SlideShare a Scribd company logo
1 of 18
Identifying the needle in the 10/40/100G haystackSharon Besser, VP Technologies Net Optics  Intelligent Access and Monitoring Architecture
Goal  Present a methodology and solution of leveraging access switching to overcome current and future Lawful Interception challenges
Net Optics In a Nutshell  Customers Financial, Telco, Healthcare & Government 85% of the Fortune 100 50% of the Fortune 500 7000 Global Deployments Highlights Founded in 1996, Private, Self-Funded 55 Quarters of Growth & Profitability Strong Management Team Sales Offices in New York, Atlanta, Germany 300 plus new direct customers annually  Go to Market Strategy 30% Direct Sales 25% OEM/Partner Relationship 45% Global Channel Technology 20+ Patents and Patent Pending Requests
Cause and Effect  Industry / Networking  Data Center  Lawful Interception
Industry Trends Expanding continuous layering of new applications ,[object Object],Expanding compliance requirements  ,[object Object],Increasing internal and external intrusions ,[object Object],Convergence of voice, data and video traffic ,[object Object],Networks becoming faster and more complex ,[object Object],[object Object]
Passive monitoring of Inter-VM traffic is MIA ToR and 10G copper switch implementation  ,[object Object]
ToR and EoR deployments increase monitoring oversubscription Convergence of data and storage  ,[object Object],[object Object]
Unique Operational Challenges with 10G Net Optics observe exponential growth of 10G network deployments. Some common LI deployment challenges: Lack of tools ,[object Object]
Tools ability to operate at line rate with low latency Quality ,[object Object],Ridiculous cost  ,[object Object]
Leveraging existing investments of 1G tools
Cost of knowledge, migration, operations  TCOSource: Net Optics Customer Advisory Board 7/2010
Other Technical Challenges Jitter, Oversubscription and Blocking are more severe with 10G networks:  Switching oversubscription takes place when two input ports forward all the packets to the same output port ,[object Object],Substantial latency variability and jitter can be introduced under moderate or low traffic condition as well due to head of line blocking ,[object Object]
Resource contention might happen when two packets arrive from separate input ports to the same output port (e.g. uplink) at about the same time,[object Object]
Oversubscription Source: Cisco
What Customers Want Meet Lawful interception challenges in high capacity networks But how?
The LI Foundation: Reliable Copy  End user 1 End user 2 Application  Application  Interception Node Transport Transport Network Network Network Link + Physical  Link + Physical  Link + Physical  Copy LEA Site LEMF Application  Application  Transport Transport Network Network Link + Physical  Link + Physical  Source: ETSI TR 101 943 Concepts of Interception in a Generic Network Architecture
Current Approach Is Not Scalable  Invest in new systems capable to handle 10G/40G/100G  Packet duplication add burden on the network Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN
The Solution: Leveraging Access Switching  Leveraging Access Switching  ,[object Object],Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN

More Related Content

What's hot

IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingRamneek Kalra
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?Fastly
 
Keepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge ComputingKeepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge ComputingKeepler Data Tech
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computingSyam Madanapalli
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalJohn Soldatos
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge ComputingMaria Gorlatova
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisNitinder Mohan
 
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...Joseph Kuo
 
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Fastly
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...Intellipaat
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the IndustryWilliam Liang
 

What's hot (20)

Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 
Edge computing
Edge computingEdge computing
Edge computing
 
Keepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge ComputingKeepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge Computing
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
 
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the Industry
 
Edge computing
Edge computingEdge computing
Edge computing
 

Similar to Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event

Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldArief Gunawan
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber futureMelanie Brandt
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
5 g latin america april 2019 network densification requirements v1.0
5 g latin america april 2019   network densification requirements v1.05 g latin america april 2019   network densification requirements v1.0
5 g latin america april 2019 network densification requirements v1.0Alberto Boaventura
 
Challenges opportunities 2017 onwards v5.0.
Challenges opportunities 2017   onwards v5.0.Challenges opportunities 2017   onwards v5.0.
Challenges opportunities 2017 onwards v5.0.frankjoh
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Alberto Boaventura
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014Pascal Thubert
 
