SlideShare a Scribd company logo
Case Study: Sprint Monitors Its Mega-Network for
Voice/Video/Data Service Assurance with CA
Performance Management
Mike Peterson
Sprint
Wireless Core Planner
Session Number
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Case Study: Sprint Monitors Its Mega-Network for
Voice/Video/Data Service Assurance with CA
Performance Management
3
11/19/2015
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Agenda
• General Business Case
• Size and Scope of Environment
• Groups
• Dashboards
• Scorecards
4
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
General Business Case
5
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
General Business Case
Network Planning and Performance
• Scale the network to exceed customer demand in the most cost effective manner possible.
• Ensure the network operates at peak performance.
Challenges
• Report and forecast utilization on over 400,000 interfaces.
• Monitor and alarm on device components and interfaces for anomalous behavior.
• Provide clear and concise reporting.
• Respond to ad hoc reporting requests quickly.
• Develop ‘flow based’ reporting and use Top N reporting sparingly.
• Keep up with evolving devices, designs and scale.
6
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Size and Scope of Environment
7
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Size and Scope of Environment
Components
• Over 40,000 physical locations.
• More than 50,000 devices and 2 million interfaces.
• A wide array of networking devices and manufacturers.
• Wireless Core accounts for 6% of the devices and interfaces.
Data Points
• 2.2 million components polled every polling cycle, 288 cycles per day.
• 4.4 trillion data points:
• 91% of the 4.4 trillion is a combination of five minute polled and calculated metrics retained for 45 days.
• The remainder is hourly and daily roll-ups.
8
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Size and Scope of Environment
Calculations and Notifications
• Three metric projections on Bits In and Bits Out.
• Baselines and standard deviations for utilization and component performance.
• Threshold notifications sent to email recipients and external monitoring systems.
Users
• Application is available to all employees.
• Operations:
• Viewing performance in near real time
• Analyzing historical performance for RCA (Root Cause Analysis)
• Engineering:
• Capacity planning utilizing trending
• Performance metric trending
9
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups
10
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups
Challenges
• We have too many interfaces for a user to be able to effectively build reports by searching.
• We wanted to put most of our interfaces into at least one group.
• We needed to be able to group similar interfaces across 30+ sites.
• There are users that have no working knowledge of the Wireless Core.
• Downstream customers need groups that fit their view of the network.
• Management has stated a preference for contextual reporting, minimizing Top N.
11
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups
Observations / Experience
• The true power of the platform is in groups.
• The flexibility of groups is a powerful feature, enabling limitless reporting combinations.
• We based our primary group organization around our sites. Each site has many interface
groupings; the group structure is common across sites.
• Our groups use rules instead of manually selecting members.
• Rules can be very simple, containing only other groups.
• They can also be very complex and powerful by leveraging regular expressions.
• Outside of the site structure we can easily build other group containers by using references.
Because we are using text/pattern matching on interface descriptions, established interface naming
and description conventions must be strictly followed.
12
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups
13
• A site’s interface types or functions are identified and grouped.
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups | By Site
14
• Each of the groups within the
site are grouped together as a
site group.
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups | By Interface Groupings
15
• Individual interface groupings
are tied together across all of
the sites.
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups | By Platform
16
• Devices are grouped similar to
interfaces.
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Groups | Example
17
• Sites are the primary groups
containing the various
interface functional types.
• Interface groups contain
reference groups from the
sites.
• Within the sites, top level
groups will contain all
associated interfaces.
Subordinate level (aggregate)
groups contain just the
LAG/Bundle.
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Dashboards
18
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Dashboards
• We rely heavily on dashboards for our capacity planning activities.
• The dashboard views we favor the most are IM Table (Top) and IM Custom View Group Scorecard.
• The default Dashboards are excellent, especially Router, Interface and Group.
• 50% of our published dashboards are locked to a specific group.
• Trend graphs and tabular views offer unique but equally valuable insights.
• Users are allowed to edit any dashboard and save changes to only their account. They can also
build their own without cluttering the Performance Manager menus.
19
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Dashboards
20
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Dashboards
21
• IM Table (Top) – Used both by Operations and Planning
• Useful for data extractions (csv)
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Dashboards
22
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Scorecards
23
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Scorecards
• Scorecards have proven to be the most useful dashboard view.
• To fully realize their potential, a lot of time and care needs to be spent on group administration.
Group hierarchy is key.
• Two types of scorecards are used:
• Dynamic Context – Any group can be viewed;
• Locked Context – Specific groups are chosen and locked to the dashboard. We use these for high profile
interfaces.
• Scorecard strengths:
• The ability to view at a summary level many interfaces at once;
• The ability to drill deeper into the data;
• Metric projections;
• Identifying out-of-balance interface members in LAGs/Bundles.
24
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Scorecards
25
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#MoveForward
Scorecards
26
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management

