SlideShare a Scribd company logo
High Scalability Network Monitoring for 
Communications Service Providers 
CA Performance Management’s Modern Multi-Tiered Carrier-Grade Architecture 
David Hayward 
Senior Principal Manager 
CA Technologies 
December 2014 
Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos 
referenced herein belong to their respective companies.
2 
Capture Your Share of Mobile Traffic Growing 11X 2013 through 
2018 
Respond to changing consumer & business behavior 
Deploy Next Generation 
LTE &VoLTE 
Networks 
Make & monetize significant network investments 
Deploy WiFi Offload, 
Ethernet Backhaul, Carrier Ethernet, Optical & Microwave Transport 
Build a new ecosystem of technologies & partners 
Infrastructure Management must be End-to- End, Proactive & Efficient 
Monitoring must scale & integrate OSSes & BSSes to automate 
zero touch & optimize NoCs 
Assure good customer experience•End-user preference for mobile applications and communications is driving service provider market growth. •To capture new revenue and market share, mobile service providers must expand their network footprint and capacity, as well as evolve their networks from 2G/3G infrastructure to 4G LTE (long-term evolution) and voice-over LTE infrastructure. •Cable broadband and other non-mobile communications service providers can participate in this market by offering WiFi-offload and backhaul services to mobile carriers. And they can grow revenue by satisfying demand from businesses for managed data center, cloud and Internet connectivity and managed WiFi services. •But to assure good customer experience as application workloads and networks grow and become more complex, Network Operations Center (NOC) teams require monitoring tools with vast new capabilities. 
Communications Service Provider (CSP) Business Opportunities and OperationalChallenges 
Continually evolve & optimize with the business 
Opportunities 
Challenges
3 
Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 
1.Scalability: Unified, high-scale monitoring at low cost 
2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 
3. Extensibility: Open architecture 
to integrate information, 
automate processes and 
extend functionality
4 
Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 
1.Scalability: Unified, high-scale monitoring at low cost 
2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 
3. Extensibility: Open architecture 
to integrate information, 
automate processes and 
extend functionality 
Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions.
5 
Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 
1.Scalability: Unified, high-scale monitoring at low cost 
2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 
3. Extensibility: Open architecture 
to integrate information, 
automate processes and 
extend functionality 
Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions. 
Need to put more power into the hands of Operations and Engineers — so they are more productive and less dependent upon administrative support.
6 
Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 
1.Scalability: Unified, high-scale monitoring at low cost 
2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 
3. Extensibility: Open architecture 
to integrate information, 
automate processes and 
extend functionality 
Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions. 
Need to put more power into the hands of Operations and Engineers — so they are more productive and less dependent upon administrative support. 
Need to increase efficiency through OSS-BSS integration for zero-touch monitoring self-certification of monitored devices and customized thresholding.
7 
AGGREGATION & 
BACKHAUL 
Intra 
Region 
SDH/DWM 
Inter 
Region 
DWDM 
EVOLVED PACKET 
CORE 
MME 
S-GW 
CPG PCRF 
P-GW 
HSS / AAA 
IP MULTIMEDIA 
SUBSYSTEMS 
APPLICATIONS 
Voice Call Continuity 
Presence 
SMS / IM 
Voice Mail 
CSCF 
IP 
CR 
CR 
Consumer 
User Equipment 
Enterprise 
User Equipment 
RAN/ACCESS 
eNodeB 
eNodeB 
NodeB 
NodeB 
MW 
Transport Network 
IP/SNMP 
Non-SNMP 
IP/SNMP 
Scalability Requirements 
Depth, Breadth and Volume Modern network monitoring and 
analytics solution 
MSE 
• Assuring good user experience and your ability to maintain service level agreements are paramount to your reputation, 
customer loyalty and revenue. 
• Dumb pipes, siloed tools and reactive monitoring of your network domains are inadequate for today’s service provider market. 
• Instead, instrumentation and analytics must be intelligent and end-to-end across the entire service delivery path so you know 
how and where network incidents impact users and how trends will impact users unless they are not proactively addressed. 
• This requires a single monitoring solution that can monitor and analyze a massive amount of granular SNMP and nonSNMP 
devices from a wide range of equipment vendors and across all network technology domains.
8 
Scalability Requirements 
Architectural Principles 
Multi-Tiered 
Architecture 
Linear Polling 
Massive Storage 
Scale-Optimized 
Visualization 
HTTP 8581 
TCP 5433 
TCP 61616 
HTTP 8181 
Data Aggregator (DA) 
CA Performance Center 
Data Collectors (DC) 
... ... 
Client 
Data Aggregator Repository 
Modern, Multi-Tiered Carrier-Grade Architecture 
