SlideShare a Scribd company logo
1 of 34
APIs for the digital service
ecosystem
Michel Burger
Chief Architect R&D
Distinguished Engineer
michel.burger@vodafone.com
Confidentiality level on slide master
Most Requested API by startups
1. Provisioning
2. Identity
3. Charging
4. User Validation
5. SSO
Option 12
Confidentiality level on slide masterOption 13
Services
that run on
top of
Services
that run
better with
Services
that are
running by
Type of Back End Services
No Integration
Commercial Agreement
(ex: pre embedded client)
Operated externally
Multi level of integration
(light to deep)
Commercial Agreement
(ex: charge to bill)
Generally operated externally
Deep integration
Product or work package done by
vendor or internally developed
Generally operated internally
Differentiation Potential Revenue
Intrinsic Drive and Incentive
Strategic Choice
Confidentiality level on slide master
Basic Enabler
Access
1 2 3 4 5
Ī±
Ī²
Ī³
Ī“
Vodafone
Identity
SSOFederated
User Profile
CRM
REST
Analytics
Cloud
System
Mgmt
User Experience
SystemIntegration
Charge to bill
To get money from people who
donā€™t have a bank account
Store usage
Strong brick and mortar
presence in many countries
Level of Integration for Back End Services
Confidentiality level on slide master
Pillars for a proper internet service platform
ā€¢ Infrastructure abstraction: to go beyond virtualization to provide service with a set of
API on how to consume basic resources (Storage, Computing, Queueing, Network)
ā€¢ Identity Management: to provide open standard (OpenID, Oauth) to deal with identity
and authorization by interacting with different legacy system
ā€¢ Profile Management: to make sure that all data resources are linkable and discoverable
ā€¢ Transaction Management: to provide the infrastructure to deal with distributed
transactions for operation like user lifecycle
ā€¢ High Performance IO Management: to handle real time near real time distributed
event management for services
ā€¢ Analytics: to make sure that every services generates data and there is a way to extract
value from that data
ā€¢ Exposing service APIs in the proper context: services are about API and not
just end to end experience:
ā€“ Device Management
ā€“ Connection Management
ā€“ User Profile
ā€“ User Services
Option 15
Device as a service
User as a service
Confidentiality level on slide master
Working on the API for Management
1. Shared resources and representation
2. Share attributes
3. Service management
Option 16
Confidentiality level on slide masterOption 17
Q&A
michel.burger@vodafone.com
miburger@gmail.com
frogburger.blogspot.com
Confidentiality level on slide master
Detailed view of the architectural components
Confidentiality level on slide master
Identity Management: Single Sign On
Responsibilities
ā€¢ Allows Customer to login to Services
using their Operator username /
password
ā€¢ provides a Common interface for all
Services with re-use to new services
as they arise i.e. build once and use
many
ā€¢ Enables click through support
between services without signing in
again
ā€¢ Makes use of existing Operator
systems ā€“ development is all
undertaken by top level, with support
from Operators.
ā€¢ Services integrate to a single
gateway
ā€¢ This in turn is integrated to each
operator SSO system
ā€¢ Customer can use their
username to access
Service 1 Service 2
Opco 1
SSO
Opco n
SSO
Other
OpCo
SSO
Top Level
SSO
Gateway
OpCo_username
Service n
Confidentiality level on slide master
Profile Management: Resource Discovery
Service 1
Customer
Registry
Serivce n
ā€¦
Client
(Internal, 3rd
party)
Resource
Discovery
Responsibilities:
ā€¢ Indicates the location of userā€™s
disparate data resources
ā€¢ Combines multiple resources into
one view of data across multiple
systems
ā€¢ Enables geo-distribution of
resources
ā€¢ Enables scalability by spreading
resources across distributed nodes
ā€¢ Enables classes of service and
data availability (e.g. VIP users)
Provides data integrity for a system based on
distributed or 3rd party components
Confidentiality level on slide master
Transaction Management: User Lifecycle Management
ā€¦
User Lifecycle
Management
Responsibilities
ā€¢ Manages complex transaction of
user provisioning (Creating,
Updating and Deleting user)
ā€¢ Provides consistent way to manage
the user lifecycle across internal
and external services
ā€¢ Provides unified set of API on user
lifecycle operations for customer
support services
Provides system integrity for a system based on
distributed or 3rd party components
SSO
Customer
Registry
Resource
Discovery
Service 1 Serivce n
Client
Registration
Customer
Service
Confidentiality level on slide master
Infrastructure
Option 112
Confidentiality level on slide master
Electricity production and consumption
Collocation Centralization of production
Decentralization of consumption
Mass distribution of
production and
consumption
Collocation is back
Dam used as cheap stora
13
Confidentiality level on slide master
Core Computing (storage, execution ..) production and
consumption
Disconnected computing
?