More Related Content

What's hot

Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
CA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
CA Technologies
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
CA Technologies
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business Impact
CA Technologies
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
CA Technologies
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
CA Technologies
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
CA Technologies
 
CA Mobile Content Management – for smart mobile collaboration
CA Mobile Content Management – for smart mobile collaborationCA Mobile Content Management – for smart mobile collaboration
CA Mobile Content Management – for smart mobile collaboration
CA Technologies
 
Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...
CA Technologies
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
CA Technologies
 
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricBusiness Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
CA Technologies
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
CA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
CA Technologies
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
CA Technologies
 
Agile 101 For The Enterprise
Agile 101 For The EnterpriseAgile 101 For The Enterprise
Agile 101 For The Enterprise
CA Technologies
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
CA Technologies
 
Dispatches from the Front: How IoT is Becoming a Game Changer
Dispatches from the Front: How IoT is Becoming a Game ChangerDispatches from the Front: How IoT is Becoming a Game Changer
Dispatches from the Front: How IoT is Becoming a Game Changer
CA Technologies
 

What's hot (20)

Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
 
Automate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business ImpactAutomate Hadoop Jobs with Real World Business Impact
Automate Hadoop Jobs with Real World Business Impact
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
API Management SaaS 2.0: Growing with the Digital Economy
API Management SaaS 2.0:  Growing with the Digital EconomyAPI Management SaaS 2.0:  Growing with the Digital Economy
API Management SaaS 2.0: Growing with the Digital Economy
 
CA Mobile Content Management – for smart mobile collaboration
CA Mobile Content Management – for smart mobile collaborationCA Mobile Content Management – for smart mobile collaboration
CA Mobile Content Management – for smart mobile collaboration
 
Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...Automate and Accelerate Software Development Time and Deliver Superior Busine...
Automate and Accelerate Software Development Time and Deliver Superior Busine...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration FabricBusiness Transformation: PwC Presents Its Viewpoint on the Integration Fabric
Business Transformation: PwC Presents Its Viewpoint on the Integration Fabric
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
 
Agile 101 For The Enterprise
Agile 101 For The EnterpriseAgile 101 For The Enterprise
Agile 101 For The Enterprise
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
 
Dispatches from the Front: How IoT is Becoming a Game Changer
Dispatches from the Front: How IoT is Becoming a Game ChangerDispatches from the Front: How IoT is Becoming a Game Changer
Dispatches from the Front: How IoT is Becoming a Game Changer
 

Viewers also liked

StartPoint - Sprint 1
StartPoint - Sprint 1StartPoint - Sprint 1
StartPoint - Sprint 1
Michel Bruchet
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
Stephen Eilers
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun Rajagopal
Jim St. Leger
 
David_Amzallag _NFV and the future of the OSS - TMF2013
David_Amzallag  _NFV and the future of the OSS - TMF2013David_Amzallag  _NFV and the future of the OSS - TMF2013
David_Amzallag _NFV and the future of the OSS - TMF2013David Amzallag
 
Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Banking at Ho Chi Minh city
 
Gaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentGaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentDataWorks Summit
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinalAmeya Parab
 
Hiranandani Fortune City Panvel
Hiranandani Fortune City PanvelHiranandani Fortune City Panvel
Hiranandani Fortune City Panvel
Home Realty
 
SI - The Creative BPO - Case Study
SI - The Creative BPO - Case StudySI - The Creative BPO - Case Study
SI - The Creative BPO - Case StudyGVS Chintamani
 
Property4you
Property4youProperty4you
Property4you
Bhawesh Jha
 
Sidhartha sector 113
Sidhartha sector 113Sidhartha sector 113
Sidhartha sector 113
gulshanhomz2996
 
Nus sims dfs_case study No
Nus sims dfs_case study NoNus sims dfs_case study No
Nus sims dfs_case study NoJayant Nath
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connect
udiazdeleon
 