• Monitoring today’s large, complex networks 
requires tools built on an entirely new Multi- 
Tiered Architecture that provides very high scale 
at low cost. 
• Based upon a centralized cluster of host servers – 
each for a specific function – this architecture 
enables very high performance data collection 
and analytical processing that requires half or less 
than half the host servers of older-generation 
monitoring tools. 
• The architecture’s efficient polling engines 
(i.e., collectors) scale monitoring linearly and at 
low cost by requiring a fraction of additional 
servers required by older-generation tools. 
• Newer database technology enables warehousing 
of hundreds of terabytes of data on a small host 
foot-print, making them available for deep 
analytics for incident management and trending 
for capacity planning and proactive problem 
avoidance. 
• Dashboards are optimized for reading and visually 
correlating a massive amount of key performance 
indicators. The architecture is designed to 
eliminate bottlenecks found in older-generation 
monitoring tools to ensure instant population of 
dashboards and reports with metrics and analysis.
9 
Scalability Requirements 
Economical Architecture 
Multi-Tiered 
Architecture 
Linear Polling 
Massive Storage 
Scale-Optimized 
Visualization 
HTTP 8581 
TCP 5433 
TCP 61616 
HTTP 8181 
Data Aggregator (DA) 
CA Performance Center 
Data Collectors (DC) 
... ... 
Client 
Data Aggregator Repository 
• Communications Service Provider 
Deployment 
• Solution: 1 instance of CA 
Performance Management 
• Monitoring: 
• 15K SNMP Routers 
 ≈ 2.7M SNMP Items 
• 130 Non-SNMP Devices 
 ≈ 20K Non-SNMP Items 
• Configuration: 
• 14-Blade Chassis 
• Including redundancy for data storage 
and room to grow 
Modern network monitoring 
and analytics solution 
• Example of a modern, high-scalability monitoring 
solution in production at a large mobile wireless 
communications service provider. 
• The solution’s modern, Multi-Tiered Architecture is 
based on a centralized cluster of servers, each 
hosting a specific function (data collection, 
aggregation/analysis, storage, etc.). 
• This optimizes monitoring by overcoming the 
inefficiencies and bottlenecks found in older 
Distributed Polling and Data Storage Architectures 
and Peer-to-Peer Appliance-Based Architectures. 
Modern, Multi-Tiered Carrier-Grade Architecture
10 
Case StudyMobile Wireless Carrier 
• Enhance network coverage, call quality and data speeds for customers across the U.S. 
• Build a new network to extend 4G services and improve 3G the experience. 
• Routers at cell stations at 90 percent utilization. 
• Limited visibility of health of devices providing network services. 
• Roll out thousands of new devices across 12K sites. 
• Reduce operating costs. 
Solution 
•Enhance services to reduce 3G customer churn. 
•Offer new revenue- generating 4G services and build market share. 
•Easily accommodate additional spectrum bands. 
•Reduce operating costs. 
•Improve environmental sustainability. 
•Net return of 2X the new network cost over 10 years. 
Challenge 
Benefits 
•CA Performance Management monitors 50K SNMP and 15K non-SNMP network devices. 
–Integrated with CA Network Flow Analysis 
•Roll-out new multi-mode base-station devices to consolidate multiple network technologies into one new, seamless network. 
–Performance, availability, capacity and flow KPIs and thresholds. 
Solution
11 
Case StudyMulti-System Operator (MSO) 
• Improve the existing end- user experience to retain customers. 
• Leverage infrastructure that delivers the residential services to expand into voice, data and video solutions business. 
• Provide consistent performance of contracted business services and demonstrate that SLAs are being met. 
Solution 
•Modernize service delivery platform. 
•Bring new offerings to market in a consistent and reliable approach. 
•Streamline and accelerate new service delivery and customer on-boarding. 
•Minimize churn with assurance of new services. 
Challenge 
Benefits 
•CA Performance Management monitors 25K network devices for HS Data, VoD, Switched Digital Video, Burstable Billing and more. 
• Enterprise, Small Business 
and Mobile Carrier Services 
–Managed Services to the 
Premises 
–Managed Services 
including Premises Devices 
–Managed WiFi 
–Traffic Management 
–Unified Communications 
Management 
–Carrier Ethernet Backhaul 
Solution
For more information, see 
CA Performance Management at 
www.ca.com 
CA Performance Management is a big data 
collection, warehousing and analytics 
solution that helps communications service 
providers maximize return on their network 
infrastructure investments and lower the 
cost of network operations.
13 
For Informational Purposes Only 
Terms of this Presentation 
This presentation was based on current information and resource allocations as of August 2014 and is subject to change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis.In the event of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall govern. 
Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No unauthorized copying or distribution permitted. 
Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belongto their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.