Cloud Computing
14
Operator
Network
Confidentiality level on slide master
The threat: the OTT View
15
+
Modern data centers are an extensive network of
blades that expands within the data centre or between
data centres. Each blade is remotely controlled to
dynamically managed the forwarding plane
For economy of scale, this network needs to be
inexpensive, agile , elastic and controlled by the
application layer using SDN/Openflow
The device is becoming yet
another blade (with
constraints (power, bandwitdth))
To expand the data center as a network of blades, new blades have
been added. Originally these blades had a specific purpose of improving
traffic flow and latency.
CDN
Node
CDN optimizer
Gateway/appliance are
intalled on premise
Home
Gateway
Enterprise
Gateway
Hardware abstraction
ā€¢ Network elements should run using commodetized
hardware
ā€¢ Network becomes elastic
Forwarding plane remote access
ā€¢ Clear separation between the control plane and the data
plane
ā€¢ Application layer to control the forwarding plane
ā€¢ Can be implemented natively or as an overlay
Google
Akamai
Google, Apple: TV
Amazon: Streaming
Google: openflow technology in android
Oracle: control of the Java virtual machine
Operator
Network
Network of blades
Confidentiality level on slide master
The threat: the OTT View
16
+
CDN
Node
Enterprise
Gateway
Modern software services are made of
distributed elements (pieces of software logic
and data) that are accessible thru API. These
elements can be instantiated on different blades
or can migrate from blades to blades (liquid
services)
These software services can use or migrate to remote blades to
offload centralized data center blades and to improve the user
experience.
ā€¢ OTT surround or populated our network to create an overlay network of service elements
ā€¢ High level control information (routing, flow optimatinization data)., nter-element information and service
data and is going thru tunnels to optimize traffic, offload workload, execute service logic
ā€¢ Our network has zero visibility of these three types of information
We are being pushed down to just become one of the forwarding plane
tunneling signalling from the device to a massively distributed controller
Cloud elasticity, Caching
Google desktop, CDN Caching, Facebook desktop UI, Chrome, Kindle
Modern data centers are an extensive network of
blades that expands within the data centre or between
data centres. Each blade is remotely controlled to
dynamically managed the forwarding plane
To expand the data center as a network of blades, new blades have
been added. Originally these blades had a specific purpose of improving
traffic flow and latency.
Home
Gateway
Network of blades
Confidentiality level on slide master
The threat: The Network View (with an network approach)
17
Confining SDN to just address the cost (APEX and OPEX)
reduction by creting a virtualized and agile network
Abstracting the hardware of network elements give the ability
to use commodity hardware (CAPEX reduction)
Network need to be software progammable and controllable
to automate the management (OPEX reduction)
Implementing SDN in the network
ā€¢ Create a cheaper and more agile network
ā€¢ Does not change the status quo but distract operator from the real issues
SDN solve the problem ā€œdu jourā€ about reducing cost, similar to IMS few year
ago with the problem ā€œdu jourā€ of accelarating service innovation while
OTT by using SDN will accelerate their abiltity to deliver innovative services
Confidentiality level on slide master
The opportunity: The Network View (with an IT approach)
18
Enterprise
Gateway
Home
Gateway
A lot of raw storage and computing power locked in
proprietary solutions which make the network an IT no
manā€™s land
Abstracting the hardware of network elements
enable the ability to exposed them as IT resources
Network need to be software progammable and
controllable to allow quick access of the resources
Implementing SDN in the network
Implementing on premise
(home/enterprise) gateway as IT
resource allows us to extend our
reach
ā€¢ Edge (one hope away) IT resources to handle low latency user solution are more viable than device as
IT resources
ā€¢ Complementary to the other IT resources
We are part of the computing supply chain providing specific IT resources
only network operator can implement and we have visibility of inter-service
element traffic
Edge IT
Resources
Edge IT
Resources
Edge IT
Resources
Core IT
Resources
Software services can be distributed
at the edge of whithin the network
either for minimizing the latency of the
user experience or optimizing the
centralized data center load
Operator
Network
Confidentiality level on slide master
Core Computing (storage, execution ..) production and
consumption
OTT view
Disconnected computing Cloud Computing Massively distributed computing
We are pushed down to just become one of the
forwarding plane
19
Network of blades
Operator
Network
Operator
Network
Confidentiality level on slide master
Core Computing (storage, execution ..) production and
consumption
Network View (with an IT approach)
We are complete part of the computing supply chain
providing one hop away computing resources
20
Network of blades
Operator
Network
Disconnected computing Cloud Computing Massively distributed computing
Confidentiality level on slide master
What we could do and how?
Confidentiality level in footer | 25 June 201321
ā€¢ Leverage the network to become a massively distributed data center and
partner with cloud IT resource provider (like Amazon) to create a continuum of IT
resources from the back end to the device with a strong defacto standard
ā€“ Accelerate migration to general purpose hardware, increase virtualisation in the network controllable by
the software layer and implement IT abstraction using defacto standard leveraging Hybrid Cloud Broker
ā€¢ Implement on premise (home/enterprise) gateways as IT resources to expand
reach
ā€“ Promote the deployment of home/enterprise gateways with specific purpose as dedicated soluton and
as IT resources
ā€¢ Provide network edge IT resources to mobile solution developers for unmatched
user experience (<1ms latency) and ability to offload back end data center : Edge
cloud (one hop away IT resources )
ā€“ End user device as an IT resource has many constraints (power, bandwith (cost and availability)) which
donā€™t exist on network edge IT resources. Accelerate the introduction of edge network element as an IT
resource, Develop Network API.
