SlideShare a Scribd company logo
Carrier Ethernet for Mobile Broadband Networks
            Optimizing Backhaul Networks to Address Performance and Security




Doug Miller
doug.miller@nominum.com                                                  July 10, 2012
Company Overview
 We are the WORLD LEADER                   Our solutions run the world s           The first & only DNS/DHCP
  in DNS & DHCP solutions                  MOST DEMANDING networks               INTEGRATED ARCHITECTURE

•  Our Chairman, Dr. Paul                •  A decade of service provider        •  DNS/DHCP engines provide
   Mockapetris, invented the DNS            experience                             efficiency, lower costs, higher QoS
•  Team comprised of BIND 8, BIND        •  Over 140 Fixed and Mobile service   •  Platforms enable agility & faster
   9 & ISC-DHCP creators                    providers                              application development
•  40 issued and pending patents         •  Serving over 500 million Internet   •  Applications create differentiation
                                            users worldwide                        and new revenue sources

                                    Our mobile customer base includes:




                           Our fixed broadband customer base includes:




                                                                                                                         2
Three-Tiered Integrated Architecture
                                                       NOMINUM APPS                                3rd PARTY CERTIFIED APPS


                                          Subscriber       Content          Outbound          Configuration
                                                                                                                         SIEM
    Unified User Interface & Management   Messaging        Blocking         Anti- Spam        Management

                                                                                                                          More…
                                          Subscriber       Anti-Virus        Parental
                                           Analytics        Upsell           Control
                                                                                                    ISP-DEVELOPED APPS


                                          Navigation       Network           Botnet
                                                                                                    Custom          Custom
                                          Assistance      Monitoring         Control

                                                                                 More…


                                                                   Interoperability (SDK & APIs)

                                          Network Services and
                                                                        Subscriber Services                  Analytics
                                                Security




                                                                                                                                  3
Putting Mobile into Perspective




Source: Chetan Sharma Consulting – 2012   4
Mobile Devices per User




Source: Cisco IBSG, 2011     5
The Changing Face of Mobile
   •  Connected devices are expanding
           –  Not just mobile phones*
                   •  175M laptops on the mobile network in 2011
                           –  22x more traffic than more traffic than smartphones
                   •  Tablets to exceed 10% of global mobile data traffic in 2016
                   •  In 2016, 4G will be 6 percent of connections, but 36
                      percent of total traffic
           –  Mobile devices aren’t as protected as home networks

   •  Spectrum consumption is a constant battle
           –  “If we don't get new frequency [in 2012], it will topple our
              company.”
                   •  Asahi Shimbun - CTO of Softbank Mobile
           –  “Frequency allocations alone are not the only solution. We
              need to be as smart as possible in managing our capacity.”
                   •  Philipp Humm, President and CEO of T-Mobile USA – CTIA 2012


*Note: Cisco Visual Networking Index, 2012                                          6
of Attacks
          First Evidence
                                                                     Bots and Malware Landscape




    Melissa
       I Love You
          Code Red Worm
                      SQL Slammer Attack
                            Sasser
                                Storm
                                        Zeus
                                               Conficker


                                                       Droid Dream
7
Accelerating Mobile Malware Threats



                It will take 2 years for mobile
               threats to do what PC threats
                    evolved to in 15 years




                                                  8
The Lifecycle of a Bot Network
                 Botnet
                               C&C




                                                           Bot Master

                                          3 – Bot gets
                                       instructions from
                                     Command and Control
                                          (C&C) server



                                                               2 – User visits site and
1 – Spam (or “something”)
                                                                is infected via “drive
entices user to badsite.com
                                                               by download” Malware
                                                                and becomes part of
                                                                        Botnet




                                                          4 – Newly infected
                                                         machine (bot) joins
                              Innocent                 Botnet in DDOS attack on
                                User                     a legitimate Web site




                                                                                          9
Network Proficiency Solution
•  Use network resources more               •  Reclaiming spectrum leads to
   efficiently                                 real and immediate benefits
   –  RAN and Packet Core impacts              –  Increased availability for new
       •  In combination with offload and         customers and services
          HetNet solutions                     –  Leverage network assets over
   –  Prevent bot-generated activity              longer timeframes
      and consumption                          –  Decreased risk of email black
      Note: Yes, even on mobile devices           listing (RBLs)
       •  Decrease outbound spam
                                               –  Lower cost of delivering service
       •  Block internally generated
          bandwidth floods                     –  Greater defenses from outages
                                                  or performance degradation
   –  Segregate abusive customers
       •  Infected users
       •  Users going above defined
          thresholds




                                                                                     10
Protecting the Network




                            Visibility and
                             Reporting
 Nominum Bot
 Domain Feed




               MDR                           goodsite1.com
                                              Response

               Vantio DNS                      botC&C.com

                 System                        NXDomain
                                             goodsite2.com
               Service Provider               Response
                   Network




                                                             11
Understanding User Trends




                            12
Network Proficiency Use Case
•  Latin American converged customer
   –  5M mobile customers and 250K broadband customers

•  The problem they faced
   –  Botnet and malware infection documented to be as high as 10%
         •  Infected customers generating nearly half of all DNS traffic
         •  20% of all DNS traffic was determined to be spam-generating
   –  Outbound spam was directly impacting end users
         •  Customer “AS Numbers” were blacklisted preventing email from
            being sent
   –  Bot related traffic consuming fixed and wireless resources

•  Addressing the issue
   –    Implemented components of the Network Proficiency Solution
   –    Prevented bot-related activity
   –    Removed customers from black lists for full email access
   –    Decreased consumption of vital network resources
                                                                           13
Mobile Packet Core Solution
•  Control Plane Functions                 •  User Plane Functions
   –  Ensuring reliable services              –  Ensuring high performance and
       •  Intra-network connectivity             complete security
       •  Roaming across/between                  •  Low latency
          carriers                                •  Protection from attack
       •  Interworking between 3G and 4G          •  Data assurance
          networks
                                              –  Serve as the basis for mobile
   –  Multiple interfaces rely on DNS            solutions
       •    Gn/Gp and S5/S8                       •    Network Proficiency
       •    ENUM                                  •    Network and User Security
       •    Diameter                              •    Subscriber Loyalty
       •    IMS                                   •    Network and Service Visibility
   –  Enhanced features
       •  Health monitoring
       •  Load balancing between
          elements
       •  Automatic NAPTR record
          generation

                                                                                        14
Nominum Mobile Suite
•  Anywhere/Anytime information access
   –  Efficiency: Highest network performance at the lowest TCO
   –  Differentiation: Pre-built apps to provide new services/revenues
   –  Agility: Adapt to market changes and innovate quickly