More Related Content

What's hot

Service Virtualization 101
Service Virtualization 101Service Virtualization 101
Service Virtualization 101
Stefana Muller
 
CA Service Virtualization
CA Service VirtualizationCA Service Virtualization
CA Service Virtualization
Pablo Gutierrez
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
CA Technologies
 
Reinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service VirtualizationReinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service Virtualization
CA Technologies
 
Hands-On Lab: Mobile Integration
Hands-On Lab: Mobile IntegrationHands-On Lab: Mobile Integration
Hands-On Lab: Mobile Integration
CA Technologies
 
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference SessionWhat's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
Stefana Muller
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
CA Technologies
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
CA Technologies
 
Continuous Testing through Service Virtualization
Continuous Testing through Service VirtualizationContinuous Testing through Service Virtualization
Continuous Testing through Service Virtualization
TechWell
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
CA Technologies
 
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
CA Technologies
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013
Min Fang
 
Improve Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAsImprove Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAs
CA Technologies
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Technologies
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
CA Technologies
 
How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...
CA Technologies
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
CA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
CA Technologies
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
CA Technologies
 
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
CA Technologies
 

What's hot (20)

Service Virtualization 101
Service Virtualization 101Service Virtualization 101
Service Virtualization 101
 
CA Service Virtualization
CA Service VirtualizationCA Service Virtualization
CA Service Virtualization
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Reinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service VirtualizationReinventing Application Performance Testing with Service Virtualization
Reinventing Application Performance Testing with Service Virtualization
 
Hands-On Lab: Mobile Integration
Hands-On Lab: Mobile IntegrationHands-On Lab: Mobile Integration
Hands-On Lab: Mobile Integration
 
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference SessionWhat's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
What's New in CA Service Virtualization 8.0 - CA World Pre-Conference Session
 
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA TechnologiesPre-Con Education: Introduction to Mainframe Academy With CA Technologies
Pre-Con Education: Introduction to Mainframe Academy With CA Technologies
 
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom ProviderRemoving Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
Removing Crucial Dependencies to Enable KPN as a Virtual Telecom Provider
 
Continuous Testing through Service Virtualization
Continuous Testing through Service VirtualizationContinuous Testing through Service Virtualization
Continuous Testing through Service Virtualization
 
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...Predicting When Your Applications Will Go Off the Rails!  Managing DB2 Appli...
Predicting When Your Applications Will Go Off the Rails! Managing DB2 Appli...
 
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
Sneak Peak into Self-Service, Cross-Enterprise, Job Scheduling with CA Worklo...
 
Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013Service Virtualization - Next Gen Testing Conference Singapore 2013
Service Virtualization - Next Gen Testing Conference Singapore 2013
 
Improve Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAsImprove Network Latency and Hold Service Providers to SLAs
Improve Network Latency and Hold Service Providers to SLAs
 
CA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and GreatestCA Service Virtualization 9.0—What's the Latest and Greatest
CA Service Virtualization 9.0—What's the Latest and Greatest
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
 
How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...How to Increase User Accountability by Eliminating the Default User in Unix S...
How to Increase User Accountability by Eliminating the Default User in Unix S...
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
 
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
Hands-On Lab: Test Drive the Enhanced HTML5 Dashboard Designer With Release 8...
 

