SlideShare a Scribd company logo
Q1 2011
                                                                                                  MWC 2011




               Traffic Management
                 Internet Offload Gateway
                 Adaptive Traffic Shaping
                    Policy Enforcement
www.ccpu.com           Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   1
What We Do: Mobile Broadband Capacity Solutions




                               Protocol Software




                                   LTE
                                  Femto
                                   DPI
        ATCA Platforms                                                              Professional Services


www.ccpu.com                 Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   2
Our Customers = Our Success

North America




     EMEA




 Asia Pacific




www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   3
“Smarter, Faster, Cheaper” Mobile Broadband


                    Femtocells =                             Cheapest Bit Pipes




               = Fastest Bit Pipe                                        DPI = Smartest Bit Pipe

www.ccpu.com                        Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   4
Mobile Broadband: Capacity Challenges

               Capacity                                                Mind The Gap




  Traffic doubling every 12 months                     Subscribers expect more for less
        Text
  LTE spectral efficience gain = 4X                    Operators must lower cost per bit




www.ccpu.com                   Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   5
Mobile Traffic Trends

           Bandwidth & Application Growth                           Mobile Data Usage by Top Apps




Video Streaming: Fastest Growing Traffic                                     Monetization Challenge
                                                            Source: Allot Mobile Trends, Global Mobile Broadband Traffic, H1/2010

www.ccpu.com                    Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary      6
What Is Driving This Growth?

    Demographics                       Devices                                             Demand




           Internet               Mobile Internet                                 Internet Applications
          Generation                Devices                                             & Content


www.ccpu.com                    Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   7
And More to Come… 50B Connected Devices!



  Smartphones, Tablets, Notebooks…




   Smartphones                 Tablets                                       Notebooks




  Cameras, eBooks, Med Devices, Gaming, Navigation…



                                           Personal
         IP Cameras   eBooks             Medical Devices                        Gaming Consoles           Navigation Systems




www.ccpu.com                   Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   8
But Challenges Create Opportunities



         MME / Serving GW         MME / Serving GW
                                                                                                       Capacity
                S1                   S1




                            X2




       eNodeB                             eNodeB




                                                                      Cost
                        eNodeB




                                                                                       But Still
                                                                                      Spectrum
                                                                                       Limited
                         4X                             1,000,000X                                                          Manage
        LTE           Spectral                FAP       Spectrum                                              DPI           Limited
                     Efficiency                           Re-use                                                            Capacity



www.ccpu.com                                         Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   9
Disruption




                                                                                       Core
MME / Serving GW        MME / Serving GW           RAN-Aware                           Internet                        Video
                                                  Traffic Shaping                     Offloading                    Optimization
      S1                      S1



                   X2


eNodeB                         eNodeB

                                                                                   Access

                                                     Small Cells                         TD-LTE                     Edge Caching
                 eNodeB




  www.ccpu.com                             Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   10
DPI = “Smart Pipes”




                                     Platinum                                                            Video Conference

                                                                                                         Operator VoIP

                                                                                                         Gaming
                            Bronze
                                                           Gold
                                                                                                         Video on Demand

                                                                                                         Email

                                                                                                         Business Class VPN
                                 Silver
                                                                                                         Browsing

                                                                                                         P2P




               Spectrum Limited – Traffic Management is Essential!

www.ccpu.com                         Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   11
DPI Enables…



  New Revenue Streams                           Higher Network Efficiency

 Tiered SLA                                 Intelligent Traffic Offloading

 Fair Usage                                 Edge Caching

 Bandwidth Allocation                       Adaptive Traffic Shaping
                                                 RAN-aware
 Real-time Service Upgrades
                                             Network Security
                                                 DDoS, IDS / IPS, Firewalls


 www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   12
Striking Balance – How Neutral?




                                  Freedom of
                                    Choice
                Fair-Use
               Balancing                                                          Maintaining
                 Supply                                                            Network
                  vs.                                                             Profitability
                Demand
                                 Transparent                                                                      $
                                 Traffic Mgmt
                                    Policy



www.ccpu.com                  Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   13
Network Intelligence




                                      +
   DPI = Bearer Plane Intelligence                      Monitoring = Control Plane Intelligence


     DPI + Monitoring = Network Intelligence on Steroids

www.ccpu.com                    Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   14
One Platform, Many Applications….



