Smart Buildings Smarter Balancing Andy Stadheim, PE AiRNAB [email protected].
Andy huckridge
Transcript of Andy huckridge
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Monitoring 4G/LTE Technologies:
The Pitfalls and Problems
4GWE Los Angeles, Oct 2010
Wednesday - 10/06/10. 8:30-9:15am
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Agenda
Session premise
New devices find their way into old networks, old devices find their way into new networks
and new apps are deployed at breakneck speeds - data usage increases exponentially. But
problems loom large on the horizon. How will voice services be carried? Will these services
play nicely with one another? Will voice quality suffer in the presence of data?
Ethernet Network Monitoring has traditionally been accomplished by a 1:1 relationship
between a tap or switch SPAN port and an analysis device. Tomorrows 4G networks
require a different approach, one which clearly breaks apart the current stovepipe analogy.
Panelists
• Andy Huckridge, VSS Monitoring (Moderator)
• Todd Kelly, Mobile Force
• Gino Dion, Ineoquest
Wrap-Up and Q&A
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
VSS Corporate Profile
VSS Monitoring, Inc. is the leading innovator of Distributed Traffic
Capture Systems™ and Network Taps
Founded 2003
Headquarters San Mateo, California
90+ employees worldwide
Channel focused (40+ International Resellers)
Technology alliances with major system integrators and
analyzer OEMs
Japanese office opened Q3 2007
China office opened Q4 2008
UK office opened Q2 2009
Offices in New York and Washington, D.C.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
VSS Financial Highlights
First year of sales in 2005
Net profitable since 2005
Revenue growth 2x per year
Privately held, No Debt
Recently received $20M investment
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
4G / LTE Monitoring Challenges
• Flattening of network = New network entities / protocols
• Real time access to user plane & control plane
• Increasing number of proprietary monitoring systems Network Complexity
• Multiple-4G architectures proposed for IMT-Advanced
• 3.5G, LTE, WiMAX, LTE-Advanced, IMS, Femto…
• Circuit Telephony migration to Packet LTE network Evolving Standards
• CAPEX / OPEX constraints
• Revenue / Traffic growth not aligned
• Revenue opportunities through sophisticated SLAs Economics
• 3rd party overlay IP services beyond operators’ control
• New monitoring requirements to ensure QoE
• Rapid troubleshooting / report / repair End User Experience
• Corporate compliance (e.g. SOX)
• Lawful interception Security & Compliance
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Network not fully visible: Network Monitoring 1.0
Situation
Tools and probes are deployed across many
interfaces
Access by SPAN or basic network taps
Different tools for different IP services
(VoIP, IPTV, user/control plane, protocol
analyzer, SLA mgmt, IPS/IDS, DPI, etc.)
Challenges
Physical access / blind spots
Network complexity
High management overhead
CAPEX / OPEX – management overhead
Tools scalability / performance (1G / 10G)
Fragmented monitoring creates further
performance and complexity problems.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
What is the visibility problem?
Services create revenue only if they are deployed…
Monitoring is essential to make sure the services stay deployed...
Deployed solutions are increasingly
complex.
Traffic on hockey-stick growth curve.
Slow to troubleshoot, manage and
monitor change.
Proliferation of monitoring tools create
physical access contention to SPAN ports.
Traffic volume at high speed (e.g. 10G)
exceeds tools capacity.
Management cost out of control even
as IT budget shrinks.
IP Services
(VoIP, IPTV, VPN, P2P, IM, etc.)
IT Infrastructure
(IDS/IPS, Storage, App Servers, Database, WAN, Sniffer, etc.)
Network Infrastructure
(Ethernet, ATM, Wireless, SONET, etc.)
Network monitoring must be pervasive across
different physical networks and all network layers.
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
The new paradigm: Network Monitoring 2.0
Decouple analyzer tools from
communication infrastructure
Centralized “tool farm”
Dramatic tools reduction
Views not stovepiped: Ends 1:1
relation between network link
and monitor tool
A traffic capture layer provides
universal network access for
all tools
Single intelligent layer for all traffic
capture needs. Distributed
intelligence & redundancy
Front end traffic grooming /
pre-processing for tools
increases tool utilization
Reduce or eliminate contention
for SPAN ports
Simplified & centralized management
Monitoring
Systems
Distributed
Traffic Capture
Layer
Network
Infrastructure
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Benefits
Discover where latency / delay are introduced
Understand how apps / services are affected
Reduce churn / improve customer satisfaction
Industry Problems
Latency / delay in network
Apps / services are not working correctly
Network overload, unexpected operation
Network Latency & QoE Use Case
Understand how packets are delayed / jitter is introduced
Reduce application and service outages, adhere to SLAs
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Problems
Backhaul congestion and dropped packets
Backhaul traffic prioritization delay
Latency, microbursts and network overload
Backhaul Use Case
Find / understand issues in backhaul function
Gain timeline advantage on diagnosis and repair
Industry Benefits
Keep existing analytic tools
Preserve investment in existing infrastructure
Analyzers see only the traffic they need
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Problems
Too many feeds / tap points
Too much data and unwanted traffic
Upgrading to new analytic tools expensive
Aggregation and Speed Conversion Use Case
Obtain traffic network-wide independent of feed / speed
Aggregate traffic to minimize demands on network
Industry Benefits
Determine congestion, find dropped packets
Discover latency sources, traffic policy
Aggregate multiple feeds to a single feed
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Problems
First time voice is packetized
Mixing traffic types causes bursty networks
Unknown traffic interactions
Traffic Management Use Case
Understand which traffic types are causing issues
Rationalize network resources to meet traffic usage patterns
Industry Benefits
Discover traffic usage patterns
Correctly apportion network bandwidth
Reduce latency / dropped packets
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Problems
Traffic is not aggregated in a session aware manner
Traffic is lost via what look like dropped packets
Problems are hidden, hard to get at the real issues
Session Aware Load Balancing Use Case
Present specific traffic types to correct
analysis device
Load balance streams in session aware
manner
Industry Benefits
Find the real issues on your network
Stop dropping packets in your analysis path
Proactively address the problems in a session aware
manner
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Industry Problems
Network visibility is local, not network wide
Existing aggregators are not session aware
Packets are being lost by the analysis function
Network Wide Visibility Use Case
Monitor entire network from single location, remotely or multiple locations
Load balance traffic across available in-house analysis tools
Industry Benefits
Session aware streams are constructed
Monitor entire network from single / multiple locations
Stop losing packets, detect and fix problems faster
CONFIDENTIAL and Proprietary VSS Monitoring, Inc. © 2009
Value Proposition
Distributed Traffic Capture Systems:
Network Monitoring 2.0 is a Paradigm Shift – Monitoring no longer an afterthought
Strategically addresses the company’s bottom line
Best price-performance in the market
Flexibility and scalability across all IP networks
Grow solution as your need grows
Visibility Performance Economics
Revenue stream
stability
Shorter MTTR
Reduced churns
Reduced complexity
Faster ROI
Greater application /
network performance
Ultra low latency
Enhanced QoS/QoE
Achieve SLA goals
Tools optimization
Centralized monitoring
Network forensics and
security
Lawful intercepts
Deep packet
inspection
Find problems fast