ā€“ Developers are already creating elastic solutions using defacto standard, this is just a distributed
extension of elasticity
ā€¢ Improve our influence and steer Open Network Foundation (IT lead) and
OpendDaylight (Network lead) initiatives, educate developers by pushing our
system expertise to create manageable
Confidentiality level on slide master
Analytics
Option 122
Confidentiality level on slide master
Gold mining is about dirt management
0.05 ounces/ton
Confidentiality level on slide master
About 11850 Amps to generate
around 8.4 Tesla fields (about
150000 times the earth
magnetic field) but they
operate at low Voltage
A lot of what LHC is about is electricity flow management
Confidentiality level on slide master
How BIG?
BIG data is like the LHC combined with gold
extraction
- Huge amount of data -> 6.6 Zettabytes/year by 2016 (Cisco
Cloud Index)
- Big flow of data -> 400TB/day (Facebook)
- LHC generates 10-15 Petabytes/year of data for each
experiment
Confidentiality level on slide master
The essence of new service
providers
ServiceData
Consumes
Produces
Improves
experience
Many free services
One data set
and common semantic
The more context
the more efficient and
the more value
Value enriched Data
generates
revenue
Example:
Search/Information Management :
Rated auction/Selling:
User
BI Based Revenue Models
(eg Advertisement)
Core Semantic
Data Set
Mindmap
Service
Service
Revenue from
existing services
will shrink
Additional
revenue from
new services
Confidentiality level on slide master
Classic Approach
ā€¢ Structured Data
ā€¢ Data in the range of Gigabytes to Terabytes
ā€¢ Centralized (Data is imported in analytics)
ā€¢ Batch based
ā€¢ Data silos
Transaction Relational
Database
Data
Warehouse
Analyze
Where is the data that answer my questions ?
ETL ETL ETL
Confidentiality level on slide master
ā€¢ Multi Structured Data
ā€¢ Data in the range of Terabytes to Petabytes
ā€¢ Distributed/Federated (Analytics grab the data)
ā€¢ Streaming based
ā€¢ Holistic Data
Big Data Approach
2
3
n
1
Organize Analyze
Stream
Clusters
Here are the questions and the data for the answers
Sources
Confidentiality level on slide master
A new pattern
Consumption
API
Data card
Sim Card
ContentServices
Knowledge
References
Applications
Social Networks
Connected Things
(Consumer, Enterprise)
Connected
Devices
Network Core
IT Infrastructure
RAN
Premise
Gateway
ā€¢ Many different data structures
ā€¢ Many different ways to extract the data
ā€¢ Many different locations (even for the same type of
data)
ā€¢ Batch and Realtime based
ā€¢ Buffered or stream
ā€¢ Correlation parameters
ā€¢ Buffering, Routing, Filtering
ā€¢ Structured/Unstructured store
ā€¢ Event Collector
ā€¢ Batch Process/Multi Structure
Stream
ā€¢ Multi Stage Store/Process
NonReal-timeReal-time
LowlevelSemanticRichSemantic
CheapStorageHighEfficientStorage
Report
Statistics
Data as a
Service
Graph
Network/
Analysis
Neura l
Network/
Analysis
ā€¢ Structured
Buffering
ā€¢ Proprietary
ā€¢ Graph
ā€¢ Neural Network
ā€¢ Relational
ā€¢ Unstructured
Buffering
ā€¢ Streaming
ā€¢ Taping at Source
ā€¢ Taping on Stream
ā€¢ Consumption to
Source
SourcesStream
Confidentiality level on slide master
With added security
Sources
Consumption
API
Data card
Sim Card
ContentServices
Knowledge
References
Applications
Social Networks
Connected Things
(Consumer, Enterprise)
Connected
Devices
Network Core
IT Infrastructure
RAN
Premise
Gateway
Report
Statistics
Data as a
Service
Graph
Network/
Analysis
Neura l
Network/
Analysis
ā€¢ Securing the infrastructure (public, private)
ā€¢ Policy (internal/external)
ā€¢ On-going assessment (DDOS, Penetration ā€¦)
ā€¢ Data leakage
ā€¢ Migration
ā€¢ Securing the identity
ā€¢ Validating ID
ā€¢ Anonymization
ā€¢ Securing the access
ā€¢ Distributed permission/preference
ā€¢ 3rd party permission
ā€¢ Strong access
control based on
industry standard
(user, dev,
application)
ā€¢ Strong
authorization
control based on
open standard
ā€¢ Analytics applied
to Analytics
Stream
Confidentiality level on slide master
Device as a Service
Option 131
Confidentiality level on slide master
Device
Management
Device
Virtualization
Device
Connected Device
Managed Device
Device as a Service
NetworkStack
Management
Agent
Service
Platform
Services
ā€¦
Discovery
Security
Messaging
Protocol
End Point Abstraction
Device Capabilities
Device Profile
Service Enablement
Billing,
Provisioning,
Cloud Services
Content based..