                                                        Internet
                                                        Offload
                                                        Gateway
                                                                                       Adaptive
                                                                                        Traffic
                                                                                        Shaper




                                                                                         Video
                                                                                        Optimizer
                                                                                        Gateway

                                                         Policy
                                                        Enforcer
   DPI-Enabled Applications

www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   15
DPI Platform Evolution




                                                                                     2012:
                                                                                     400 Gbps
                                            2011:
                                                                                    40G Switching
                                            320 Gbps
                                                                                    XE100 Sandy Bridge
                                            40G Switching                           PP80 Packet Processing
               Today:                       XE80 Westmere
               160 Gbps                     PP80 Packet Processing
               10G Switching
               XE80 Westmere
               PP50 Packet Processing
                                                     21 DPI Customer Wins!

www.ccpu.com                   Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   16
Not All Cells Are Loaded Equally




                                    Top 5% utilized                               Average cell
                                    cells heavy on                                    HTTP
                                          P2P                                    Streaming grew
                                                                                     to 27%


                                        Source: Allot Mobile Trends, Global Mobile Broadband Traffic, H2/2009




www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   17
Congestion Defined!




www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   18
Adaptive Traffic Shaping



                                                                  RAN-Aware Traffic Shaping
                                      Radio
                                                                  - Congestion Aware
                                     Access
                                                                  - Femto Aware
                  Dense Urban        Network
                                                                  - Dynamic Network Policy
                      #1              (RAN)

                                                                               Signaling Information




                   Suburban              RNC
                      #2
                                                                    ATS                    SGSN                   GGSN
                                                                  Platform

                                       Femto
                                      Gateway
                  Residential
      Femtocell       #3

                                                                   Legend
                                                                                     Control Plane Monitoring

www.ccpu.com                    Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   19
Policy Framework



                      RAN
                                                           SLA
                   Congestion
                                                          Aware
                     Aware




        Femto                                                                              Application
        Aware                                                                                Aware
                            Policy
                         Enforcement
                            Point


   DPI Key to Real-Time, Line-Rate, Multi-Aware Policy Enforcement

www.ccpu.com               Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   20
Internet Offload Network Architecture


                                                   Offloaded data traffic to PDN

                                                CGF           CRF           OCS

                                                                                                                 Internet

                                     Gi

                                                  Ga

                                                         Gx
                                                                  Gy



               Iub             Iu                        Iu                                                        Gi
      Node B                              IOG
                        RNC                                               SGSN               GGSN

               Legend
                         Signaling                 Non-offloaded data traffic                   Offloaded data traffic




     SIPTO
                        • Bump-in-wire device                                    • Minimize traffic to CN
                        • DPI application / protocol                             • Reduce CN OPEX / CAPEX

www.ccpu.com                                    Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   21
Internet Offload Gateway Anatomy


    Control Plane Software
               Application

                                            XLR # 1

                                                                                                                        SGSN
                                                                                                            IuPS


      Charging Stack Monitoring Stack                                                                        Gi
                                                                                                                          Internet




                                                                                                                IuPS

                                          XLR # 0
    Data Plane Software
                                                                                                                           RNC
                  Application
                      Offload                                            PP50                         COP50 RTM
                   Decision Block
                        DPI                                        ~ 10 Gbps Line
                                                                                                         Fail-to-wire
                   Classification   IP                                  Rate



www.ccpu.com                             Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary    22
Internet Offload Gateway

                                             90% Traffic Offloaded!
                                          90% CAPEX & OPEX Savings!




                                                                          IOGW




 “Death by 1,000 SGSNs & GGSNs”

www.ccpu.com            Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   23
Edge Caching for Content Distribution Networks



                                                                                                                   Internet
               Iub             Iu                     Iu                                               Gi
      Node B                         Edge
                        RNC                                            SGSN               GGSN
                                     Cache
               Legend
                         Signaling              Non-cached data traffic                      Cached data traffic




 Edge Caching
                        • Bump-in-wire device                                 • Minimize traffic to CN
                        • Monitoring protocols                                • Reduce CN OPEX / CAPEX




www.ccpu.com                                 Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   24
Video Optimization Gateway (VOG)



                                                                                                                  Internet
                Iub               Iu
                                                                                                       Gi
       Node B                                                                          Video
                      RNC                   SGSN              GGSN                    Optimizer


                              Legend
                                       Signaling                   Non-optimized data traffic                   Optimized data traffic




   VOG
                  • Bump-in-wire device                                      • Trans-rate / Trans-code video
                  • PP50 / XE80 / FlowEngine                                 • Reduce Bandwidth consumption