•  Real business issues are addressed by a DNS platform
   –  Core network functionality is only the beginning
   –  Enhanced applications are built right on top of this existing asset

•  Consider the DNS as a critical network element
   –  DNS must be carrier grade more so now than ever before
   –  DNS is a critical network element & is more so every day

        Wireless Environments Have Unique Needs
                 Nominum Knows Mobile

                                                                            15
www.nominum.com
                  Twitter: @Nominum
   Facebook: http://www.facebook.com/nominum
YouTube: http://www.youtube.com/nominumwebinars
LinkedIn: http://www.linkedin.com/company/nominum




               Doug Miller
      doug.miller@nominum.com
Rami%Yaron%
Mobile%Backhaul%Ambassador,%MEF%
VP,%Technology%&%Business%Development%
ryaron@DragonWaveInc.com%
                                         !
CE 2.0 Mobile Backhaul Initiative




           MEF 23.1,                  Multi-CoS    Packet Sync     Microwave
MEF 22.1                 Multi-CoS
            MEF 6.1                     Best        for CE over   Technologies
                        Positioning
             10.2                     Practices         MBH          for CE


                   www.metroetherne+orum.org!for!details!                        !
MEF!6.x!        MEF!10.x!        MEF!13!      MEF!23.1!


                                                                           MEFs own work as
                                                                           the foundation
Other SDOs


                                                                           Industry trends
   TR.221



                                                                             TDM to Packet

                                 MEF%22.1%

                                                                             3G to 4GLTE




             Standardized!                               SynchronizaEon!
                                      Service!
               reference!!                              RecommendaEons!
                                  Requirements!
                 points!
                                  (Service!Types,!
                                CoS,!Eth!OAM,!etc)!



                                                                                              !
Carrier%Ethernet%is%transport%technology%agnosJc%%
    –  being!designed!for!delivery!across!all!access!transports!
                                                            RAN
                                                            Base station
   RAN
   Base station
                                                    PON Fiber

  RAN
                                                                  ONT
                                                                            Recent!!!!
  Base station                          Microwave
                                                       Splitter             EducaEonal!Paper!
          Direct Fiber                                                     Microwave Technologies
                                    Backhaul Service                       For Carrier Ethernet
         Ethernet over Bonded PDH       Provider                           Services
  RAN             (E1/DS1)
  Base station
                                                                           Published
                                                    Fiber                  by MEF
                                                                           available for
                                                                           download

                                                              RAN
                                                             Network
                                                            Controller
     RAN
     Base station




                                                                                                    !
Mobile Backhaul Migration Use Cases
          Packet%offload%over%Carrier%Ethernet%%                                                                 RAN%dual%stack%–%Use%Case%2a%
                    Use%Case%1a%
                                                                                                                                    Legacy%
                                         Legacy%                                                                                    Network !
                                         Network !




                                          Carrier%                                                                                   Carrier%
                                         Ethernet%                                                                                  Ethernet%
                                         Network   !                                                                                Network   !
RAN%BS!       NonO       GIWF!     UNI
                                     !                 UNI
                                                         !   GIWF!      NonO          RAN%NC!
                                                                                                 RAN%BS!                    UNI
                                                                                                                              !                       UNI
                                                                                                                                                        !            RAN%NC!
           Ethernet%I/F!                                             Ethernet%I/F!




              EmulaJon%over%Carrier%Ethernet%                                                                   Full%Ethernet%–%Use%Case%2b%
                      Use%Case%1b%


                                          Carrier%                                                                                Carrier%Ethernet%
                                         Ethernet%                                                                                    Network !
                                         Network   !
                                                                                                     RAN%BS!          UNI
                                                                                                                        !                                   UNI
                                                                                                                                                              !   RAN%NC!
RAN%BS!       NonO         GIWF!   UNI
                                     !                 UNI
                                                         !   GIWF!       NonO          RAN%NC!
           Ethernet%I/F!                                              Ethernet%I/F!




                                                                                                                                                                            !
!
•  3G%Backhaul:%~%100km%(Metro)%                                Metro!
                                                              Carrier Ethernet
                                                                 Network
•  LTE%Backhaul%expanded%reach:%                                             RNC

    –  BS%to%SOGW/MME%~1000km%(Regional)%
    –  BS%to%BS%~%neighbors%(10s%of%km)%                                           S-GW
                                                              Regional!             MME


                                                                                          S-GW
   EVC!for!X2!                                               Carrier Ethernet Network      MME
                                       EVC!for!S1!
    Interface!                          Interface!                      S1Oflex!




                                        S-GW
                                         MME




                                                     Mobility!Management!EnEty!

                                                                                                 !
EVC!MEG!




•    Subscriber%MEG%for%Mobile%Operator%(as%Customer/Subscriber)%

•    EVC%MEG%(or%Operator%MEG)%for%MEN%Operator%(as%Service%Provider)%
      –  Fault!and!Performance!Management!to!report!EVC!Performance!


•    UNI%MEG%used%to%monitor%MEF%compliant%UNI%
      –  eg.!RAN!CE!&!MEN!using!UNI!Type!2!with!Service!OAM!capability!

                                                                          !
•    Service%availability%depends%on%protecJon%of%both%UNI%and%EVC%
•    Diversity%for%higher%Availability%
      –    UNI!Resiliency!(Link!AggregaEon)!
      –    MEN!Resiliency!Model!(MEN!Operator!implements!protecEon)!
      –    RAN!Resiliency!Model!(Mobile!Operator!implements!protecEon)!
      –    ParEal!vs!Full!Diversity!(some!or!no!shared!infrastructure)!
•  Use%Cases%
      –  S1Oflex!in!LTE!
      –  Protect!synchronizaEon!!
•    Group%Availability%
      –  Set!of!EVCs!

•  Care%for:%
      –  Long!term!disrupEons!
      –  Short!term!loss!in!!
         signaling!can!bring!!
         down!a!cell!site!!