Viewers also liked

Monitoring temporary populations through cellular core network data
Monitoring temporary populations through cellular core network dataMonitoring temporary populations through cellular core network data
Monitoring temporary populations through cellular core network data
Beniamino Murgante
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
Pluribus Networks
 
High Performance Spatial-Temporal Trajectory Analysis with Spark
High Performance Spatial-Temporal Trajectory Analysis with Spark High Performance Spatial-Temporal Trajectory Analysis with Spark
High Performance Spatial-Temporal Trajectory Analysis with Spark
DataWorks Summit/Hadoop Summit
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
Rob Dunn
 
Technical Analysis Rudramurthy
Technical Analysis   RudramurthyTechnical Analysis   Rudramurthy
Technical Analysis Rudramurthy
Gorani & Associates
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
Seth Familian
 

Viewers also liked (6)

Monitoring temporary populations through cellular core network data
Monitoring temporary populations through cellular core network dataMonitoring temporary populations through cellular core network data
Monitoring temporary populations through cellular core network data
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
 
High Performance Spatial-Temporal Trajectory Analysis with Spark
High Performance Spatial-Temporal Trajectory Analysis with Spark High Performance Spatial-Temporal Trajectory Analysis with Spark
High Performance Spatial-Temporal Trajectory Analysis with Spark
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Technical Analysis Rudramurthy
Technical Analysis   RudramurthyTechnical Analysis   Rudramurthy
Technical Analysis Rudramurthy
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 

Similar to High Scalability Network Monitoring for Communications Service Providers

How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!Tonya Williams
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
kimw001
 
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications
srikanth reddy
 
Skt.2013.innovation technology for future convergence network
Skt.2013.innovation technology for future convergence networkSkt.2013.innovation technology for future convergence network
Skt.2013.innovation technology for future convergence network
son6971
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme ExperienceAEC Networks
 
NovoNet Vision and Operators' Perspective for ONAP
NovoNet Vision and Operators' Perspective for ONAPNovoNet Vision and Operators' Perspective for ONAP
NovoNet Vision and Operators' Perspective for ONAP
ITU
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G Research
Sabelo Dlamini
 
Dslf Broadband Suitefor Caba
Dslf Broadband Suitefor CabaDslf Broadband Suitefor Caba
Dslf Broadband Suitefor CabaCABA
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeriaOwoeye Opeyemi
 
intelligent-automation-guide.pdf
intelligent-automation-guide.pdfintelligent-automation-guide.pdf
intelligent-automation-guide.pdf
ssuser818de4
 
Exhibitor session: Ciena
Exhibitor session: CienaExhibitor session: Ciena
Exhibitor session: Ciena
Jisc
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
idrajeev
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Mitchell Menezes
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
nerdic
 
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153	Enterprise Application to Infrastructure Integration – SDN AppsDEVNET-1153	Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
Cisco DevNet
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN Apps
MiftakhZein1
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
MyNOG
 
Baker Charlie
Baker CharlieBaker Charlie
Baker CharlieCarl Ford
 
0702_metro_optical
0702_metro_optical0702_metro_optical
0702_metro_opticalhungtru
 

Similar to High Scalability Network Monitoring for Communications Service Providers (20)

How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
China Mobile - OpenStack Summit 2016/Red Hat Mini NFV Summit
 
Smart grid communications
Smart grid communicationsSmart grid communications
Smart grid communications
 
Skt.2013.innovation technology for future convergence network
Skt.2013.innovation technology for future convergence networkSkt.2013.innovation technology for future convergence network
Skt.2013.innovation technology for future convergence network
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme Experience
 
NovoNet Vision and Operators' Perspective for ONAP
NovoNet Vision and Operators' Perspective for ONAPNovoNet Vision and Operators' Perspective for ONAP
NovoNet Vision and Operators' Perspective for ONAP
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G Research
 
Dslf Broadband Suitefor Caba
Dslf Broadband Suitefor CabaDslf Broadband Suitefor Caba
Dslf Broadband Suitefor Caba
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeria
 
intelligent-automation-guide.pdf
intelligent-automation-guide.pdfintelligent-automation-guide.pdf
intelligent-automation-guide.pdf
 
Exhibitor session: Ciena
Exhibitor session: CienaExhibitor session: Ciena
Exhibitor session: Ciena
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
 
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153	Enterprise Application to Infrastructure Integration – SDN AppsDEVNET-1153	Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN Apps
 
Hierarchical Network Controller
Hierarchical Network ControllerHierarchical Network Controller
Hierarchical Network Controller
 
Baker Charlie
Baker CharlieBaker Charlie
Baker Charlie
 
0702_metro_optical
0702_metro_optical0702_metro_optical
0702_metro_optical
 
MSI Company
MSI CompanyMSI Company
MSI Company
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

