theater 5
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...CA Technologies
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...CA Technologies
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned WayCA Technologies
 
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...CA Technologies
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...CA Technologies
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
CA Service Virtualization vs mocks stubs
CA Service Virtualization vs mocks stubsCA Service Virtualization vs mocks stubs
CA Service Virtualization vs mocks stubsAlan Baptista
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)CA Technologies
 
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...CA Technologies
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...CA Technologies
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresCA Technologies
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentCA Technologies
 
Getting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentGetting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentCA Technologies
 
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With CA ...
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With  CA ...Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With  CA ...
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With CA ...CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep DiveCA Technologies
 
Mainframe Storage Management, Disaster Recovery and Archival Best Practice
Mainframe Storage Management, Disaster Recovery and Archival Best PracticeMainframe Storage Management, Disaster Recovery and Archival Best Practice
Mainframe Storage Management, Disaster Recovery and Archival Best PracticeCA Technologies
 
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...CA Technologies
 

What's hot (20)

Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
Pre-Con Education: Migrating to CA Release Automation 5.5.2 to Exploit New ...
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned Way
 
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
Best Practice for Supercharging CA Workload Automation dSeries (DE) for Optim...
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
CA Service Virtualization vs mocks stubs
CA Service Virtualization vs mocks stubsCA Service Virtualization vs mocks stubs
CA Service Virtualization vs mocks stubs
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
Maximizing Your CA Datacom® Investment for the New Application Economy (Part 2)
 
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
Desjardins Group Leverages CA Workload Automation as It Begins Its DevOps Jou...
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization NightmaresIt's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
It's Not a Dream—Conquer Chaos for Your DB2® for z/OS® Optimization Nightmares
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App Development
 
Getting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 InvestmentGetting the Most Out of Your DB2 Investment
Getting the Most Out of Your DB2 Investment
 
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With CA ...
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With  CA ...Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With  CA ...
Extend Your Catalog of Artifacts and Breeze Through Your Next Audit With CA ...
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep Dive
 
Mainframe Storage Management, Disaster Recovery and Archival Best Practice
Mainframe Storage Management, Disaster Recovery and Archival Best PracticeMainframe Storage Management, Disaster Recovery and Archival Best Practice
Mainframe Storage Management, Disaster Recovery and Archival Best Practice
 
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
 

Viewers also liked

Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy
 
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...Cloud Native Day Tel Aviv
 
Ensuring Successful OPNFV-based NFV Deployments | QualiTest Group
Ensuring Successful OPNFV-based NFV Deployments | QualiTest GroupEnsuring Successful OPNFV-based NFV Deployments | QualiTest Group
Ensuring Successful OPNFV-based NFV Deployments | QualiTest GroupQualitest
 
Testing - the gatekeeper for quality in NFV
Testing - the gatekeeper for quality in NFVTesting - the gatekeeper for quality in NFV
Testing - the gatekeeper for quality in NFVQualitest
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeADVA
 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyYun Zhi Lin
 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and FriendsYun Zhi Lin
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...Adi Gazit Blecher
 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0WebNMS
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...CA Technologies
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)Apigee | Google Cloud
 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkOpen Networking Summits
 
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...CA Technologies
 
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...CA Technologies
 
Spark cassandra connector.API, Best Practices and Use-Cases
Spark cassandra connector.API, Best Practices and Use-CasesSpark cassandra connector.API, Best Practices and Use-Cases
Spark cassandra connector.API, Best Practices and Use-CasesDuyhai Doan
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecturesidneel
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 

Viewers also liked (20)

Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
 
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...
Marco Ughetti, Telecom Italia - Validating the Operationality of NFV Infrastr...
 
Ensuring Successful OPNFV-based NFV Deployments | QualiTest Group
Ensuring Successful OPNFV-based NFV Deployments | QualiTest GroupEnsuring Successful OPNFV-based NFV Deployments | QualiTest Group
Ensuring Successful OPNFV-based NFV Deployments | QualiTest Group
 
Testing - the gatekeeper for quality in NFV
Testing - the gatekeeper for quality in NFVTesting - the gatekeeper for quality in NFV
Testing - the gatekeeper for quality in NFV
 
Assuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network EdgeAssuring Superior VNF Performance at the Network Edge
Assuring Superior VNF Performance at the Network Edge
 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security Journey
 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and Friends
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)
 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's Network
 
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrow’s Networks: The Impacts of SDN and Network Virtualization o...
 
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...Juniper Networks®, Tech Mahindra & CA  Discuss New Perspectives & Partnership...
Juniper Networks®, Tech Mahindra & CA Discuss New Perspectives & Partnership...
 