                                                                          !
•  MEF%Service%SpecificaJons%augment%industry%%                                      Protection Examples
   standards%                                                                     1+1 APS (Active/Standby)
•  Address%port%and%service%%                                                     LAG (802.1AX)
   protecJon,%fault%detecJon%and%restoraJon%                                      Dual Homing
    –    At!the!UNI!ports!                                                        Ring Protection (G.8032)
    –    At!the!ENNI!(for!direct!and!Exchange!connecEons)!                        Linear Protection (G.8031)
    –    For!UNI!to!UNI!(EVCs)!                                                   Spatial Diversity (Microwave)
    –    UNIOENNI!OVCs!                                                           Frequency Diversity (Microwave)


•  The%following%is%an%example%of%few%backhaul%resiliency%methods%%
         RAN BS
                                          Active/Standby on a                 Ring Protection
                  Frequency Diversity     Leased backhaul tier
                                                                                                   RAN NC
                                                     EVC 1
                                                 (Primary Path)

                                                                  UNI   UNI                 UNI
                                    UNI   UNI
                   UNI



                                                     EVC 2
                                                 (Backup Path)




                                                                                                                     !
One%Way%Performance%ObjecJves%
  Performance%
                      CoS%Label%H%        CoS%Label%M%        CoS%Label%L%         Applicability%
   A_ributes%

Frame!Delay!(ms)!         ≤ 10!               ≤ 20!               ≤ 37!         At!least!one!of!either!
                                                                                FD!or!MFD!required!!
   MFD!(ms)!               ≤ 7!               ≤ 13!               ≤ 28!

InterOFrame!Delay!
                                           ≤ 8!or!N/S!!           N/S!
  VariaEon!(ms)!           ≤ 3!                                                 At!least!one!of!either!
                                                                                FDR!or!IFDV!required!!
  Frame!Delay!!
                           ≤ 5!            ≤ 10!or!N/S!!          N/S!
   Range!(ms)!

Frame!Loss!RaEo!     ≤ .01%!i.e.!10O4!   ≤ .01%!i.e.!10O4!   ≤ .1%!i.e.!10O3!

    Reference:%MEF%23.1%Performance%Tier%1%(Metro)%%CoS%Performance%ObjecJves%




                                                                                                          !
•  The%following%shows%how%backhaul%services%can%be%integrated%between%
   mobile%operators%and%access%providers%even%when%the%services%offered%are%
   not%the%same:%

                      Generic%Traffic%Classes%Mapping%to%CoS%Names
   CoS%Names          4!CoS!Names           3!CoS!Names           2!CoS!Names           2!CoS!Names
   Very!High!!(H+)!   SynchronizaEon        O                     O                     O

   High!!(H)!         ConversaEonal,!       SynchronizaEon,!      SynchronizaEon,!!     SynchronizaEon,!
                      Signaling,!Network!   ConversaEonal,!!!     ConversaEonal,!!      ConversaEonal,!!
                      Management!and!       Signaling,!Network!   Signaling,!Network!   Signaling,!Network!
                      Control               Management!and!       Management!           Management,!
                                            Control               Control,!and!         Control,!and!
                                                                  Streaming!media       Streaming!media
   Medium!!(M)!       Streaming!media       Streaming!media       O                     InteracEve!and!!
                                                                                        Background
   Low!!(L)!          InteracEve!and!!      InteracEve!and!!      InteracEve!and!!
                      Background            Background            Background

   MEF!22.1:!Examples!of!MBH!Traffic!Classes!mapping!to!CoS!Names!in!a!Carrier!Ethernet!Backhaul!network!


                                                                                                              !
Frequency Synchronization
                      TA=1/fA
                                                    Mobile Network      Frequency   Time-of-
A                                          t
                                                    Architecture        Sync        day / Phase
                           TB=1/fB                                                  Sync
B                                         t         CDMA2000                             
      fA=fB
                                                    GSM
                                                                           
Phase Synchronization                               UMTS-FDD
                          TA=1/fA
                                                                           
                                                    LTE-FDD
A                                               t
                                                                           
                                                    UMTS-TDD
                           TB=1/fB                                                      
B                                                   LTE-FDD with
                                                t
                                                    advanced features
                                                                                        
      fA=fB
                                                    LTE-TDD
Time Synchronization                                                                    
                                     01:00:10       Mobile WiMAX
               01:00:00
                           TA=1/fA                                                      
A                                               t   TD-SCDMA
                                                                                        
                          TB=1/fB

                                                t
B
      fA=fB        01:00:00          01:00:10


                                                                                                  !
•  UNI%PHY%
   –  Synchronous!mode!of!operaEon!(Synchronous!Ethernet)!
        •  Locked!to!Ethernet!Equipment!Clock!(EEC)!
•  Interoperable%operaJon%of%Synchronous%Ethernet%
   –  Synchronous!messages:!GeneraEon!&!processing!rules!
   –  Clock!Quality!Level!(QL)!indicaEon!&!processing!rules!
   –  DirecEon!of!clock!distribuEon:!MEN!to!Base!StaEon!
•  RecommendaJon%to%support%QL%processing%%
   in%Base%StaJon%
   –  Failure!condiEons!&!Switchover!!
      to!alternate!Primary!reference!




                                                               !
UNI
•  Using!sync!embedded!in!the!data!                                                    Frame Arrival


    –  Sync/data!is!in!a!high!priority!EVC!                                              EVC
         •  InterOarrival!rate!using!AdapEve!Clock!Recovery!(ACR)!
         •  Can!also!use!CES!RTP!opEonal!header!for!synchronizaEon!Emestamps!

•  Using!a!sync!protocol!(e.g..!IEEE1588v2)!
                                                                                UNI   Sync as a Class of
    –  Separate!EVCs!                                                                 Service (EVC)
         •  Each!EVC!will!have!its!own!performance!!
                                                                                      EVC (Data)
    –  Separate!Class!of!Service!within!the!same!EVC!
         •  Sync!is!marked!with!higher!CoS!
                                                                                       EVC_(Sync)




                                                                          UNI     Sync as a Class of
                                                                                  Service (EVC+PCP)

                                                                                          CoS (Data)
                                                                                EVC

             MO:!Mobile!Operator!         PRC:!Primary!Reference!Clock!                   CoS (Sync)
             NE:!Network!Element!         PCP:!Priority!Code!Point!
             PEC:!Packet!Equipment!Clock!

                                                                                                       !
Single Class vs. Multiple Classes (1)
Many providers have taken first steps to Carrier Ethernet
  ─  But with simplistic, one Class of Service approach:
     simple but costly, and with QoS issues

                           DelayOsensiEve!    Bursty,!delay!&!loss!
                           real!Eme!data!        tolerant!data!
   Access%                                                              Mobile%
   Provider%                                                           Operator
                                                                              %
                                             An%Access%Provider%EVC%


               Result/Impact%

               • Needs%very%costly%overbuild%
               • Does%not%scale%O%recipe%for%going%out%of%business%
               • High%priority%traffic%subject%to%delay%–%especially%
                 during%traffic%bursts%and%peaks%


                                                                              !
Single Class vs. Multiple Classes (2)
              MulJpleOClasses%of%Service:%more%complex%but%great%rewards%
                                        DelayOsensiEve!    High%Priority%Lane%
                                        real!Eme!data!