Local Applications
OS
Hardware
(processing/storage/io)
Device Model
Data Abstraction
Data rendering
Service experience
Localrep
of
remoteservice
Localrep
of
remoteservice
The new device
Device as a Service
The binding between the device as a service and a cloud service
can be of the following spectrum from downloading an
application in the device to having a description (html5 based) of
what the interaction should look like pre rendered in the device
proxy.
Atomic
Service
Composite
Service
Network App
3rd party
Identity
Local app
Update
Each steps from device to device as a service implies add-on on
the physical device.
Composition
Device as a service
Connection
Device ProxyConnectionDevice
Confidentiality level on slide master
API Exposure
Option 133
Confidentiality level on slide master
Work
Package
API
Aggregator
Specialized API
(API to focus on a specific client)
Eg: Mobile API, Web API ā€¦
SDK
(Code that hide the API for a specific platform)
Eg: Eclipse Plug-in, Mobile device SDK (Apple, Androidā€¦)
Via
API optimization
Whattype
ofAPI?
Whichchannelis
usedtodistributethe
API?
Raw
Exposure
PortalAggregatorService Provider
Redistribution
for
for
...
Standard
Environment
Via
API adaptation
Customized API
(API created for a specific partner)
Eg: Apple, Googleā€¦
Whoas
developer
willusethe
API??
Back end service API
(Normalized APIs, Common Enablers, Partners
API)3rd party
Product
Opco Opco Opco
What
developer
dowiththe
API?
OTT
Service
Service
Bundle
Mashup Application
Howisit
presented?
OTT API
OTT may also develop anmobile/web app on
tpresentdirectly to the end user or distribute the API
via the appropriate API channel
Web
App
App
Store
Whoisthe
end
customer?
Packaged
Product
Enterprise Consumer
Web DeveloperOTT Service
Developer
Mobile Developer
Device Developer
B2B Service Provider
Developer
Long TailShortTail
Charge to bill
for
Custom
Code
on
Internal
program
for API
normalization

More Related Content

What's hot

[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected VehiclesTomo Yamaguchi
Ā 
IBM MessageSight for mobile and the internet of things
IBM MessageSight for mobile and the internet of thingsIBM MessageSight for mobile and the internet of things
IBM MessageSight for mobile and the internet of thingsJohn Samuel
Ā 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentLuxoft
Ā 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseAndrew Schofield
Ā 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Ā 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
Ā 
Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
Ā 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
Ā 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
Ā 
Middleware
MiddlewareMiddleware
Middlewarenava rathna
Ā 
SOA - Creating True Business Agility
SOA - Creating True Business AgilitySOA - Creating True Business Agility
SOA - Creating True Business AgilityBrian C. Edwards
Ā 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.Minor33
Ā 
Manufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionManufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionBill Lydon
Ā 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API ManagementRui Santos
Ā 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualsflynn073
Ā 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing Sanjiv Pradhan
Ā 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware BasicsVarun Arora
Ā 
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...ijasuc
Ā 
Enterprise architecture for telecom sector
Enterprise architecture for telecom sectorEnterprise architecture for telecom sector
Enterprise architecture for telecom sectorSoham Pablo
Ā 

What's hot (20)

[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles[Solace] Open Data Movement for Connected Vehicles
[Solace] Open Data Movement for Connected Vehicles
Ā 
IBM MessageSight for mobile and the internet of things
IBM MessageSight for mobile and the internet of thingsIBM MessageSight for mobile and the internet of things
IBM MessageSight for mobile and the internet of things
Ā 
Brochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software developmentBrochure of Luxoft telecom solutions by Luxoft software development
Brochure of Luxoft telecom solutions by Luxoft software development
Ā 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the Enterprise
Ā 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Ā 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
Ā 
Data power use cases
Data power use casesData power use cases
Data power use cases
Ā 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
Ā 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
Ā 
Middleware
MiddlewareMiddleware
Middleware
Ā 
Lighthouse 20100120
Lighthouse 20100120Lighthouse 20100120
Lighthouse 20100120
Ā 
SOA - Creating True Business Agility
SOA - Creating True Business AgilitySOA - Creating True Business Agility
SOA - Creating True Business Agility
Ā 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
Ā 
Manufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information RevolutionManufacturing IoT - OPC UA Information Revolution
Manufacturing IoT - OPC UA Information Revolution
Ā 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
Ā 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
Ā 
Introduction on Cloud Computing
Introduction on Cloud Computing Introduction on Cloud Computing
Introduction on Cloud Computing
Ā 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
Ā 
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
A NOVEL THIN CLIENT ARCHITECTURE WITH HYBRID PUSH-PULL MODEL, ADAPTIVE DISPLA...