High Scalability Network Monitoring for Communications Service Providers

  • 1. High Scalability Network Monitoring for Communications Service Providers CA Performance Management’s Modern Multi-Tiered Carrier-Grade Architecture David Hayward Senior Principal Manager CA Technologies December 2014 Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
  • 2. 2 Capture Your Share of Mobile Traffic Growing 11X 2013 through 2018 Respond to changing consumer & business behavior Deploy Next Generation LTE &VoLTE Networks Make & monetize significant network investments Deploy WiFi Offload, Ethernet Backhaul, Carrier Ethernet, Optical & Microwave Transport Build a new ecosystem of technologies & partners Infrastructure Management must be End-to- End, Proactive & Efficient Monitoring must scale & integrate OSSes & BSSes to automate zero touch & optimize NoCs Assure good customer experience•End-user preference for mobile applications and communications is driving service provider market growth. •To capture new revenue and market share, mobile service providers must expand their network footprint and capacity, as well as evolve their networks from 2G/3G infrastructure to 4G LTE (long-term evolution) and voice-over LTE infrastructure. •Cable broadband and other non-mobile communications service providers can participate in this market by offering WiFi-offload and backhaul services to mobile carriers. And they can grow revenue by satisfying demand from businesses for managed data center, cloud and Internet connectivity and managed WiFi services. •But to assure good customer experience as application workloads and networks grow and become more complex, Network Operations Center (NOC) teams require monitoring tools with vast new capabilities. Communications Service Provider (CSP) Business Opportunities and OperationalChallenges Continually evolve & optimize with the business Opportunities Challenges
  • 3. 3 Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 1.Scalability: Unified, high-scale monitoring at low cost 2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 3. Extensibility: Open architecture to integrate information, automate processes and extend functionality
  • 4. 4 Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 1.Scalability: Unified, high-scale monitoring at low cost 2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 3. Extensibility: Open architecture to integrate information, automate processes and extend functionality Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions.
  • 5. 5 Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 1.Scalability: Unified, high-scale monitoring at low cost 2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 3. Extensibility: Open architecture to integrate information, automate processes and extend functionality Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions. Need to put more power into the hands of Operations and Engineers — so they are more productive and less dependent upon administrative support.
  • 6. 6 Network Monitoring Requirements For Today’s Application and Mobile-Driven CSP Market 1.Scalability: Unified, high-scale monitoring at low cost 2.Flexibility: Intelligent analytics easily customized, unified dashboards and reports 3. Extensibility: Open architecture to integrate information, automate processes and extend functionality Need to monitor your entire SNMP/NonSNMP environment with a single tool at high scale without the hardware and administrative costs of other solutions. Need to put more power into the hands of Operations and Engineers — so they are more productive and less dependent upon administrative support. Need to increase efficiency through OSS-BSS integration for zero-touch monitoring self-certification of monitored devices and customized thresholding.
  • 7. 7 AGGREGATION & BACKHAUL Intra Region SDH/DWM Inter Region DWDM EVOLVED PACKET CORE MME S-GW CPG PCRF P-GW HSS / AAA IP MULTIMEDIA SUBSYSTEMS APPLICATIONS Voice Call Continuity Presence SMS / IM Voice Mail CSCF IP CR CR Consumer User Equipment Enterprise User Equipment RAN/ACCESS eNodeB eNodeB NodeB NodeB MW Transport Network IP/SNMP Non-SNMP IP/SNMP Scalability Requirements Depth, Breadth and Volume Modern network monitoring and analytics solution MSE • Assuring good user experience and your ability to maintain service level agreements are paramount to your reputation, customer loyalty and revenue. • Dumb pipes, siloed tools and reactive monitoring of your network domains are inadequate for today’s service provider market. • Instead, instrumentation and analytics must be intelligent and end-to-end across the entire service delivery path so you know how and where network incidents impact users and how trends will impact users unless they are not proactively addressed. • This requires a single monitoring solution that can monitor and analyze a massive amount of granular SNMP and nonSNMP devices from a wide range of equipment vendors and across all network technology domains.