                                     Low%Priority%Lane%    Bursty,!delay!&!loss!
                                                              tolerant!data!                                                       Mobile%
                                                                                                                                  Operator
                                                                                                                                         %
                                                           An%Access%Provider%EVC%
PrioriEzing!Data:!!1.!Network!control!2.!InteracEve!voice,!video,!3.!Signaling,!4!Internet!data,!business!data,!streamed!video!

              Result/Impact%
              Access%Providers%
              •  More!revenue!for!same!cost:!more!users,!more!responsive!QoS!
              •  Avoids!costly!overObuild!
              •  Maximize!profitability!–!leverage!Ethernet!packet!efficiency!

              Mobile%Operators%
              •  Enabled!Savings!in!a!mulEObillion!Industry!!
              •  Enables!resoluEon!of!most!criEcal!challenge:!
              “Handling)unprecedented)growth)of)data)while)preserving)or)improving)QoS.”))

                                                                                                                                         !
•  Ethernet%%adopJon%accepted%by%vast%majority%
•  MEF:%new%soluJons%for%opJmizaJon%of%MBH%
   –  Packet!&!networkObased!synchronizaEon!
   –  MEF!22.1:!MulEOCoS,!Service!mapping,!Link!&!Service!
      OAM,!Resiliency!performance!
   –  Supports!efficient!deployment!of!4G/LTE!
   –  Plus!2G,!3G!and!migraEon!use!cases!
•  Impact%of%new%MEF%work%
   –  CapEx!savings,!PotenEal!OpEx!savings!for!Operators!
   –  Bejer!bandwidth!uElizaEon!and!service!quality!!!
   –  Sustainable!future!for!MBH!

                                                             !

More Related Content

What's hot

Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
pwcom.co.uk Ltd
 
SyntecX Blazon
SyntecX BlazonSyntecX Blazon
SyntecX Blazon
Faraz Muhammad, Nisar
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
IBM Danmark
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN Monitoring
Riverbed Technology
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
Andris Soroka
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
Abhilash Ravishankar
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
Anna Stirling
 
Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Ved Prakash Gupta
 
Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
Jeff Danielson
 
Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Salcom Group
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
CloudComputing
 
Android Cloud2Device Messaging
Android Cloud2Device MessagingAndroid Cloud2Device Messaging
Android Cloud2Device MessagingMando Stam
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)djpuccio
 

What's hot (20)

Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008I Mo Presentation Building Centre Oct 2008
I Mo Presentation Building Centre Oct 2008
 
SyntecX Blazon
SyntecX BlazonSyntecX Blazon
SyntecX Blazon
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN Monitoring
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012
 
Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
 
Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013Viestintäaamupäivä exchange 2013
Viestintäaamupäivä exchange 2013
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Firesite Chat Klemen 18 March 2010
Firesite Chat Klemen 18 March 2010Firesite Chat Klemen 18 March 2010
Firesite Chat Klemen 18 March 2010
 
Android Cloud2Device Messaging
Android Cloud2Device MessagingAndroid Cloud2Device Messaging
Android Cloud2Device Messaging
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)
 

Viewers also liked

La vida
La vidaLa vida
La vida
ivannoguera
 
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1pageAmazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
Prachoom Rangkasikorn
 
Anthony Lim portfolio
Anthony Lim portfolioAnthony Lim portfolio
Anthony Lim portfolio
anthonylim
 
Creative commons y ofimatica web
Creative commons y ofimatica webCreative commons y ofimatica web
Creative commons y ofimatica web
Andres Morales Valencia
 
YOVI Brochure in Spanish
YOVI Brochure in Spanish  YOVI Brochure in Spanish
YOVI Brochure in Spanish
Jvt1PLY8809
 
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4pageAmazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
Prachoom Rangkasikorn
 
Mantenimiento preventivo
Mantenimiento preventivoMantenimiento preventivo
Mantenimiento preventivoivannoguera
 
Sistema de archivo
Sistema de archivoSistema de archivo
Sistema de archivo
brayansegura34
 
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4pageWord Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
Prachoom Rangkasikorn
 
Bulgaria, Romania what we have in common
Bulgaria, Romania   what we have in common Bulgaria, Romania   what we have in common
Bulgaria, Romania what we have in common Pepi Nikova
 
Importancia anestesia cirugía videoendoscópica - CICAT-SALUD
Importancia anestesia cirugía videoendoscópica - CICAT-SALUDImportancia anestesia cirugía videoendoscópica - CICAT-SALUD
Importancia anestesia cirugía videoendoscópica - CICAT-SALUD
CICAT SALUD
 
Actividad 2 Programación de Sistemas.
Actividad 2 Programación de Sistemas.Actividad 2 Programación de Sistemas.
Actividad 2 Programación de Sistemas.
Dispositivosmoviles
 
Development of avalanche hazard maps by ArcGIS for Alpine Italy
Development of avalanche hazard maps by ArcGIS for Alpine ItalyDevelopment of avalanche hazard maps by ArcGIS for Alpine Italy
Development of avalanche hazard maps by ArcGIS for Alpine Italy
Maryam Izadifar
 
Salud pública en colombia
Salud pública en colombiaSalud pública en colombia
Salud pública en colombiaLuisRuizP
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
securityxploded
 
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionadosRelatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
Ericsson Latin America
 
Reducción de la remuneración consensuada y no consensuada compilador josé m...
Reducción de la remuneración consensuada y no consensuada   compilador josé m...Reducción de la remuneración consensuada y no consensuada   compilador josé m...
Reducción de la remuneración consensuada y no consensuada compilador josé m...
Corporación Hiram Servicios Legales
 
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARIOBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
Corporación Hiram Servicios Legales
 

Viewers also liked (19)

La vida
La vidaLa vida
La vida
 
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1pageAmazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-1page
 
Anthony Lim portfolio
Anthony Lim portfolioAnthony Lim portfolio
Anthony Lim portfolio
 
Creative commons y ofimatica web
Creative commons y ofimatica webCreative commons y ofimatica web
Creative commons y ofimatica web
 
YOVI Brochure in Spanish
YOVI Brochure in Spanish  YOVI Brochure in Spanish
YOVI Brochure in Spanish
 
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4pageAmazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
Amazing Thailandt+Queen Projects2+ป.1+109+dltvengp1+55t2eng p01 f18-4page
 
Mantenimiento preventivo
Mantenimiento preventivoMantenimiento preventivo
Mantenimiento preventivo
 
Sistema de archivo
Sistema de archivoSistema de archivo
Sistema de archivo
 
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4pageWord Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
Word Fun1t+How many1+ป.1+110+dltvengp1+54wordfun p01 f13-4page
 
Bulgaria, Romania what we have in common
Bulgaria, Romania   what we have in common Bulgaria, Romania   what we have in common
Bulgaria, Romania what we have in common
 
Importancia anestesia cirugía videoendoscópica - CICAT-SALUD
Importancia anestesia cirugía videoendoscópica - CICAT-SALUDImportancia anestesia cirugía videoendoscópica - CICAT-SALUD
Importancia anestesia cirugía videoendoscópica - CICAT-SALUD
 
Actividad 2 Programación de Sistemas.
Actividad 2 Programación de Sistemas.Actividad 2 Programación de Sistemas.
Actividad 2 Programación de Sistemas.
 