Ā 
Enterprise architecture for telecom sector
Enterprise architecture for telecom sectorEnterprise architecture for telecom sector
Enterprise architecture for telecom sector
Ā 

Viewers also liked

Cloud mobility
Cloud mobilityCloud mobility
Cloud mobilityMichel Burger
Ā 
Voorstelling Aanbod Prana 2011 N Lpdf
Voorstelling Aanbod Prana 2011 N LpdfVoorstelling Aanbod Prana 2011 N Lpdf
Voorstelling Aanbod Prana 2011 N LpdfIrisWillems
Ā 
Light reading conference
Light reading conferenceLight reading conference
Light reading conferenceMichel Burger
Ā 
SEO & CRO Problems - Pubcon Las Vegas 2010
SEO & CRO Problems - Pubcon Las Vegas 2010SEO & CRO Problems - Pubcon Las Vegas 2010
SEO & CRO Problems - Pubcon Las Vegas 2010Gabriel Goldenberg
Ā 
Biblia2
Biblia2Biblia2
Biblia2kalonii
Ā 
Carrier API Strategy: How Carriers could gain (back) Developer Mindshare
Carrier API Strategy: How Carriers could gain (back) Developer MindshareCarrier API Strategy: How Carriers could gain (back) Developer Mindshare
Carrier API Strategy: How Carriers could gain (back) Developer Mindshare3scale.net
Ā 

Viewers also liked (7)

Cloud mobility
Cloud mobilityCloud mobility
Cloud mobility
Ā 
Sdp summit
Sdp summitSdp summit
Sdp summit
Ā 
Voorstelling Aanbod Prana 2011 N Lpdf
Voorstelling Aanbod Prana 2011 N LpdfVoorstelling Aanbod Prana 2011 N Lpdf
Voorstelling Aanbod Prana 2011 N Lpdf
Ā 
Light reading conference
Light reading conferenceLight reading conference
Light reading conference
Ā 
SEO & CRO Problems - Pubcon Las Vegas 2010
SEO & CRO Problems - Pubcon Las Vegas 2010SEO & CRO Problems - Pubcon Las Vegas 2010
SEO & CRO Problems - Pubcon Las Vegas 2010
Ā 
Biblia2
Biblia2Biblia2
Biblia2
Ā 
Carrier API Strategy: How Carriers could gain (back) Developer Mindshare
Carrier API Strategy: How Carriers could gain (back) Developer MindshareCarrier API Strategy: How Carriers could gain (back) Developer Mindshare
Carrier API Strategy: How Carriers could gain (back) Developer Mindshare
Ā 

Similar to Taw opening session

Cloud computing
Cloud computingCloud computing
Cloud computingperfectican
Ā 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
Ā 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
Ā 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxMichel Burger
Ā 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonEurotech
Ā 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
Ā 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalMauricio Godoy
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingMathews Job
Ā 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
Ā 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
Ā 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
Ā 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
Ā 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptA
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingJegadeesh Sam
Ā 

Similar to Taw opening session (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
Ā 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
Ā 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
Ā 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
Ā 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
Ā 
Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ā 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
Ā 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Ā 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
Ā 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Ā 
CLOUD
CLOUDCLOUD
CLOUD
Ā 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
Ā 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Ā 
Cloud
CloudCloud
Cloud
Ā 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Ā 
Lect15 cloud
Lect15 cloudLect15 cloud
Lect15 cloud
Ā 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Ā 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ā 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
Ā 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
Ā 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
Ā 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Ā 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Ā 

Taw opening session

  • 1. APIs for the digital service ecosystem Michel Burger Chief Architect R&D Distinguished Engineer michel.burger@vodafone.com
  • 2. Confidentiality level on slide master Most Requested API by startups 1. Provisioning 2. Identity 3. Charging 4. User Validation 5. SSO Option 12
  • 3. Confidentiality level on slide masterOption 13 Services that run on top of Services that run better with Services that are running by Type of Back End Services No Integration Commercial Agreement (ex: pre embedded client) Operated externally Multi level of integration (light to deep) Commercial Agreement (ex: charge to bill) Generally operated externally Deep integration Product or work package done by vendor or internally developed Generally operated internally Differentiation Potential Revenue Intrinsic Drive and Incentive Strategic Choice
  • 4. Confidentiality level on slide master Basic Enabler Access 1 2 3 4 5 Ī± Ī² Ī³ Ī“ Vodafone Identity SSOFederated User Profile CRM REST Analytics Cloud System Mgmt User Experience SystemIntegration Charge to bill To get money from people who donā€™t have a bank account Store usage Strong brick and mortar presence in many countries Level of Integration for Back End Services