8 Urban Growth Intro To Informal Case Study Intro
8 Urban Growth Intro To Informal Case Study Intro8 Urban Growth Intro To Informal Case Study Intro
8 Urban Growth Intro To Informal Case Study IntroEcumene
 
Our millenium city (Gurgaon)
Our millenium city (Gurgaon)Our millenium city (Gurgaon)
Our millenium city (Gurgaon)scottishigh
 

Viewers also liked (16)

StartPoint - Sprint 1
StartPoint - Sprint 1StartPoint - Sprint 1
StartPoint - Sprint 1
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun Rajagopal
 
David_Amzallag _NFV and the future of the OSS - TMF2013
David_Amzallag  _NFV and the future of the OSS - TMF2013David_Amzallag  _NFV and the future of the OSS - TMF2013
David_Amzallag _NFV and the future of the OSS - TMF2013
 
Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...
 
Gaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentGaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate Environment
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal
 
Hiranandani Fortune City Panvel
Hiranandani Fortune City PanvelHiranandani Fortune City Panvel
Hiranandani Fortune City Panvel
 
Lasisi Elp Presentation
Lasisi Elp PresentationLasisi Elp Presentation
Lasisi Elp Presentation
 
SI - The Creative BPO - Case Study
SI - The Creative BPO - Case StudySI - The Creative BPO - Case Study
SI - The Creative BPO - Case Study
 
Property4you
Property4youProperty4you
Property4you
 
Sidhartha sector 113
Sidhartha sector 113Sidhartha sector 113
Sidhartha sector 113
 
Nus sims dfs_case study No
Nus sims dfs_case study NoNus sims dfs_case study No
Nus sims dfs_case study No
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connect
 
8 Urban Growth Intro To Informal Case Study Intro
8 Urban Growth Intro To Informal Case Study Intro8 Urban Growth Intro To Informal Case Study Intro
8 Urban Growth Intro To Informal Case Study Intro
 
Our millenium city (Gurgaon)
Our millenium city (Gurgaon)Our millenium city (Gurgaon)
Our millenium city (Gurgaon)
 

Similar to Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management

Workplace-as-a-Service Presentation
Workplace-as-a-Service PresentationWorkplace-as-a-Service Presentation
Workplace-as-a-Service PresentationDanny Runnels
 
Oracle’s PeopleSoft Interaction Hub
Oracle’s PeopleSoft Interaction HubOracle’s PeopleSoft Interaction Hub
Oracle’s PeopleSoft Interaction Hub
Grafic.guru
 
Harnessing Hadoop Distuption: A Telco Case Study
Harnessing Hadoop Distuption: A Telco Case StudyHarnessing Hadoop Distuption: A Telco Case Study
Harnessing Hadoop Distuption: A Telco Case Study
DataWorks Summit
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
VerizonFinalPresentation_TomCruz
VerizonFinalPresentation_TomCruzVerizonFinalPresentation_TomCruz
VerizonFinalPresentation_TomCruzTom Cruz
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
Gene Kim
 
How Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized ProgressHow Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized Progress
MongoDB
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
NguyenNM
 
Software Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier PerspectiveSoftware Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier Perspective
Open Networking Summits
 
2009 Sprint Developers Conference - Location Based Services - Best Practices ...
2009 Sprint Developers Conference - Location Based Services - Best Practices ...2009 Sprint Developers Conference - Location Based Services - Best Practices ...
2009 Sprint Developers Conference - Location Based Services - Best Practices ...
Sean Barbeau
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
Curtis Serna
 
LiveViewGPS Hours Of Service Presentation
LiveViewGPS Hours Of Service PresentationLiveViewGPS Hours Of Service Presentation
LiveViewGPS Hours Of Service Presentation
George Karonis
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
AlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
ARIV4
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
Lancope, Inc.
 
HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)
Rocket Software
 
Fast Data Overview
Fast Data OverviewFast Data Overview
Fast Data Overview
C. Scyphers
 
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland MeetupFast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland Meetup
C. Scyphers
 

Similar to Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management (20)

MaaS Value Prop
MaaS Value PropMaaS Value Prop
MaaS Value Prop
 
Workplace-as-a-Service Presentation
Workplace-as-a-Service PresentationWorkplace-as-a-Service Presentation
Workplace-as-a-Service Presentation
 
Oracle’s PeopleSoft Interaction Hub
Oracle’s PeopleSoft Interaction HubOracle’s PeopleSoft Interaction Hub
Oracle’s PeopleSoft Interaction Hub
 