Development of avalanche hazard maps by ArcGIS for Alpine Italy
Development of avalanche hazard maps by ArcGIS for Alpine ItalyDevelopment of avalanche hazard maps by ArcGIS for Alpine Italy
Development of avalanche hazard maps by ArcGIS for Alpine Italy
 
Salud pública en colombia
Salud pública en colombiaSalud pública en colombia
Salud pública en colombia
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionadosRelatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
Relatório de Mobilidade da Ericsson, Novembro 2016: Gráficos selecionados
 
Reducción de la remuneración consensuada y no consensuada compilador josé m...
Reducción de la remuneración consensuada y no consensuada   compilador josé m...Reducción de la remuneración consensuada y no consensuada   compilador josé m...
Reducción de la remuneración consensuada y no consensuada compilador josé m...
 
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARIOBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
OBRERO CAS PUEDE SER REPUESTO AL D. LEG. 728 - COMPILADOR JOSÉ MARIA PACORI CARI
 
10 correctos
10 correctos10 correctos
10 correctos
 

Similar to Telesemana ce nominum:mef

Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solutionbackfire_88
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
Djadja Sardjana
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
IBM Danmark
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
Digicomp Academy AG
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
Riverbed Technology
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service Providers
Juniper Networks
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
impodgirl
 
Inventit service sync internet-of-things m2m application enablement platform
Inventit service sync internet-of-things m2m application enablement platformInventit service sync internet-of-things m2m application enablement platform
Inventit service sync internet-of-things m2m application enablement platform
taknishida
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013
Leigh Williamson
 
Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).
Mindtree Ltd.
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
CA API Management
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
CA API Management
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
Ericsson Labs
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMicrosoft Windows Embedded
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Joel Demay
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Full Circle: The Rise of Vehicle-Installed Telematics
Full Circle: The Rise of Vehicle-Installed TelematicsFull Circle: The Rise of Vehicle-Installed Telematics
Full Circle: The Rise of Vehicle-Installed TelematicsHitReach
 

Similar to Telesemana ce nominum:mef (20)

Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBMUndgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
Undgå sikkerhedstrusler med Security Intelligence. Filip Schepers, IBM
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
S series presentation
S series presentationS series presentation
S series presentation
 
Top Ten Imperatives for Service Providers
Top Ten Imperatives for Service ProvidersTop Ten Imperatives for Service Providers
Top Ten Imperatives for Service Providers
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Inventit service sync internet-of-things m2m application enablement platform
Inventit service sync internet-of-things m2m application enablement platformInventit service sync internet-of-things m2m application enablement platform
Inventit service sync internet-of-things m2m application enablement platform
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013
 
Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).Mindtree's expertise in machine to machine (M2M).
Mindtree's expertise in machine to machine (M2M).
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
C2MS
C2MSC2MS
C2MS
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Full Circle: The Rise of Vehicle-Installed Telematics
Full Circle: The Rise of Vehicle-Installed TelematicsFull Circle: The Rise of Vehicle-Installed Telematics
Full Circle: The Rise of Vehicle-Installed Telematics
 

More from Rafael Junquera

Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalColt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalRafael Junquera
 
Webinar 3-12-2013 Comptel, Analytics
Webinar 3-12-2013 Comptel, AnalyticsWebinar 3-12-2013 Comptel, Analytics
Webinar 3-12-2013 Comptel, AnalyticsRafael Junquera
 
Ims and rcs are fighting ott nov 8 2013 v1
Ims and rcs are fighting ott nov 8 2013 v1Ims and rcs are fighting ott nov 8 2013 v1
Ims and rcs are fighting ott nov 8 2013 v1Rafael Junquera
 
Webinar 26 de noviembre 2013
Webinar 26 de noviembre 2013Webinar 26 de noviembre 2013
Webinar 26 de noviembre 2013Rafael Junquera
 
Sdn en latinoamérica 5 11-13
Sdn en latinoamérica 5 11-13Sdn en latinoamérica 5 11-13
Sdn en latinoamérica 5 11-13Rafael Junquera
 
Workshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperWorkshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperRafael Junquera
 
Cant touch this hs es_la_no_mc_hv1
Cant touch this hs es_la_no_mc_hv1Cant touch this hs es_la_no_mc_hv1
Cant touch this hs es_la_no_mc_hv1Rafael Junquera
 
Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chileRafael Junquera
 
Workshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperWorkshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperRafael Junquera
 
Revolucion movil telesemana
Revolucion movil telesemanaRevolucion movil telesemana
Revolucion movil telesemanaRafael Junquera
 
Packet network timing distribution webinar v0-3 hs-es_la
Packet network timing distribution   webinar v0-3 hs-es_laPacket network timing distribution   webinar v0-3 hs-es_la
Packet network timing distribution webinar v0-3 hs-es_laRafael Junquera
 
Webinar telesemana amdocs_toa_sep_2013v4
Webinar telesemana amdocs_toa_sep_2013v4Webinar telesemana amdocs_toa_sep_2013v4
Webinar telesemana amdocs_toa_sep_2013v4Rafael Junquera
 
Lte continuing the evolution of mobile broadband networks
Lte continuing the evolution of mobile broadband networksLte continuing the evolution of mobile broadband networks
Lte continuing the evolution of mobile broadband networksRafael Junquera
 
Content blocking telesemana_final 2
Content blocking telesemana_final 2Content blocking telesemana_final 2
Content blocking telesemana_final 2Rafael Junquera
 
Comptel social links_2.0_presentation v2
Comptel social links_2.0_presentation v2Comptel social links_2.0_presentation v2
Comptel social links_2.0_presentation v2Rafael Junquera
 
Telesemana webinar cos final
Telesemana webinar cos finalTelesemana webinar cos final
Telesemana webinar cos finalRafael Junquera
 

More from Rafael Junquera (20)

Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-finalColt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
Colt sdn-strategy-telesemana-diciembre-2013-javier-benitez-colt-final
 
4 gip webinar dic 2013
4 gip webinar dic 20134 gip webinar dic 2013
4 gip webinar dic 2013
 