  • 8. 8 Scalability Requirements Architectural Principles Multi-Tiered Architecture Linear Polling Massive Storage Scale-Optimized Visualization HTTP 8581 TCP 5433 TCP 61616 HTTP 8181 Data Aggregator (DA) CA Performance Center Data Collectors (DC) ... ... Client Data Aggregator Repository Modern, Multi-Tiered Carrier-Grade Architecture • Monitoring today’s large, complex networks requires tools built on an entirely new Multi- Tiered Architecture that provides very high scale at low cost. • Based upon a centralized cluster of host servers – each for a specific function – this architecture enables very high performance data collection and analytical processing that requires half or less than half the host servers of older-generation monitoring tools. • The architecture’s efficient polling engines (i.e., collectors) scale monitoring linearly and at low cost by requiring a fraction of additional servers required by older-generation tools. • Newer database technology enables warehousing of hundreds of terabytes of data on a small host foot-print, making them available for deep analytics for incident management and trending for capacity planning and proactive problem avoidance. • Dashboards are optimized for reading and visually correlating a massive amount of key performance indicators. The architecture is designed to eliminate bottlenecks found in older-generation monitoring tools to ensure instant population of dashboards and reports with metrics and analysis.
  • 9. 9 Scalability Requirements Economical Architecture Multi-Tiered Architecture Linear Polling Massive Storage Scale-Optimized Visualization HTTP 8581 TCP 5433 TCP 61616 HTTP 8181 Data Aggregator (DA) CA Performance Center Data Collectors (DC) ... ... Client Data Aggregator Repository • Communications Service Provider Deployment • Solution: 1 instance of CA Performance Management • Monitoring: • 15K SNMP Routers  ≈ 2.7M SNMP Items • 130 Non-SNMP Devices  ≈ 20K Non-SNMP Items • Configuration: • 14-Blade Chassis • Including redundancy for data storage and room to grow Modern network monitoring and analytics solution • Example of a modern, high-scalability monitoring solution in production at a large mobile wireless communications service provider. • The solution’s modern, Multi-Tiered Architecture is based on a centralized cluster of servers, each hosting a specific function (data collection, aggregation/analysis, storage, etc.). • This optimizes monitoring by overcoming the inefficiencies and bottlenecks found in older Distributed Polling and Data Storage Architectures and Peer-to-Peer Appliance-Based Architectures. Modern, Multi-Tiered Carrier-Grade Architecture
  • 10. 10 Case StudyMobile Wireless Carrier • Enhance network coverage, call quality and data speeds for customers across the U.S. • Build a new network to extend 4G services and improve 3G the experience. • Routers at cell stations at 90 percent utilization. • Limited visibility of health of devices providing network services. • Roll out thousands of new devices across 12K sites. • Reduce operating costs. Solution •Enhance services to reduce 3G customer churn. •Offer new revenue- generating 4G services and build market share. •Easily accommodate additional spectrum bands. •Reduce operating costs. •Improve environmental sustainability. •Net return of 2X the new network cost over 10 years. Challenge Benefits •CA Performance Management monitors 50K SNMP and 15K non-SNMP network devices. –Integrated with CA Network Flow Analysis •Roll-out new multi-mode base-station devices to consolidate multiple network technologies into one new, seamless network. –Performance, availability, capacity and flow KPIs and thresholds. Solution
  • 11. 11 Case StudyMulti-System Operator (MSO) • Improve the existing end- user experience to retain customers. • Leverage infrastructure that delivers the residential services to expand into voice, data and video solutions business. • Provide consistent performance of contracted business services and demonstrate that SLAs are being met. Solution •Modernize service delivery platform. •Bring new offerings to market in a consistent and reliable approach. •Streamline and accelerate new service delivery and customer on-boarding. •Minimize churn with assurance of new services. Challenge Benefits •CA Performance Management monitors 25K network devices for HS Data, VoD, Switched Digital Video, Burstable Billing and more. • Enterprise, Small Business and Mobile Carrier Services –Managed Services to the Premises –Managed Services including Premises Devices –Managed WiFi –Traffic Management –Unified Communications Management –Carrier Ethernet Backhaul Solution
  • 12. For more information, see CA Performance Management at www.ca.com CA Performance Management is a big data collection, warehousing and analytics solution that helps communications service providers maximize return on their network infrastructure investments and lower the cost of network operations.
  • 13. 13 For Informational Purposes Only Terms of this Presentation This presentation was based on current information and resource allocations as of August 2014 and is subject to change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis.In the event of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall govern. Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No unauthorized copying or distribution permitted. Copyright © 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belongto their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.