Spark cassandra connector.API, Best Practices and Use-Cases
Spark cassandra connector.API, Best Practices and Use-CasesSpark cassandra connector.API, Best Practices and Use-Cases
Spark cassandra connector.API, Best Practices and Use-Cases
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 

Similar to How To Track Performance and Fault in a Multi-layer, Software-Defined Network (SDN) Environment

Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...CA Technologies
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...CA Technologies
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service VirtualizationCA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...CA Technologies
 
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...CA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...CA Technologies
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12CA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCA Technologies
 

Similar to How To Track Performance and Fault in a Multi-layer, Software-Defined Network (SDN) Environment (20)

Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service Virtualization
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
Tech Talk: CA Workload Automation Agent Monitor, Agents and Advanced Integrat...
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
 
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
See It Live - Single Pane of Glass Enterprise Monitoring with CA Unified Infr...
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 

Recently uploaded (20)

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 

How To Track Performance and Fault in a Multi-layer, Software-Defined Network (SDN) Environment

  • 1. How To Track Performance and Fault in a Multi-layer, Software-Defined Network (SDN) Environment Timothy Diep DevOps: Agile Ops CA Technologies Director, Product Management DO5X89E @timdiep #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Software-Defined Networking (SDN) adds virtual and logical layers to the underlying physical network. In order to understand monitoring requirements for performance and fault management, you need to have the multi-layer metadata readily available for reconciliation. In this session, we will go through some scenarios and workflows to demonstrate how CA Technologies solutions solves these problems. Timothy Diep CA Technologies Director, Product Management
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHY CA AND SDN/NFV? ADDRESSING CHALLENGES OF SDN/NFV MANAGEMENT NEEDS OF SDN/NFV ENVIRONMENTS INTRO TO CA VIRTUAL NETWORK ASSURANCE EARLY ADOPTER USE CASES 1 2 3 4 5
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Why Is CA Involved In SDN/NFV? Our customers are deploying SDN/NFV AT&T to virtualize 75% of its network by 2020 Fidelity, Intel, Verizon, CenturyLink, Comcast, BT, Barclays, Rackspace, Bell Canada… 45% of Enterprise expect to increase their investments in SD-WAN over the next two yearsJohn Donavan, Senior EVP, AT&T IHS Infonetics, 2015 And CA is The Assurance Expert Products SPECTRUM Experience Added Capabilities Unified Infrastructure Management Performance Management Application Performance Management 20 years in Network Management Multi-vendor normalization IP Open Source Contribution Access Security DevOps Eco-system partners BUT THERE ARE PROBLEMS IN ASSURING THESE NETWORKS
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What are the Challenges Facing SDN/NFV Assurance? MONITORINGPROVISIONING g COMPLEX LAYERING Correlation w/ underlay relationship tracking VULNERABILITY The data-plane will crack AUTOMATION Auto-healing MIGRATION How to reuse existing assets VELOCITY Staying on top of relationship, visualization END-USER DRIVEN Service Chains, Subscribers, Tenants The Old Network Controller Cloud Orch. Service Orch.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Unraveling The New Stack Controller Cloud Orch. Service Orch. How do I keep track of the relationship between these layers when it is constantly transforming Where is a weak performance spot in this stack and what do I monitor to stay on top of it How do I relate stack performance to the health of the service chain How is the overlay using these resources? Are these CAPEX resources optimized How do I rebuild the stack when each layer comes from different systems How is the performance of this stack relate to the performance of the older part of my network
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Management Needs For SDN/NFV Assurance  Evolving Existing Tools – Dissect the Multi-layer stack – Pinpoint known weak areas – Get closer to real-time – Capitalize on service chain – Participate in auto-healing – Managing the old and the new  Beyond Infrastructure Management – Access Security – Inter-Org DevOps
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA’s Solution to the Assurance Challenges CA Virtual Network Assurance CA UIM CA PM MULTI-VENDOR SESSION BROKER Normalizes data from Collector and multi-vendor variants and applies relationship map to track correlation MULTI-PURPOSE OPEN COLLECTOR Provides multiple means of collecting real-time high volume inventory and performance data from SDN-NFV environments CA Virtual Network Assurance The ability to reuse existing asset and integrating underlay knowledge Integrated Hybrid Monitoring Visibility, Correlation, Planning, and Proactive Safeguarding Auto-Healing (Future) Service Chain Grouping and Building Blocks, Tenant Grouping Service Chain & Multi- tenant Awareness Injecting policy enforcements, metrics for application-aware routing Multi-Layer Inventory Tracking and Performance Monitoring provisioning systems’ integrity, access, accuracy against policy,, health, and security Authority (Future) CA Spectrum® CA APM 3rd parties