       Internet                                       Filtered Video Flows


                                                             Optimized Video Flows

                                                     Flow Engine                                                    Transcoding
                                                    DPI Framework                                                      Module
         GGSN


www.ccpu.com                               Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary      25
Mobile Network Evolution


2005                  Internet                                Internet                                  ATS
                                                                                                                     2010
                             GGSN                                                                       VOG




                             SGSN                                         IOG                           SGSN / GGSN

                                                        Edge Cache



                RNC                   RNC                                     RNC                                              FGW




Node B    Node B           Node B   Node B                Node B           Node B           Home Node B             Home Node B



    Continuous Computing: Shaping Tomorrow’s Network
 www.ccpu.com                       Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary     26
MWC 2011




               Got Questions?
                Please Ask!
                  www.ccpu.com


www.ccpu.com       Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary   27

More Related Content

What's hot

Scenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfScenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfAT Kishore
 
Wireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st CenturyWireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st Centuryandrescarvallo
 
Keeping Your Internet Business IT Asset Light By Mandar Kulkarni
Keeping Your Internet Business IT Asset Light By Mandar KulkarniKeeping Your Internet Business IT Asset Light By Mandar Kulkarni
Keeping Your Internet Business IT Asset Light By Mandar Kulkarniiamwire
 
4 g world 2011 renesas mobile overview
4 g world 2011 renesas mobile overview4 g world 2011 renesas mobile overview
4 g world 2011 renesas mobile overview
David McTernan
 
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraMWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
Telstra
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks
 
3. FOMS_ IMS services_Shane_Dempsey
3. FOMS_ IMS services_Shane_Dempsey3. FOMS_ IMS services_Shane_Dempsey
3. FOMS_ IMS services_Shane_DempseyFOMS011
 
Intro Tellion 20090622
Intro Tellion 20090622Intro Tellion 20090622
Intro Tellion 20090622zipyzigy
 
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Dean Bubley
 
ATCA's Big Femtocell Opportunity
ATCA's Big Femtocell OpportunityATCA's Big Femtocell Opportunity
ATCA's Big Femtocell Opportunity
Continuous Computing
 
Mobility and SmartTAP Recording for Lync
Mobility and SmartTAP Recording for LyncMobility and SmartTAP Recording for Lync
Mobility and SmartTAP Recording for LyncMUCUGL
 
Cisco Video Data Explosion
Cisco Video Data ExplosionCisco Video Data Explosion
Cisco Video Data Explosionmenkento
 
Multitech's VOIP Solution
Multitech's VOIP SolutionMultitech's VOIP Solution
Multitech's VOIP Solution
MultiTech Systems
 
Tandemtransitweb
TandemtransitwebTandemtransitweb
Tandemtransitweb
Tandem Transit
 
I Phone Presentation Jan Linden Gips
I Phone Presentation Jan Linden GipsI Phone Presentation Jan Linden Gips
I Phone Presentation Jan Linden Gipsrajivmordani
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
Mead Eblan
 

What's hot (18)

Scenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfScenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdf
 
Wireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st CenturyWireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st Century
 
Keeping Your Internet Business IT Asset Light By Mandar Kulkarni
Keeping Your Internet Business IT Asset Light By Mandar KulkarniKeeping Your Internet Business IT Asset Light By Mandar Kulkarni
Keeping Your Internet Business IT Asset Light By Mandar Kulkarni
 
4 g world 2011 renesas mobile overview
4 g world 2011 renesas mobile overview4 g world 2011 renesas mobile overview
4 g world 2011 renesas mobile overview
 
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraMWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
 
3. FOMS_ IMS services_Shane_Dempsey
3. FOMS_ IMS services_Shane_Dempsey3. FOMS_ IMS services_Shane_Dempsey
3. FOMS_ IMS services_Shane_Dempsey
 
Intro Tellion 20090622
Intro Tellion 20090622Intro Tellion 20090622
Intro Tellion 20090622
 
10 fn s19
10 fn s1910 fn s19
10 fn s19
 
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
Disruptive Analysis   LTE Summit 2011 voice presentation may 2011Disruptive Analysis   LTE Summit 2011 voice presentation may 2011
Disruptive Analysis LTE Summit 2011 voice presentation may 2011
 
ATCA's Big Femtocell Opportunity
ATCA's Big Femtocell OpportunityATCA's Big Femtocell Opportunity
ATCA's Big Femtocell Opportunity
 