  • 5. Confidentiality level on slide master Pillars for a proper internet service platform ā€¢ Infrastructure abstraction: to go beyond virtualization to provide service with a set of API on how to consume basic resources (Storage, Computing, Queueing, Network) ā€¢ Identity Management: to provide open standard (OpenID, Oauth) to deal with identity and authorization by interacting with different legacy system ā€¢ Profile Management: to make sure that all data resources are linkable and discoverable ā€¢ Transaction Management: to provide the infrastructure to deal with distributed transactions for operation like user lifecycle ā€¢ High Performance IO Management: to handle real time near real time distributed event management for services ā€¢ Analytics: to make sure that every services generates data and there is a way to extract value from that data ā€¢ Exposing service APIs in the proper context: services are about API and not just end to end experience: ā€“ Device Management ā€“ Connection Management ā€“ User Profile ā€“ User Services Option 15 Device as a service User as a service
  • 6. Confidentiality level on slide master Working on the API for Management 1. Shared resources and representation 2. Share attributes 3. Service management Option 16
  • 7. Confidentiality level on slide masterOption 17 Q&A michel.burger@vodafone.com miburger@gmail.com frogburger.blogspot.com
  • 8. Confidentiality level on slide master Detailed view of the architectural components
  • 9. Confidentiality level on slide master Identity Management: Single Sign On Responsibilities ā€¢ Allows Customer to login to Services using their Operator username / password ā€¢ provides a Common interface for all Services with re-use to new services as they arise i.e. build once and use many ā€¢ Enables click through support between services without signing in again ā€¢ Makes use of existing Operator systems ā€“ development is all undertaken by top level, with support from Operators. ā€¢ Services integrate to a single gateway ā€¢ This in turn is integrated to each operator SSO system ā€¢ Customer can use their username to access Service 1 Service 2 Opco 1 SSO Opco n SSO Other OpCo SSO Top Level SSO Gateway OpCo_username Service n
  • 10. Confidentiality level on slide master Profile Management: Resource Discovery Service 1 Customer Registry Serivce n ā€¦ Client (Internal, 3rd party) Resource Discovery Responsibilities: ā€¢ Indicates the location of userā€™s disparate data resources ā€¢ Combines multiple resources into one view of data across multiple systems ā€¢ Enables geo-distribution of resources ā€¢ Enables scalability by spreading resources across distributed nodes ā€¢ Enables classes of service and data availability (e.g. VIP users) Provides data integrity for a system based on distributed or 3rd party components
  • 11. Confidentiality level on slide master Transaction Management: User Lifecycle Management ā€¦ User Lifecycle Management Responsibilities ā€¢ Manages complex transaction of user provisioning (Creating, Updating and Deleting user) ā€¢ Provides consistent way to manage the user lifecycle across internal and external services ā€¢ Provides unified set of API on user lifecycle operations for customer support services Provides system integrity for a system based on distributed or 3rd party components SSO Customer Registry Resource Discovery Service 1 Serivce n Client Registration Customer Service
  • 12. Confidentiality level on slide master Infrastructure Option 112
  • 13. Confidentiality level on slide master Electricity production and consumption Collocation Centralization of production Decentralization of consumption Mass distribution of production and consumption Collocation is back Dam used as cheap stora 13
  • 14. Confidentiality level on slide master Core Computing (storage, execution ..) production and consumption Disconnected computing ? Cloud Computing 14 Operator Network
  • 15. Confidentiality level on slide master The threat: the OTT View 15 + Modern data centers are an extensive network of blades that expands within the data centre or between data centres. Each blade is remotely controlled to dynamically managed the forwarding plane For economy of scale, this network needs to be inexpensive, agile , elastic and controlled by the application layer using SDN/Openflow The device is becoming yet another blade (with constraints (power, bandwitdth)) To expand the data center as a network of blades, new blades have been added. Originally these blades had a specific purpose of improving traffic flow and latency. CDN Node CDN optimizer Gateway/appliance are intalled on premise Home Gateway Enterprise Gateway Hardware abstraction ā€¢ Network elements should run using commodetized hardware ā€¢ Network becomes elastic Forwarding plane remote access ā€¢ Clear separation between the control plane and the data plane ā€¢ Application layer to control the forwarding plane ā€¢ Can be implemented natively or as an overlay Google Akamai Google, Apple: TV Amazon: Streaming Google: openflow technology in android Oracle: control of the Java virtual machine Operator Network Network of blades