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Performance Management CA Spectrum® MULTI-VENDOR SESSION BROKER MULTI-PURPOSE OPEN COLLECTORService Chain Service Chain Traditional Networks REST-Websocket UIM Data Model Light weight, Universal, adaptable to new entities Inventory Engine Relationship Tracking Reconciliation Normalizes unstructured data from disparate sources Policy Enforcement Driver Pushes normalized decisions from clients to disparate ecosystems Extensible Plugin Allows for fast and OOB certification of new ecosystem components Open Collector Flexible, Multi- protocol collector allows for easy expansion RESTsetupandWebsocketdelivery adaptstotransientenvironments Multi-Tenancy Multi-Tenancy CA Virtual Network Assurance OpenStack Cloud Network Virtualization SDN/NFV PERFORMANCE MANAGEMENT - CAPM • SDN/NFV Dashboards • Service Chain Building Block View FAULT MANAGEMENT - SPECTRUM • New Topology • Service Chain Spotlight VNA v1.0 • Multi-Vendor, Multi-OpenSource Systems • Virtual Inventory & Performance Collection • Dynamic Relationship Tracking • Uniform, extensible data model • Poll/Push data transfer • Supports CAPM & SPECTRUM OpenStack Juno OpenStack Kilo Open-Contrail ODL Helium OOB Plugin Virtual Network Assurance 1.0 Overview
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Virtual Network Assurance 1.0 Features *Overlay-Underlay Topology *Multi-Layer Correlation *SDN Fault Isolation *Service Chain Building Block View *SDN/NFV Lifecycle Trend *SDN/NFV Resource Utilization Dashboard *OVS Data-Plane Performance *Integrated VNA & SNMP metrics *Multi-Vendor Data Normalization *OOB Plugin for new systems *Near real-time Inventory Discovery *Service Chain & vCPE use cases *Contrail Maestro *Oracle NSO *Checkpoint VNF *OpenStack Juno *OpenStack Kilo *OpenContrail *NSX-MH *ODL Helium *OVSDB CA PM 2.7 SPECTRUM 10.0 P Subscription VNA1.0 Subscription
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Service Chain Connects Infrastructure to End-users Provides the necessary linkage between end-user experience & infrastructure A tangible entity to apply/aggregate traditional assurance metrics and analytics A trusted resource to validate that your customers are getting the services they need
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Early Adopters/Use Cases vCPE - Working with a North American CSP who is deploying a vCPE service for their Enterprise Business Services. Key challenges involve how to integrate discovery workflow in a hybrid SNMP and NFV environment SD Data Center - Working with a large Tech Enterprise to gain visibility into their deployed SDDC. Key challenges involve providing visibility into self-serviced usage and production/non-production population SDN Core - Working with a Mega North American CSP on providing performance monitoring of their SDN controlled core networks with specific interest in understanding the systems performance and impact on infrastructure SD WAN - Working with a North American customer in providing performance analytics on the application routing aspect of SD WAN
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agile Gateway Architecture Multi-vendor and Open Source SDN/NFV Ecosystem Components CA and 3rd party Client Systems REST-Websocket UIM Data Model Light weight, Universal, adaptable to new entities Inventory Engine Relationship Tracking Reconciliation Normalizes unstructured data from disparate sources Policy Enforcement Driver Pushes normalized decisions from clients to disparate ecosystems Extensible Plugin Allows for fast and OOB certification of new ecosystem components Open Collector Flexible, Multi- protocol collector allows for easy expansion RESTsetupandWebsocketdelivery adaptstotransientenvironments
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Key Technologies Unified Data Model  We implement a standard data model to the clients that hides all the disparate location of information from infrastructure systems Integrated Metrics  We implement a standard data model to the clients that hides all the disparate location of information from infrastructure systems Relationship Mapping  We implement a scheme to track each layer independently and how it relates to adjacent layers OOB Plugin  We can certify new infrastructure systems independent of the VNA release train
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How to Start Assuring SDN/NFV  Fault Management – I want to see Overlay in relation to the Underlay Topology – I want to see topology that the Service Chain traverses – I want to correlate in real-time the relationship between all the layers – I want to isolate an event in the underlay to the affected overlay component  Performance Management – I want to see the self-serviced inventories & its lifecycle trends – I want to see how much resources are being utilized – I want to threshold on the vulnerable layers are in this virtualized network – I want to understand the complete building blocks of service chains
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Demo/Lab
  • 18. Recommended Sessions SESSION # TITLE DATE/TIME DO5T15S Case Study: Intel Corporation – The Benefits of, and Need for Agile Operations in Network Transformation (DevOps Theater 5) 11/18/2015 at 12:15pm DO5X131S Case Study: Bell Canada Evolves Traditional Performance & Fault Systems for Software-Defined Networking (SDN) & Network Functions Virtualization (NFV) (Breakers D) 11/19/2015 at 3:00 pm DO5T27T Tech Talk: Introduction to CA Virtual Network Assurance (Theater 5) 11/19/2015 at 3:45 pm DO5X153S Juniper Networks, Tech Mahindra and CA Technologies Discuss New Perspectives and Partnerships for Design and Assruance of SDN/NFV 11/19/2015 at 4:30 pm
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Deploy SDN/NFV without Adding More Monitoring Tools CA Virtual Network Assurance Theater 5 CA UIM CA Unified Infrastructure Management Theater 5 Integrate Event Mgmt, Fault Isolation and Root Cause Analysis CA Spectrum Theater 5 Ensure Service Delivery Across Complex Infrastructures CA Performance Management Theater 5
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow On Conversations At… Tech Talks Intro to CA Virtual Network Assurance 3:45pm-4:15pm Thursday, Nov 19 Theater 5
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15