Mobility and SmartTAP Recording for Lync
Mobility and SmartTAP Recording for LyncMobility and SmartTAP Recording for Lync
Mobility and SmartTAP Recording for Lync
 
Cisco Video Data Explosion
Cisco Video Data ExplosionCisco Video Data Explosion
Cisco Video Data Explosion
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
Multitech's VOIP Solution
Multitech's VOIP SolutionMultitech's VOIP Solution
Multitech's VOIP Solution
 
Tandemtransitweb
TandemtransitwebTandemtransitweb
Tandemtransitweb
 
I Phone Presentation Jan Linden Gips
I Phone Presentation Jan Linden GipsI Phone Presentation Jan Linden Gips
I Phone Presentation Jan Linden Gips
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
 

Viewers also liked

Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
laurenjthomson
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
Ixia
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsStenio Fernandes
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
Rohan Fernandes
 
Nic solution strategy
Nic solution strategyNic solution strategy
Nic solution strategy
Prodapt Solutions
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
Ilya Mikov
 
The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
Stenio Fernandes
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
military
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
Daniel Vinyar
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
itronics
 
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
Usersnap
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report VictorNg'eno Victor
 

Viewers also liked (20)

Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
A Personal Diary
A Personal DiaryA Personal Diary
A Personal Diary
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
DPI R&D Service
DPI R&D ServiceDPI R&D Service
DPI R&D Service
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Nic solution strategy
Nic solution strategyNic solution strategy
Nic solution strategy
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
The tale of heavy tails in computer networking
The tale of heavy tails in computer networkingThe tale of heavy tails in computer networking
The tale of heavy tails in computer networking
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
 
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!23 Amazing Lessons Learned From Interviewing The World's Top Developers!
23 Amazing Lessons Learned From Interviewing The World's Top Developers!
 
Attachment report Victor
Attachment report VictorAttachment report Victor
Attachment report Victor
 
INTERNSHIP REPORT
INTERNSHIP REPORTINTERNSHIP REPORT
INTERNSHIP REPORT
 
Attachment report
Attachment report Attachment report
Attachment report
 

Similar to Traffic Management, DPI, Internet Offload Gateway

LTE-Traffic Management & Monetization
LTE-Traffic Management & MonetizationLTE-Traffic Management & Monetization
LTE-Traffic Management & Monetization
Continuous Computing
 
LTE World Summit 2010 Amsterdam
LTE World Summit 2010 AmsterdamLTE World Summit 2010 Amsterdam
LTE World Summit 2010 Amsterdam
Continuous Computing
 
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
Continuous Computing
 
LTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest OpportunityLTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest Opportunity
Continuous Computing
 
Technology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS OpportunitiesTechnology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS Opportunities
Radisys Corporation
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer Apps
Marko Gargenta
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
Radisys Corporation
 
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
Cisco Canada
 
Intel open stack v1
Intel open stack v1Intel open stack v1
Intel open stack v1benbenhappy
 
Radisys offloading 10412_final
Radisys offloading 10412_finalRadisys offloading 10412_final
Radisys offloading 10412_final
Radisys Corporation
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overviewpauldeng
 
Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711
James Sankar
 
EMC Saudi channel presentation
EMC Saudi channel presentationEMC Saudi channel presentation
EMC Saudi channel presentationadityapuri
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
Cloud Congress
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
Cloud Congress
 
Mellanox hpc update @ hpcday 2012 kiev
Mellanox hpc update @ hpcday 2012 kievMellanox hpc update @ hpcday 2012 kiev
Mellanox hpc update @ hpcday 2012 kievVolodymyr Saviak
 

Similar to Traffic Management, DPI, Internet Offload Gateway (20)

LTE-Traffic Management & Monetization
LTE-Traffic Management & MonetizationLTE-Traffic Management & Monetization
LTE-Traffic Management & Monetization
 
LTE World Summit 2010 Amsterdam
LTE World Summit 2010 AmsterdamLTE World Summit 2010 Amsterdam
LTE World Summit 2010 Amsterdam
 
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
Delivering Innovative New Wireless Products and Services – Open or Managed Pl...
 
LTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest OpportunityLTE = Femtocells Biggest Opportunity
LTE = Femtocells Biggest Opportunity
 
Technology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS OpportunitiesTechnology Disruption Brings New VAS Opportunities
Technology Disruption Brings New VAS Opportunities
 
LTE: Building New Killer Apps
LTE: Building New Killer AppsLTE: Building New Killer Apps
LTE: Building New Killer Apps
 
10 fn s15
10 fn s1510 fn s15
10 fn s15
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
 
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
The NGN Carrier Ethernet System: Technologies, Architecture and Deployment Mo...
 
Mobile Service Edge
Mobile Service EdgeMobile Service Edge
Mobile Service Edge
 
Intel open stack v1
Intel open stack v1Intel open stack v1
Intel open stack v1
 
Intel open stack v1
Intel open stack v1Intel open stack v1
Intel open stack v1
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
Radisys offloading 10412_final
Radisys offloading 10412_finalRadisys offloading 10412_final
Radisys offloading 10412_final
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 
Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711Aarnet Acu Briefing 040711
Aarnet Acu Briefing 040711
 
EMC Saudi channel presentation
EMC Saudi channel presentationEMC Saudi channel presentation
EMC Saudi channel presentation
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
Mellanox hpc update @ hpcday 2012 kiev
Mellanox hpc update @ hpcday 2012 kievMellanox hpc update @ hpcday 2012 kiev
Mellanox hpc update @ hpcday 2012 kiev
 

More from Continuous Computing

The Best That LTE Can Be
The Best That LTE Can BeThe Best That LTE Can Be
The Best That LTE Can Be
Continuous Computing
 
4 Years Later: The Evolving Femto Ecosystem & Value Proposition
4 Years Later: The Evolving Femto Ecosystem & Value Proposition4 Years Later: The Evolving Femto Ecosystem & Value Proposition
4 Years Later: The Evolving Femto Ecosystem & Value Proposition
Continuous Computing
 
Effective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA PlatformsEffective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA Platforms
Continuous Computing
 
DPI Traffic Management for Switched Ethernet ATCA Platforms
DPI Traffic Management for Switched Ethernet ATCA PlatformsDPI Traffic Management for Switched Ethernet ATCA Platforms
DPI Traffic Management for Switched Ethernet ATCA Platforms
Continuous Computing
 
Welcoming Session and Year in Review
Welcoming Session and Year in Review Welcoming Session and Year in Review
Welcoming Session and Year in Review
Continuous Computing
 
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Continuous Computing
 
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
Continuous Computing
 
LTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to RealityLTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to Reality
Continuous Computing
 
Embedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer ElectronicsEmbedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer Electronics
Continuous Computing
 
In-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy DecisionIn-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy Decision
Continuous Computing
 
Are You Ready for VAS 2.0 with LTE?
Are You Ready for VAS 2.0 with LTE?Are You Ready for VAS 2.0 with LTE?
Are You Ready for VAS 2.0 with LTE?
Continuous Computing
 
Unstoppable Wireless Forces
Unstoppable Wireless ForcesUnstoppable Wireless Forces
Unstoppable Wireless Forces
Continuous Computing
 
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond AppliancesISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
Continuous Computing
 
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network ChallengesUsing SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Continuous Computing
 
Architecting10 x performanceforltewebinar4.20.10
Architecting10 x performanceforltewebinar4.20.10Architecting10 x performanceforltewebinar4.20.10
Architecting10 x performanceforltewebinar4.20.10
Continuous Computing
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
Continuous Computing
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
Continuous Computing
 
CTIA 2010 LTE Femtocell
CTIA 2010 LTE FemtocellCTIA 2010 LTE Femtocell
CTIA 2010 LTE Femtocell
Continuous Computing
 
MWC 2010 Femtocell
MWC 2010 FemtocellMWC 2010 Femtocell
MWC 2010 Femtocell
Continuous Computing
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
Continuous Computing
 

More from Continuous Computing (20)

The Best That LTE Can Be
The Best That LTE Can BeThe Best That LTE Can Be
The Best That LTE Can Be
 
4 Years Later: The Evolving Femto Ecosystem & Value Proposition
4 Years Later: The Evolving Femto Ecosystem & Value Proposition4 Years Later: The Evolving Femto Ecosystem & Value Proposition
4 Years Later: The Evolving Femto Ecosystem & Value Proposition
 
Effective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA PlatformsEffective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA Platforms
 
DPI Traffic Management for Switched Ethernet ATCA Platforms
DPI Traffic Management for Switched Ethernet ATCA PlatformsDPI Traffic Management for Switched Ethernet ATCA Platforms
DPI Traffic Management for Switched Ethernet ATCA Platforms
 
Welcoming Session and Year in Review
Welcoming Session and Year in Review Welcoming Session and Year in Review
Welcoming Session and Year in Review
 
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
Architecting Femtocell Solutions- The Ten Most Important Steps to Building a ...
 