Webinar 3-12-2013 Comptel, Analytics
Webinar 3-12-2013 Comptel, AnalyticsWebinar 3-12-2013 Comptel, Analytics
Webinar 3-12-2013 Comptel, Analytics
 
Ims and rcs are fighting ott nov 8 2013 v1
Ims and rcs are fighting ott nov 8 2013 v1Ims and rcs are fighting ott nov 8 2013 v1
Ims and rcs are fighting ott nov 8 2013 v1
 
Webinar 26 de noviembre 2013
Webinar 26 de noviembre 2013Webinar 26 de noviembre 2013
Webinar 26 de noviembre 2013
 
Sdn en latinoamérica 5 11-13
Sdn en latinoamérica 5 11-13Sdn en latinoamérica 5 11-13
Sdn en latinoamérica 5 11-13
 
Workshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperWorkshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniper
 
Cant touch this hs es_la_no_mc_hv1
Cant touch this hs es_la_no_mc_hv1Cant touch this hs es_la_no_mc_hv1
Cant touch this hs es_la_no_mc_hv1
 
Sdn nf v_cala_slides
Sdn nf v_cala_slidesSdn nf v_cala_slides
Sdn nf v_cala_slides
 
Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chile
 
Workshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniperWorkshop sdn nfv arg-ch juniper
Workshop sdn nfv arg-ch juniper
 
Revolucion movil telesemana
Revolucion movil telesemanaRevolucion movil telesemana
Revolucion movil telesemana
 
Packet network timing distribution webinar v0-3 hs-es_la
Packet network timing distribution   webinar v0-3 hs-es_laPacket network timing distribution   webinar v0-3 hs-es_la
Packet network timing distribution webinar v0-3 hs-es_la
 
Webinar telesemana amdocs_toa_sep_2013v4
Webinar telesemana amdocs_toa_sep_2013v4Webinar telesemana amdocs_toa_sep_2013v4
Webinar telesemana amdocs_toa_sep_2013v4
 
Lte continuing the evolution of mobile broadband networks
Lte continuing the evolution of mobile broadband networksLte continuing the evolution of mobile broadband networks
Lte continuing the evolution of mobile broadband networks
 
Content blocking telesemana_final 2
Content blocking telesemana_final 2Content blocking telesemana_final 2
Content blocking telesemana_final 2
 
Comptel social links_2.0_presentation v2
Comptel social links_2.0_presentation v2Comptel social links_2.0_presentation v2
Comptel social links_2.0_presentation v2
 
Telco systems final
Telco systems finalTelco systems final
Telco systems final
 
Webinar telesemana lte
Webinar telesemana lteWebinar telesemana lte
Webinar telesemana lte
 
Telesemana webinar cos final
Telesemana webinar cos finalTelesemana webinar cos final
Telesemana webinar cos final
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Telesemana ce nominum:mef