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...Edward Mutafungwa
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015ProjectENhANCE
 
Richard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard Renwei Li
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...MohammadSwerki2
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumvideos
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNAbbie Barbir
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFASTAnn Treacy
 
Intelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraIntelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraQualcomm Research
 

Similar to Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event (20)

MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet world
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber future
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
5 g latin america april 2019 network densification requirements v1.0
5 g latin america april 2019   network densification requirements v1.05 g latin america april 2019   network densification requirements v1.0
5 g latin america april 2019 network densification requirements v1.0
 
Challenges opportunities 2017 onwards v5.0.
Challenges opportunities 2017   onwards v5.0.Challenges opportunities 2017   onwards v5.0.
Challenges opportunities 2017 onwards v5.0.
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
 
Richard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdf
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Noticias tel dic
Noticias tel dicNoticias tel dic
Noticias tel dic
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFAST
 
Intelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraIntelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G era
 

More from LiveAction Next Generation Network Management Software

More from LiveAction Next Generation Network Management Software (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event

  • 1. Identifying the needle in the 10/40/100G haystackSharon Besser, VP Technologies Net Optics Intelligent Access and Monitoring Architecture
  • 2. Goal Present a methodology and solution of leveraging access switching to overcome current and future Lawful Interception challenges
  • 3. Net Optics In a Nutshell Customers Financial, Telco, Healthcare & Government 85% of the Fortune 100 50% of the Fortune 500 7000 Global Deployments Highlights Founded in 1996, Private, Self-Funded 55 Quarters of Growth & Profitability Strong Management Team Sales Offices in New York, Atlanta, Germany 300 plus new direct customers annually Go to Market Strategy 30% Direct Sales 25% OEM/Partner Relationship 45% Global Channel Technology 20+ Patents and Patent Pending Requests
  • 4. Cause and Effect Industry / Networking Data Center Lawful Interception
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11. Cost of knowledge, migration, operations  TCOSource: Net Optics Customer Advisory Board 7/2010
  • 12.
  • 13.
  • 15. What Customers Want Meet Lawful interception challenges in high capacity networks But how?
  • 16. The LI Foundation: Reliable Copy End user 1 End user 2 Application Application Interception Node Transport Transport Network Network Network Link + Physical Link + Physical Link + Physical Copy LEA Site LEMF Application Application Transport Transport Network Network Link + Physical Link + Physical Source: ETSI TR 101 943 Concepts of Interception in a Generic Network Architecture
  • 17. Current Approach Is Not Scalable Invest in new systems capable to handle 10G/40G/100G Packet duplication add burden on the network Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN
  • 18.
  • 19. Access Switching: Do More With Less 10/40/100Load Balancing Share the load between multiple tools Centralized intelligence for more endpoint Leverage existing / cheap / 1G tools Plan for growth Pre-filter w/ DPI to detect desired traffic on any port Pre-filtering is a mature technology DPI allows to identify data of interest and forward to the monitoring/recording tool GRE tunneling Distribute the collection infrastructure Cloud Monitoring Inter-VM and cloud based monitoring Any type of media Fiber, copper or both
  • 20. Summary Modern and advanced Access switching technology provides the scalable solution to meet Lawful Interception challenges in high capacity networks by focusing on improving collection infrastructure

Editor's Notes

  1. Capture – CC (Content of Communication) and IRI (Intercept Related Information) related to the subject are extracted from the network.Filtering – information related to the subject that falls within the topic of the inquiry is separated from accidentally gathered information, and formatted to a pre-defined delivery formatDelivery – requested information is delivered to the LEMF The Administration Function (ADMF) receives interception ordersfrom the LEA and hands them over to• Internal Intercept Functions (IIF), which are located tactically within network nodes and generate the two desired types of information, CC and IRI.• Mediation Functions (MF) take charge of delineation between thetwo networks. They implement Internal Network Interfaces (INI),which may be proprietary, to communicate within the PTN, andstandardized interfaces, to deliver requested information to one ormoreLEMFs.
  2. From Cisco:The switch fabric performs the duplication of the original filtered packet. One packet is forwarded to the egress line card. The other packet is forwarded to the Route Processor or to the SIP-400 for LI hardware acceleration.