  • 16. Confidentiality level on slide master The threat: the OTT View 16 + CDN Node Enterprise Gateway Modern software services are made of distributed elements (pieces of software logic and data) that are accessible thru API. These elements can be instantiated on different blades or can migrate from blades to blades (liquid services) These software services can use or migrate to remote blades to offload centralized data center blades and to improve the user experience. ā€¢ OTT surround or populated our network to create an overlay network of service elements ā€¢ High level control information (routing, flow optimatinization data)., nter-element information and service data and is going thru tunnels to optimize traffic, offload workload, execute service logic ā€¢ Our network has zero visibility of these three types of information We are being pushed down to just become one of the forwarding plane tunneling signalling from the device to a massively distributed controller Cloud elasticity, Caching Google desktop, CDN Caching, Facebook desktop UI, Chrome, Kindle Modern data centers are an extensive network of blades that expands within the data centre or between data centres. Each blade is remotely controlled to dynamically managed the forwarding plane To expand the data center as a network of blades, new blades have been added. Originally these blades had a specific purpose of improving traffic flow and latency. Home Gateway Network of blades
  • 17. Confidentiality level on slide master The threat: The Network View (with an network approach) 17 Confining SDN to just address the cost (APEX and OPEX) reduction by creting a virtualized and agile network Abstracting the hardware of network elements give the ability to use commodity hardware (CAPEX reduction) Network need to be software progammable and controllable to automate the management (OPEX reduction) Implementing SDN in the network ā€¢ Create a cheaper and more agile network ā€¢ Does not change the status quo but distract operator from the real issues SDN solve the problem ā€œdu jourā€ about reducing cost, similar to IMS few year ago with the problem ā€œdu jourā€ of accelarating service innovation while OTT by using SDN will accelerate their abiltity to deliver innovative services
  • 18. Confidentiality level on slide master The opportunity: The Network View (with an IT approach) 18 Enterprise Gateway Home Gateway A lot of raw storage and computing power locked in proprietary solutions which make the network an IT no manā€™s land Abstracting the hardware of network elements enable the ability to exposed them as IT resources Network need to be software progammable and controllable to allow quick access of the resources Implementing SDN in the network Implementing on premise (home/enterprise) gateway as IT resource allows us to extend our reach ā€¢ Edge (one hope away) IT resources to handle low latency user solution are more viable than device as IT resources ā€¢ Complementary to the other IT resources We are part of the computing supply chain providing specific IT resources only network operator can implement and we have visibility of inter-service element traffic Edge IT Resources Edge IT Resources Edge IT Resources Core IT Resources Software services can be distributed at the edge of whithin the network either for minimizing the latency of the user experience or optimizing the centralized data center load Operator Network
  • 19. Confidentiality level on slide master Core Computing (storage, execution ..) production and consumption OTT view Disconnected computing Cloud Computing Massively distributed computing We are pushed down to just become one of the forwarding plane 19 Network of blades Operator Network Operator Network
  • 20. Confidentiality level on slide master Core Computing (storage, execution ..) production and consumption Network View (with an IT approach) We are complete part of the computing supply chain providing one hop away computing resources 20 Network of blades Operator Network Disconnected computing Cloud Computing Massively distributed computing
  • 21. Confidentiality level on slide master What we could do and how? Confidentiality level in footer | 25 June 201321 ā€¢ Leverage the network to become a massively distributed data center and partner with cloud IT resource provider (like Amazon) to create a continuum of IT resources from the back end to the device with a strong defacto standard ā€“ Accelerate migration to general purpose hardware, increase virtualisation in the network controllable by the software layer and implement IT abstraction using defacto standard leveraging Hybrid Cloud Broker ā€¢ Implement on premise (home/enterprise) gateways as IT resources to expand reach ā€“ Promote the deployment of home/enterprise gateways with specific purpose as dedicated soluton and as IT resources ā€¢ Provide network edge IT resources to mobile solution developers for unmatched user experience (<1ms latency) and ability to offload back end data center : Edge cloud (one hop away IT resources ) ā€“ End user device as an IT resource has many constraints (power, bandwith (cost and availability)) which donā€™t exist on network edge IT resources. Accelerate the introduction of edge network element as an IT resource, Develop Network API. ā€“ Developers are already creating elastic solutions using defacto standard, this is just a distributed extension of elasticity ā€¢ Improve our influence and steer Open Network Foundation (IT lead) and OpendDaylight (Network lead) initiatives, educate developers by pushing our system expertise to create manageable
  • 22. Confidentiality level on slide master Analytics Option 122
  • 23. Confidentiality level on slide master Gold mining is about dirt management 0.05 ounces/ton
  • 24. Confidentiality level on slide master About 11850 Amps to generate around 8.4 Tesla fields (about 150000 times the earth magnetic field) but they operate at low Voltage A lot of what LHC is about is electricity flow management
  • 25. Confidentiality level on slide master How BIG? BIG data is like the LHC combined with gold extraction - Huge amount of data -> 6.6 Zettabytes/year by 2016 (Cisco Cloud Index) - Big flow of data -> 400TB/day (Facebook) - LHC generates 10-15 Petabytes/year of data for each experiment