Harnessing Hadoop Distuption: A Telco Case Study
Harnessing Hadoop Distuption: A Telco Case StudyHarnessing Hadoop Distuption: A Telco Case Study
Harnessing Hadoop Distuption: A Telco Case Study
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
VerizonFinalPresentation_TomCruz
VerizonFinalPresentation_TomCruzVerizonFinalPresentation_TomCruz
VerizonFinalPresentation_TomCruz
 
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at VerizonDOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
DOES SFO 2016 - Ross Clanton and Chivas Nambiar - DevOps at Verizon
 
How Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized ProgressHow Verizon Uses Disruptive Developments for Organized Progress
How Verizon Uses Disruptive Developments for Organized Progress
 
Engage3-25
Engage3-25Engage3-25
Engage3-25
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Software Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier PerspectiveSoftware Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier Perspective
 
2009 Sprint Developers Conference - Location Based Services - Best Practices ...
2009 Sprint Developers Conference - Location Based Services - Best Practices ...2009 Sprint Developers Conference - Location Based Services - Best Practices ...
2009 Sprint Developers Conference - Location Based Services - Best Practices ...
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
 
LiveViewGPS Hours Of Service Presentation
LiveViewGPS Hours Of Service PresentationLiveViewGPS Hours Of Service Presentation
LiveViewGPS Hours Of Service Presentation
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)HADR Best Practices (High Availability Disaster Recovery)
HADR Best Practices (High Availability Disaster Recovery)
 
Fast Data Overview
Fast Data OverviewFast Data Overview
Fast Data Overview
 
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland MeetupFast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland Meetup
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management

  • 1. Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management Mike Peterson Sprint Wireless Core Planner Session Number
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Assurance with CA Performance Management 3 11/19/2015
  • 4. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Agenda • General Business Case • Size and Scope of Environment • Groups • Dashboards • Scorecards 4
  • 5. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward General Business Case 5
  • 6. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward General Business Case Network Planning and Performance • Scale the network to exceed customer demand in the most cost effective manner possible. • Ensure the network operates at peak performance. Challenges • Report and forecast utilization on over 400,000 interfaces. • Monitor and alarm on device components and interfaces for anomalous behavior. • Provide clear and concise reporting. • Respond to ad hoc reporting requests quickly. • Develop ‘flow based’ reporting and use Top N reporting sparingly. • Keep up with evolving devices, designs and scale. 6
  • 7. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Size and Scope of Environment 7
  • 8. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Size and Scope of Environment Components • Over 40,000 physical locations. • More than 50,000 devices and 2 million interfaces. • A wide array of networking devices and manufacturers. • Wireless Core accounts for 6% of the devices and interfaces. Data Points • 2.2 million components polled every polling cycle, 288 cycles per day. • 4.4 trillion data points: • 91% of the 4.4 trillion is a combination of five minute polled and calculated metrics retained for 45 days. • The remainder is hourly and daily roll-ups. 8
  • 9. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Size and Scope of Environment Calculations and Notifications • Three metric projections on Bits In and Bits Out. • Baselines and standard deviations for utilization and component performance. • Threshold notifications sent to email recipients and external monitoring systems. Users • Application is available to all employees. • Operations: • Viewing performance in near real time • Analyzing historical performance for RCA (Root Cause Analysis) • Engineering: • Capacity planning utilizing trending • Performance metric trending 9
  • 10. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups 10
  • 11. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups Challenges • We have too many interfaces for a user to be able to effectively build reports by searching. • We wanted to put most of our interfaces into at least one group. • We needed to be able to group similar interfaces across 30+ sites. • There are users that have no working knowledge of the Wireless Core. • Downstream customers need groups that fit their view of the network. • Management has stated a preference for contextual reporting, minimizing Top N. 11
  • 12. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups Observations / Experience • The true power of the platform is in groups. • The flexibility of groups is a powerful feature, enabling limitless reporting combinations. • We based our primary group organization around our sites. Each site has many interface groupings; the group structure is common across sites. • Our groups use rules instead of manually selecting members. • Rules can be very simple, containing only other groups. • They can also be very complex and powerful by leveraging regular expressions. • Outside of the site structure we can easily build other group containers by using references. Because we are using text/pattern matching on interface descriptions, established interface naming and description conventions must be strictly followed. 12
  • 13. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups 13 • A site’s interface types or functions are identified and grouped.
  • 14. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups | By Site 14 • Each of the groups within the site are grouped together as a site group.
  • 15. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups | By Interface Groupings 15 • Individual interface groupings are tied together across all of the sites.
  • 16. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups | By Platform 16 • Devices are grouped similar to interfaces.
  • 17. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Groups | Example 17 • Sites are the primary groups containing the various interface functional types. • Interface groups contain reference groups from the sites. • Within the sites, top level groups will contain all associated interfaces. Subordinate level (aggregate) groups contain just the LAG/Bundle.
  • 18. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Dashboards 18
  • 19. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Dashboards • We rely heavily on dashboards for our capacity planning activities. • The dashboard views we favor the most are IM Table (Top) and IM Custom View Group Scorecard. • The default Dashboards are excellent, especially Router, Interface and Group. • 50% of our published dashboards are locked to a specific group. • Trend graphs and tabular views offer unique but equally valuable insights. • Users are allowed to edit any dashboard and save changes to only their account. They can also build their own without cluttering the Performance Manager menus. 19
  • 20. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Dashboards 20
  • 21. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Dashboards 21 • IM Table (Top) – Used both by Operations and Planning • Useful for data extractions (csv)
  • 22. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Dashboards 22
  • 23. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Scorecards 23
  • 24. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Scorecards • Scorecards have proven to be the most useful dashboard view. • To fully realize their potential, a lot of time and care needs to be spent on group administration. Group hierarchy is key. • Two types of scorecards are used: • Dynamic Context – Any group can be viewed; • Locked Context – Specific groups are chosen and locked to the dashboard. We use these for high profile interfaces. • Scorecard strengths: • The ability to view at a summary level many interfaces at once; • The ability to drill deeper into the data; • Metric projections; • Identifying out-of-balance interface members in LAGs/Bundles. 24
  • 25. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Scorecards 25
  • 26. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #MoveForward Scorecards 26