  • 1. Carrier Ethernet for Mobile Broadband Networks Optimizing Backhaul Networks to Address Performance and Security Doug Miller doug.miller@nominum.com July 10, 2012
  • 2. Company Overview We are the WORLD LEADER Our solutions run the world s The first & only DNS/DHCP in DNS & DHCP solutions MOST DEMANDING networks INTEGRATED ARCHITECTURE •  Our Chairman, Dr. Paul •  A decade of service provider •  DNS/DHCP engines provide Mockapetris, invented the DNS experience efficiency, lower costs, higher QoS •  Team comprised of BIND 8, BIND •  Over 140 Fixed and Mobile service •  Platforms enable agility & faster 9 & ISC-DHCP creators providers application development •  40 issued and pending patents •  Serving over 500 million Internet •  Applications create differentiation users worldwide and new revenue sources Our mobile customer base includes: Our fixed broadband customer base includes: 2
  • 3. Three-Tiered Integrated Architecture NOMINUM APPS 3rd PARTY CERTIFIED APPS Subscriber Content Outbound Configuration SIEM Unified User Interface & Management Messaging Blocking Anti- Spam Management More… Subscriber Anti-Virus Parental Analytics Upsell Control ISP-DEVELOPED APPS Navigation Network Botnet Custom Custom Assistance Monitoring Control More… Interoperability (SDK & APIs) Network Services and Subscriber Services Analytics Security 3
  • 4. Putting Mobile into Perspective Source: Chetan Sharma Consulting – 2012 4
  • 5. Mobile Devices per User Source: Cisco IBSG, 2011 5
  • 6. The Changing Face of Mobile •  Connected devices are expanding –  Not just mobile phones* •  175M laptops on the mobile network in 2011 –  22x more traffic than more traffic than smartphones •  Tablets to exceed 10% of global mobile data traffic in 2016 •  In 2016, 4G will be 6 percent of connections, but 36 percent of total traffic –  Mobile devices aren’t as protected as home networks •  Spectrum consumption is a constant battle –  “If we don't get new frequency [in 2012], it will topple our company.” •  Asahi Shimbun - CTO of Softbank Mobile –  “Frequency allocations alone are not the only solution. We need to be as smart as possible in managing our capacity.” •  Philipp Humm, President and CEO of T-Mobile USA – CTIA 2012 *Note: Cisco Visual Networking Index, 2012 6
  • 7. of Attacks First Evidence Bots and Malware Landscape Melissa I Love You Code Red Worm SQL Slammer Attack Sasser Storm Zeus Conficker Droid Dream 7
  • 8. Accelerating Mobile Malware Threats It will take 2 years for mobile threats to do what PC threats evolved to in 15 years 8
  • 9. The Lifecycle of a Bot Network Botnet C&C Bot Master 3 – Bot gets instructions from Command and Control (C&C) server 2 – User visits site and 1 – Spam (or “something”) is infected via “drive entices user to badsite.com by download” Malware and becomes part of Botnet 4 – Newly infected machine (bot) joins Innocent Botnet in DDOS attack on User a legitimate Web site 9
  • 10. Network Proficiency Solution •  Use network resources more •  Reclaiming spectrum leads to efficiently real and immediate benefits –  RAN and Packet Core impacts –  Increased availability for new •  In combination with offload and customers and services HetNet solutions –  Leverage network assets over –  Prevent bot-generated activity longer timeframes and consumption –  Decreased risk of email black Note: Yes, even on mobile devices listing (RBLs) •  Decrease outbound spam –  Lower cost of delivering service •  Block internally generated bandwidth floods –  Greater defenses from outages or performance degradation –  Segregate abusive customers •  Infected users •  Users going above defined thresholds 10
  • 11. Protecting the Network Visibility and Reporting Nominum Bot Domain Feed MDR goodsite1.com Response Vantio DNS botC&C.com System NXDomain goodsite2.com Service Provider Response Network 11
  • 13. Network Proficiency Use Case •  Latin American converged customer –  5M mobile customers and 250K broadband customers •  The problem they faced –  Botnet and malware infection documented to be as high as 10% •  Infected customers generating nearly half of all DNS traffic •  20% of all DNS traffic was determined to be spam-generating –  Outbound spam was directly impacting end users •  Customer “AS Numbers” were blacklisted preventing email from being sent –  Bot related traffic consuming fixed and wireless resources •  Addressing the issue –  Implemented components of the Network Proficiency Solution –  Prevented bot-related activity –  Removed customers from black lists for full email access –  Decreased consumption of vital network resources 13
  • 14. Mobile Packet Core Solution •  Control Plane Functions •  User Plane Functions –  Ensuring reliable services –  Ensuring high performance and •  Intra-network connectivity complete security •  Roaming across/between •  Low latency carriers •  Protection from attack •  Interworking between 3G and 4G •  Data assurance networks –  Serve as the basis for mobile –  Multiple interfaces rely on DNS solutions •  Gn/Gp and S5/S8 •  Network Proficiency •  ENUM •  Network and User Security •  Diameter •  Subscriber Loyalty •  IMS •  Network and Service Visibility –  Enhanced features •  Health monitoring •  Load balancing between elements •  Automatic NAPTR record generation 14
  • 15. Nominum Mobile Suite •  Anywhere/Anytime information access –  Efficiency: Highest network performance at the lowest TCO –  Differentiation: Pre-built apps to provide new services/revenues –  Agility: Adapt to market changes and innovate quickly •  Real business issues are addressed by a DNS platform –  Core network functionality is only the beginning –  Enhanced applications are built right on top of this existing asset •  Consider the DNS as a critical network element –  DNS must be carrier grade more so now than ever before –  DNS is a critical network element & is more so every day Wireless Environments Have Unique Needs Nominum Knows Mobile 15
  • 16. www.nominum.com Twitter: @Nominum Facebook: http://www.facebook.com/nominum YouTube: http://www.youtube.com/nominumwebinars LinkedIn: http://www.linkedin.com/company/nominum Doug Miller doug.miller@nominum.com
  • 18. CE 2.0 Mobile Backhaul Initiative MEF 23.1, Multi-CoS Packet Sync Microwave MEF 22.1 Multi-CoS MEF 6.1 Best for CE over Technologies Positioning 10.2 Practices MBH for CE www.metroetherne+orum.org!for!details! !
  • 19. MEF!6.x! MEF!10.x! MEF!13! MEF!23.1! MEFs own work as the foundation Other SDOs Industry trends TR.221 TDM to Packet MEF%22.1% 3G to 4GLTE Standardized! SynchronizaEon! Service! reference!! RecommendaEons! Requirements! points! (Service!Types,! CoS,!Eth!OAM,!etc)! !
  • 20. Carrier%Ethernet%is%transport%technology%agnosJc%% –  being!designed!for!delivery!across!all!access!transports! RAN Base station RAN Base station PON Fiber RAN ONT Recent!!!! Base station Microwave Splitter EducaEonal!Paper! Direct Fiber Microwave Technologies Backhaul Service For Carrier Ethernet Ethernet over Bonded PDH Provider Services RAN (E1/DS1) Base station Published Fiber by MEF available for download RAN Network Controller RAN Base station !