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
Commercial Realities and Subscriber-Centric Strategies for Broadband Traffic ...
 
LTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to RealityLTE Femtocell Roadmap- From Concept to Reality
LTE Femtocell Roadmap- From Concept to Reality
 
Embedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer ElectronicsEmbedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer Electronics
 
In-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy DecisionIn-house or Outsource? Evaluating the Make vs. Buy Decision
In-house or Outsource? Evaluating the Make vs. Buy Decision
 
Are You Ready for VAS 2.0 with LTE?
Are You Ready for VAS 2.0 with LTE?Are You Ready for VAS 2.0 with LTE?
Are You Ready for VAS 2.0 with LTE?
 
Unstoppable Wireless Forces
Unstoppable Wireless ForcesUnstoppable Wireless Forces
Unstoppable Wireless Forces
 
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond AppliancesISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
ISS World Prague 2010 - DPI at 40G and 100G: Moving Beyond Appliances
 
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network ChallengesUsing SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network Challenges
 
Architecting10 x performanceforltewebinar4.20.10
Architecting10 x performanceforltewebinar4.20.10Architecting10 x performanceforltewebinar4.20.10
Architecting10 x performanceforltewebinar4.20.10
 
CES 2010 FemtoZone
CES 2010 FemtoZoneCES 2010 FemtoZone
CES 2010 FemtoZone
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
CTIA 2010 LTE Femtocell
CTIA 2010 LTE FemtocellCTIA 2010 LTE Femtocell
CTIA 2010 LTE Femtocell
 
MWC 2010 Femtocell
MWC 2010 FemtocellMWC 2010 Femtocell
MWC 2010 Femtocell
 
MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Traffic Management, DPI, Internet Offload Gateway