  • 26. Confidentiality level on slide master The essence of new service providers ServiceData Consumes Produces Improves experience Many free services One data set and common semantic The more context the more efficient and the more value Value enriched Data generates revenue Example: Search/Information Management : Rated auction/Selling: User BI Based Revenue Models (eg Advertisement) Core Semantic Data Set Mindmap Service Service Revenue from existing services will shrink Additional revenue from new services
  • 27. Confidentiality level on slide master Classic Approach ā€¢ Structured Data ā€¢ Data in the range of Gigabytes to Terabytes ā€¢ Centralized (Data is imported in analytics) ā€¢ Batch based ā€¢ Data silos Transaction Relational Database Data Warehouse Analyze Where is the data that answer my questions ? ETL ETL ETL
  • 28. Confidentiality level on slide master ā€¢ Multi Structured Data ā€¢ Data in the range of Terabytes to Petabytes ā€¢ Distributed/Federated (Analytics grab the data) ā€¢ Streaming based ā€¢ Holistic Data Big Data Approach 2 3 n 1 Organize Analyze Stream Clusters Here are the questions and the data for the answers Sources
  • 29. Confidentiality level on slide master A new pattern Consumption API Data card Sim Card ContentServices Knowledge References Applications Social Networks Connected Things (Consumer, Enterprise) Connected Devices Network Core IT Infrastructure RAN Premise Gateway ā€¢ Many different data structures ā€¢ Many different ways to extract the data ā€¢ Many different locations (even for the same type of data) ā€¢ Batch and Realtime based ā€¢ Buffered or stream ā€¢ Correlation parameters ā€¢ Buffering, Routing, Filtering ā€¢ Structured/Unstructured store ā€¢ Event Collector ā€¢ Batch Process/Multi Structure Stream ā€¢ Multi Stage Store/Process NonReal-timeReal-time LowlevelSemanticRichSemantic CheapStorageHighEfficientStorage Report Statistics Data as a Service Graph Network/ Analysis Neura l Network/ Analysis ā€¢ Structured Buffering ā€¢ Proprietary ā€¢ Graph ā€¢ Neural Network ā€¢ Relational ā€¢ Unstructured Buffering ā€¢ Streaming ā€¢ Taping at Source ā€¢ Taping on Stream ā€¢ Consumption to Source SourcesStream
  • 30. Confidentiality level on slide master With added security Sources Consumption API Data card Sim Card ContentServices Knowledge References Applications Social Networks Connected Things (Consumer, Enterprise) Connected Devices Network Core IT Infrastructure RAN Premise Gateway Report Statistics Data as a Service Graph Network/ Analysis Neura l Network/ Analysis ā€¢ Securing the infrastructure (public, private) ā€¢ Policy (internal/external) ā€¢ On-going assessment (DDOS, Penetration ā€¦) ā€¢ Data leakage ā€¢ Migration ā€¢ Securing the identity ā€¢ Validating ID ā€¢ Anonymization ā€¢ Securing the access ā€¢ Distributed permission/preference ā€¢ 3rd party permission ā€¢ Strong access control based on industry standard (user, dev, application) ā€¢ Strong authorization control based on open standard ā€¢ Analytics applied to Analytics Stream
  • 31. Confidentiality level on slide master Device as a Service Option 131
  • 32. Confidentiality level on slide master Device Management Device Virtualization Device Connected Device Managed Device Device as a Service NetworkStack Management Agent Service Platform Services ā€¦ Discovery Security Messaging Protocol End Point Abstraction Device Capabilities Device Profile Service Enablement Billing, Provisioning, Cloud Services Content based.. Local Applications OS Hardware (processing/storage/io) Device Model Data Abstraction Data rendering Service experience Localrep of remoteservice Localrep of remoteservice The new device Device as a Service The binding between the device as a service and a cloud service can be of the following spectrum from downloading an application in the device to having a description (html5 based) of what the interaction should look like pre rendered in the device proxy. Atomic Service Composite Service Network App 3rd party Identity Local app Update Each steps from device to device as a service implies add-on on the physical device. Composition Device as a service Connection Device ProxyConnectionDevice
  • 33. Confidentiality level on slide master API Exposure Option 133
  • 34. Confidentiality level on slide master Work Package API Aggregator Specialized API (API to focus on a specific client) Eg: Mobile API, Web API ā€¦ SDK (Code that hide the API for a specific platform) Eg: Eclipse Plug-in, Mobile device SDK (Apple, Androidā€¦) Via API optimization Whattype ofAPI? Whichchannelis usedtodistributethe API? Raw Exposure PortalAggregatorService Provider Redistribution for for ... Standard Environment Via API adaptation Customized API (API created for a specific partner) Eg: Apple, Googleā€¦ Whoas developer willusethe API?? Back end service API (Normalized APIs, Common Enablers, Partners API)3rd party Product Opco Opco Opco What developer dowiththe API? OTT Service Service Bundle Mashup Application Howisit presented? OTT API OTT may also develop anmobile/web app on tpresentdirectly to the end user or distribute the API via the appropriate API channel Web App App Store Whoisthe end customer? Packaged Product Enterprise Consumer Web DeveloperOTT Service Developer Mobile Developer Device Developer B2B Service Provider Developer Long TailShortTail Charge to bill for Custom Code on Internal program for API normalization