Editor's Notes

  1. General Business Case – Capacity Management and Performance Size and Scope of Environment Value of Grouping – Pattern Matching, network ‘slice’ (by, site, interface groupings, vendor, flows, etc) Dashboards – IM Table Top (If time allows MultiView, canned [interface, device, group] Scorecards – Aggregates, sites, flows Data Extraction – OpenAPI – Tableau
  2. Planning - Place augments in time with a capacity that allows for cost effective incremental growth. Try to time capital expenditures to the last minute without EVER causing a constraint. Reporting – Should be easy to understand and have relevant impact, the executive levels don’t live and breath this stuff like engineers do Tracking flows from A to Z, especially useful during troubleshooting, it is nearly difficult to find issues in data paths using only top n
  3. 40,000 locations - Cell towers to aggregating POPs to regional data centers to national data centers Devices – many devices unique to carriers (gateways, MME, etc.)
  4. Linear regression / least squares – near (90 day), short (180 day) and long term (365 day) projections. Standard Dev & baseline for interface utilization, errors, discards, mem, CPU, etc. Notifications – Email and SNMP traps Operations – Fault and performance Engineering – Planning and performance
  5. Our experience with eHealth showed that building reports through searching had serious limitations. The first was the limit of how many could be selected, the other was the painful process of actually performing the search. While using eHealth it became quite clear that we should try to ensure that as many elements as possible were contained in groups. Group labeling and structure was going to important if downstream customers were to be able to use CAPM.
  6. There are many open and closed source platforms that can collect SNMP, we’ve found the group administration to be the most powerful asset. During an internal demonstration management was able to see the value immediately. The design of our network in some ways informed us how to structure the groups. If it exists in the network it must be performing a function, therefore that function can be described and in turn that description can be the name of a group. The big “Ah Ha” was when we figured out how groups can be reported in the scorecards. Assumptions that were made on group structure were in some ways wrong and some of the group structures we built had to be scraped. Reference groups allow for new interface groupings to be built without having to replicate the rule sets. Example – We might have groups that contain router to firewall links at every site, if we need a group that contains those links in a top level group all we have to do is build references.
  7. IM Table (Top) is like a Swiss army knife, just about every metric family is available to view, works equally well on interfaces and devices, performance or capacity.
  8. (Assume we have an example of metric projection) – Even though management dislikes Top N reports, they still have value to operations (NOC) We have other versions of this view that aren’t locked to groups, that allows extremely focused views of specific interface (or device) groupings