  • 1. Q1 2011 MWC 2011 Traffic Management Internet Offload Gateway Adaptive Traffic Shaping Policy Enforcement www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 1
  • 2. What We Do: Mobile Broadband Capacity Solutions Protocol Software LTE Femto DPI ATCA Platforms Professional Services www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 2
  • 3. Our Customers = Our Success North America EMEA Asia Pacific www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 3
  • 4. “Smarter, Faster, Cheaper” Mobile Broadband Femtocells = Cheapest Bit Pipes = Fastest Bit Pipe DPI = Smartest Bit Pipe www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 4
  • 5. Mobile Broadband: Capacity Challenges Capacity Mind The Gap  Traffic doubling every 12 months  Subscribers expect more for less Text  LTE spectral efficience gain = 4X  Operators must lower cost per bit www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 5
  • 6. Mobile Traffic Trends Bandwidth & Application Growth Mobile Data Usage by Top Apps Video Streaming: Fastest Growing Traffic Monetization Challenge Source: Allot Mobile Trends, Global Mobile Broadband Traffic, H1/2010 www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 6
  • 7. What Is Driving This Growth? Demographics Devices Demand Internet Mobile Internet Internet Applications Generation Devices & Content www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 7
  • 8. And More to Come… 50B Connected Devices!  Smartphones, Tablets, Notebooks… Smartphones Tablets Notebooks  Cameras, eBooks, Med Devices, Gaming, Navigation… Personal IP Cameras eBooks Medical Devices Gaming Consoles Navigation Systems www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 8
  • 9. But Challenges Create Opportunities MME / Serving GW MME / Serving GW Capacity S1 S1 X2 eNodeB eNodeB Cost eNodeB But Still Spectrum Limited 4X 1,000,000X Manage LTE Spectral FAP Spectrum DPI Limited Efficiency Re-use Capacity www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 9
  • 10. Disruption Core MME / Serving GW MME / Serving GW RAN-Aware Internet Video Traffic Shaping Offloading Optimization S1 S1 X2 eNodeB eNodeB Access Small Cells TD-LTE Edge Caching eNodeB www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 10
  • 11. DPI = “Smart Pipes” Platinum Video Conference Operator VoIP Gaming Bronze Gold Video on Demand Email Business Class VPN Silver Browsing P2P Spectrum Limited – Traffic Management is Essential! www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 11
  • 12. DPI Enables… New Revenue Streams Higher Network Efficiency  Tiered SLA  Intelligent Traffic Offloading  Fair Usage  Edge Caching  Bandwidth Allocation  Adaptive Traffic Shaping  RAN-aware  Real-time Service Upgrades  Network Security  DDoS, IDS / IPS, Firewalls www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 12
  • 13. Striking Balance – How Neutral? Freedom of Choice Fair-Use Balancing Maintaining Supply Network vs. Profitability Demand Transparent $ Traffic Mgmt Policy www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 13
  • 14. Network Intelligence + DPI = Bearer Plane Intelligence Monitoring = Control Plane Intelligence DPI + Monitoring = Network Intelligence on Steroids www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 14
  • 15. One Platform, Many Applications…. Internet Offload Gateway Adaptive Traffic Shaper Video Optimizer Gateway Policy Enforcer DPI-Enabled Applications www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 15
  • 16. DPI Platform Evolution 2012: 400 Gbps 2011: 40G Switching 320 Gbps XE100 Sandy Bridge 40G Switching PP80 Packet Processing Today: XE80 Westmere 160 Gbps PP80 Packet Processing 10G Switching XE80 Westmere PP50 Packet Processing  21 DPI Customer Wins! www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 16
  • 17. Not All Cells Are Loaded Equally Top 5% utilized Average cell cells heavy on HTTP P2P Streaming grew to 27% Source: Allot Mobile Trends, Global Mobile Broadband Traffic, H2/2009 www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 17
  • 18. Congestion Defined! www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 18
  • 19. Adaptive Traffic Shaping RAN-Aware Traffic Shaping Radio - Congestion Aware Access - Femto Aware Dense Urban Network - Dynamic Network Policy #1 (RAN) Signaling Information Suburban RNC #2 ATS SGSN GGSN Platform Femto Gateway Residential Femtocell #3 Legend Control Plane Monitoring www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 19
  • 20. Policy Framework RAN SLA Congestion Aware Aware Femto Application Aware Aware Policy Enforcement Point DPI Key to Real-Time, Line-Rate, Multi-Aware Policy Enforcement www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 20
  • 21. Internet Offload Network Architecture Offloaded data traffic to PDN CGF CRF OCS Internet Gi Ga Gx Gy Iub Iu Iu Gi Node B IOG RNC SGSN GGSN Legend Signaling Non-offloaded data traffic Offloaded data traffic SIPTO • Bump-in-wire device • Minimize traffic to CN • DPI application / protocol • Reduce CN OPEX / CAPEX www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 21
  • 22. Internet Offload Gateway Anatomy Control Plane Software Application XLR # 1 SGSN IuPS Charging Stack Monitoring Stack Gi Internet IuPS XLR # 0 Data Plane Software RNC Application Offload PP50 COP50 RTM Decision Block DPI ~ 10 Gbps Line Fail-to-wire Classification IP Rate www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 22
  • 23. Internet Offload Gateway 90% Traffic Offloaded! 90% CAPEX & OPEX Savings! IOGW “Death by 1,000 SGSNs & GGSNs” www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 23
  • 24. Edge Caching for Content Distribution Networks Internet Iub Iu Iu Gi Node B Edge RNC SGSN GGSN Cache Legend Signaling Non-cached data traffic Cached data traffic Edge Caching • Bump-in-wire device • Minimize traffic to CN • Monitoring protocols • Reduce CN OPEX / CAPEX www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 24
  • 25. Video Optimization Gateway (VOG) Internet Iub Iu Gi Node B Video RNC SGSN GGSN Optimizer Legend Signaling Non-optimized data traffic Optimized data traffic VOG • Bump-in-wire device • Trans-rate / Trans-code video • PP50 / XE80 / FlowEngine • Reduce Bandwidth consumption Internet Filtered Video Flows Optimized Video Flows Flow Engine Transcoding DPI Framework Module GGSN www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 25
  • 26. Mobile Network Evolution 2005 Internet Internet ATS 2010 GGSN VOG SGSN IOG SGSN / GGSN Edge Cache RNC RNC RNC FGW Node B Node B Node B Node B Node B Node B Home Node B Home Node B Continuous Computing: Shaping Tomorrow’s Network www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 26
  • 27. MWC 2011 Got Questions? Please Ask! www.ccpu.com www.ccpu.com Copyright © 2011 Continuous Computing. All Rights Reserved. | Confidential & Proprietary 27