  • 21. Mobile Backhaul Migration Use Cases Packet%offload%over%Carrier%Ethernet%% RAN%dual%stack%–%Use%Case%2a% Use%Case%1a% Legacy% Legacy% Network ! Network ! Carrier% Carrier% Ethernet% Ethernet% Network ! Network ! RAN%BS! NonO GIWF! UNI ! UNI ! GIWF! NonO RAN%NC! RAN%BS! UNI ! UNI ! RAN%NC! Ethernet%I/F! Ethernet%I/F! EmulaJon%over%Carrier%Ethernet% Full%Ethernet%–%Use%Case%2b% Use%Case%1b% Carrier% Carrier%Ethernet% Ethernet% Network ! Network ! RAN%BS! UNI ! UNI ! RAN%NC! RAN%BS! NonO GIWF! UNI ! UNI ! GIWF! NonO RAN%NC! Ethernet%I/F! Ethernet%I/F! !
  • 22. !
  • 23. •  3G%Backhaul:%~%100km%(Metro)% Metro! Carrier Ethernet Network •  LTE%Backhaul%expanded%reach:% RNC –  BS%to%SOGW/MME%~1000km%(Regional)% –  BS%to%BS%~%neighbors%(10s%of%km)% S-GW Regional! MME S-GW EVC!for!X2! Carrier Ethernet Network MME EVC!for!S1! Interface! Interface! S1Oflex! S-GW MME Mobility!Management!EnEty! !
  • 24. EVC!MEG! •  Subscriber%MEG%for%Mobile%Operator%(as%Customer/Subscriber)% •  EVC%MEG%(or%Operator%MEG)%for%MEN%Operator%(as%Service%Provider)% –  Fault!and!Performance!Management!to!report!EVC!Performance! •  UNI%MEG%used%to%monitor%MEF%compliant%UNI% –  eg.!RAN!CE!&!MEN!using!UNI!Type!2!with!Service!OAM!capability! !
  • 25. •  Service%availability%depends%on%protecJon%of%both%UNI%and%EVC% •  Diversity%for%higher%Availability% –  UNI!Resiliency!(Link!AggregaEon)! –  MEN!Resiliency!Model!(MEN!Operator!implements!protecEon)! –  RAN!Resiliency!Model!(Mobile!Operator!implements!protecEon)! –  ParEal!vs!Full!Diversity!(some!or!no!shared!infrastructure)! •  Use%Cases% –  S1Oflex!in!LTE! –  Protect!synchronizaEon!! •  Group%Availability% –  Set!of!EVCs! •  Care%for:% –  Long!term!disrupEons! –  Short!term!loss!in!! signaling!can!bring!! down!a!cell!site!! !
  • 26. •  MEF%Service%SpecificaJons%augment%industry%% Protection Examples standards%   1+1 APS (Active/Standby) •  Address%port%and%service%%   LAG (802.1AX) protecJon,%fault%detecJon%and%restoraJon%   Dual Homing –  At!the!UNI!ports!   Ring Protection (G.8032) –  At!the!ENNI!(for!direct!and!Exchange!connecEons)!   Linear Protection (G.8031) –  For!UNI!to!UNI!(EVCs)!   Spatial Diversity (Microwave) –  UNIOENNI!OVCs!   Frequency Diversity (Microwave) •  The%following%is%an%example%of%few%backhaul%resiliency%methods%% RAN BS Active/Standby on a Ring Protection Frequency Diversity Leased backhaul tier RAN NC EVC 1 (Primary Path) UNI UNI UNI UNI UNI UNI EVC 2 (Backup Path) !
  • 27. One%Way%Performance%ObjecJves% Performance% CoS%Label%H% CoS%Label%M% CoS%Label%L% Applicability% A_ributes% Frame!Delay!(ms)! ≤ 10! ≤ 20! ≤ 37! At!least!one!of!either! FD!or!MFD!required!! MFD!(ms)! ≤ 7! ≤ 13! ≤ 28! InterOFrame!Delay! ≤ 8!or!N/S!! N/S! VariaEon!(ms)! ≤ 3! At!least!one!of!either! FDR!or!IFDV!required!! Frame!Delay!! ≤ 5! ≤ 10!or!N/S!! N/S! Range!(ms)! Frame!Loss!RaEo! ≤ .01%!i.e.!10O4! ≤ .01%!i.e.!10O4! ≤ .1%!i.e.!10O3! Reference:%MEF%23.1%Performance%Tier%1%(Metro)%%CoS%Performance%ObjecJves% !
  • 28. •  The%following%shows%how%backhaul%services%can%be%integrated%between% mobile%operators%and%access%providers%even%when%the%services%offered%are% not%the%same:% Generic%Traffic%Classes%Mapping%to%CoS%Names CoS%Names 4!CoS!Names 3!CoS!Names 2!CoS!Names 2!CoS!Names Very!High!!(H+)! SynchronizaEon O O O High!!(H)! ConversaEonal,! SynchronizaEon,! SynchronizaEon,!! SynchronizaEon,! Signaling,!Network! ConversaEonal,!!! ConversaEonal,!! ConversaEonal,!! Management!and! Signaling,!Network! Signaling,!Network! Signaling,!Network! Control Management!and! Management! Management,! Control Control,!and! Control,!and! Streaming!media Streaming!media Medium!!(M)! Streaming!media Streaming!media O InteracEve!and!! Background Low!!(L)! InteracEve!and!! InteracEve!and!! InteracEve!and!! Background Background Background MEF!22.1:!Examples!of!MBH!Traffic!Classes!mapping!to!CoS!Names!in!a!Carrier!Ethernet!Backhaul!network! !
  • 29. Frequency Synchronization TA=1/fA Mobile Network Frequency Time-of- A t Architecture Sync day / Phase TB=1/fB Sync B t CDMA2000  fA=fB GSM  Phase Synchronization UMTS-FDD TA=1/fA  LTE-FDD A t  UMTS-TDD TB=1/fB   B LTE-FDD with t advanced features   fA=fB LTE-TDD Time Synchronization   01:00:10 Mobile WiMAX 01:00:00 TA=1/fA   A t TD-SCDMA   TB=1/fB t B fA=fB 01:00:00 01:00:10 !
  • 30. •  UNI%PHY% –  Synchronous!mode!of!operaEon!(Synchronous!Ethernet)! •  Locked!to!Ethernet!Equipment!Clock!(EEC)! •  Interoperable%operaJon%of%Synchronous%Ethernet% –  Synchronous!messages:!GeneraEon!&!processing!rules! –  Clock!Quality!Level!(QL)!indicaEon!&!processing!rules! –  DirecEon!of!clock!distribuEon:!MEN!to!Base!StaEon! •  RecommendaJon%to%support%QL%processing%% in%Base%StaJon% –  Failure!condiEons!&!Switchover!! to!alternate!Primary!reference! !
  • 31. UNI •  Using!sync!embedded!in!the!data! Frame Arrival –  Sync/data!is!in!a!high!priority!EVC! EVC •  InterOarrival!rate!using!AdapEve!Clock!Recovery!(ACR)! •  Can!also!use!CES!RTP!opEonal!header!for!synchronizaEon!Emestamps! •  Using!a!sync!protocol!(e.g..!IEEE1588v2)! UNI Sync as a Class of –  Separate!EVCs! Service (EVC) •  Each!EVC!will!have!its!own!performance!! EVC (Data) –  Separate!Class!of!Service!within!the!same!EVC! •  Sync!is!marked!with!higher!CoS! EVC_(Sync) UNI Sync as a Class of Service (EVC+PCP) CoS (Data) EVC MO:!Mobile!Operator! PRC:!Primary!Reference!Clock! CoS (Sync) NE:!Network!Element! PCP:!Priority!Code!Point! PEC:!Packet!Equipment!Clock! !
  • 32. Single Class vs. Multiple Classes (1) Many providers have taken first steps to Carrier Ethernet ─  But with simplistic, one Class of Service approach: simple but costly, and with QoS issues DelayOsensiEve! Bursty,!delay!&!loss! real!Eme!data! tolerant!data! Access% Mobile% Provider% Operator % An%Access%Provider%EVC% Result/Impact% • Needs%very%costly%overbuild% • Does%not%scale%O%recipe%for%going%out%of%business% • High%priority%traffic%subject%to%delay%–%especially% during%traffic%bursts%and%peaks% !
  • 33. Single Class vs. Multiple Classes (2) MulJpleOClasses%of%Service:%more%complex%but%great%rewards% DelayOsensiEve! High%Priority%Lane% real!Eme!data! Low%Priority%Lane% Bursty,!delay!&!loss! tolerant!data! Mobile% Operator % An%Access%Provider%EVC% PrioriEzing!Data:!!1.!Network!control!2.!InteracEve!voice,!video,!3.!Signaling,!4!Internet!data,!business!data,!streamed!video! Result/Impact% Access%Providers% •  More!revenue!for!same!cost:!more!users,!more!responsive!QoS! •  Avoids!costly!overObuild! •  Maximize!profitability!–!leverage!Ethernet!packet!efficiency! Mobile%Operators% •  Enabled!Savings!in!a!mulEObillion!Industry!! •  Enables!resoluEon!of!most!criEcal!challenge:! “Handling)unprecedented)growth)of)data)while)preserving)or)improving)QoS.”)) !
  • 34. •  Ethernet%%adopJon%accepted%by%vast%majority% •  MEF:%new%soluJons%for%opJmizaJon%of%MBH% –  Packet!&!networkObased!synchronizaEon! –  MEF!22.1:!MulEOCoS,!Service!mapping,!Link!&!Service! OAM,!Resiliency!performance! –  Supports!efficient!deployment!of!4G/LTE! –  Plus!2G,!3G!and!migraEon!use!cases! •  Impact%of%new%MEF%work% –  CapEx!savings,!PotenEal!OpEx!savings!for!Operators! –  Bejer!bandwidth!uElizaEon!and!service!quality!!! –  Sustainable!future!for!MBH! !