Download presentation
Presentation is loading. Please wait.
Published byArthur Montgomery Modified over 8 years ago
2
Appliance and Ecosystem Where will NFV deploy first – Core carriers are moving now, but complex migration – BSS/OSS has to be maintained – Refine troubleshooting and scaling techniques – Need reason to move from deployed systems Enterprise networks simpler to move – Site by site migration possible – App by app migration – Less OSS/BSS complexity
3
Branch Office Which appliances can be virtualized?
4
Virtual Appliances Many flavors depending on deployment SERVER H/W HYPERVISOR SWITCH OS and APP Orchestration
5
Network Architecture Centrally managed and controlled VMA can be distributed or centralized Flexible forwarding Faster deployment Combined licensing Coordinated workflows Distributed functionality
6
Ecosystem Players Hardware: Intel, Cisco, Juniper, IBM, Dell, OCP VMs: Xen, Hyper-V, VMWare, KVM OS: Linux, Unix, WinServer 2008 Applications: Citrix, Cisco CSR-V, Asterisk, IBM, Sansay, Fortinet, Adtran, many others Orchestration Layer: OpenStack, VCloud, VCenter, VFrame VM does not mean open source
7
Who leads? Depends on business goals Enterprise businesses – Call Center ----> PBX/Application – Mfg -----> File server ERP and Control Systems – Retail, engineering, financial would be different Telcos: LEC or Next Gen? – Mobile and Cable MSO? – Driven by BSS/OSS orchestration
8
Enabling the World of Tomorrow Visibility. Delivered. 8 ©2012 Gigamon, LLC | Off-site SP overview | Company Confidential
9
This presentation represents Gigamon, LLC’s current direction protected under a mutual NDA. All product releases will be delivered on a when-and-if available basis. Actual feature development and timing of releases will be at the sole discretion of Gigamon. Not all features are supported on all platforms. Presentation of the product roadmap does not create a commitment to deliver any specific feature, functionality, or code. Furthermore, any purchase thereof would be subject to separate negotiations with regards to any terms and conditions including, but not limited, to price. No such terms and conditions have been agreed to date. Contents of this presentation are subject to change without notice. Gigamon assumes no responsibility and makes no commitment to provide updates to the information contained in this presentation. Forward-looking Statements Safe Harbor Message 9
10
Gigamon Visibility Fabric™ 10 SDN Network Virtual Network Pervasive visibility across islands of topologies, physical, virtual, and future SDN networks Solve TAP/SPAN port contention Send the right data to the right tool(s) Enable a centralized tools infrastructure Normalize and optimize traffic to tools through intelligent packet modification Address Big Data and buy tools based on traffic capacity not connections Operational efficiency and CAPEX savings Pervasive visibility across islands of topologies, physical, virtual, and future SDN networks Solve TAP/SPAN port contention Send the right data to the right tool(s) Enable a centralized tools infrastructure Normalize and optimize traffic to tools through intelligent packet modification Address Big Data and buy tools based on traffic capacity not connections Operational efficiency and CAPEX savings Tools Infrastructure Physical Network: Edge to Core
11
Mobile Data Traffic Growth Global Mobile data traffic will increase 26X from 2010 to 2015 Source: Cisco Virtual Networking Index (VNI) Global Mobile Data Traffic Forecast 2010-2015 11 Terabytes / month 0.24 EB 0.6 EB 1.2 EB 2.2 EB 3.8 EB 6.3 EB 92% CAGR 2010 - 2015 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
12
Traffic Complexity 12 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved. Users increasingly accessing remote hosted services Tunneling and overlay networks leading to traffic obfuscation Applications running on non-standard ports and in many cases “hopping” ports. Protocol awareness and application identification an absolute requirement
13
The problem with Big Data… Industry problem 13 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved. Tools can’t keep up with the rising analytic needs of Big Data Service providers can’t afford the cost of higher interface tools with a sustained ARPU A new method of solving the problem is needed
14
Enhanced Subscriber Management –Identify and focus on high value, roaming and or “data-hungry” subscribers. –Segment and prioritize by customers/ traffic types/ geographic areas. –Visibility of new services on the network. on-demand video gaming Voice over LTE (VoLTE) –SLA’s by customer/traffic type. –Dynamic bandwidth reallocation based on traffic type Incremental Avenues of Monetization 14 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
15
GTP Correlation –Allowing tools to see correlated data carried through tunneled transport pipes FlowVUE –Representative active sampling of session aware flows Enabling the virtual tools of tomorrow – Monetizing Big Data 15 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
16
Visibility Fabric GTP Correlation Subscriber Aware Forwarding Performance Monitors Subscriber Billing Security Analytics Real-time GTP session correlation for LTE and 3G networks. Advanced subscriber-aware filtering, forwarding and replication across one or multiple billing / monitoring tools. Scalable “Pay-As-You-Grow” architecture to meet the traffic demands of mobile carrier networks GigaVUE & GigaSMART 16 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
17
FlowVUE 17 Physical Application Performance Network Management Security Virtual SDN Application: FlowVUE Source IP/User/Subscriber ID IP address 1.0.0.1 IP address 1.0.0.2 ….etc… Identity: john_smith Identity: alice_jones ….etc… IMSI: 404685505601234 IMSI: 310150123456789 …..etc… Total flows: 428,000 Source IP/User/Subscriber ID IP address 1.0.0.1 IP address 1.0.0.2 ….etc… Identity: john_smith Identity: alice_jones ….etc… IMSI: 404685505601234 IMSI: 310150123456789 …..etc… Total flows: 428,000 Intelligently filter and send all flows associated with source IP, User, Subscriber Total flows: 42,800 Intelligently filter and send all flows associated with source IP, User, Subscriber Total flows: 42,800 Tool Optimization & Traffic Mining for Big Data Algorithmic sampling of flows to provide a representative view of the traffic on a link Repackaging of larger links in to smaller links suitable for existing tools Proof of concept being jointly developed by Gigamon and a US carrier Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
18
FlowVUE 18 ©2012 Gigamon | Corporate Overview | Company Confidential Turning Big Data in to Manageable Data SMARTer option to address Big Data –Enable carrier to selectively reduce traffic –Deterministic results at a fraction of the data rate Address rising tool costs –Preserve or increase CEM based on real-time reduced data analytic throughput Leveraging Big Data as a competitive asset vs overwhelming burden –Tailoring pricing strategies based on usage patterns and guarantee SLA’s on premium level content. –Enhanced Visibility facilitate efficient transparent billing and accounting. Tool Vendor Agnostic Solution –Working in Carriers interest –Visibility vendors tied to tool vendors - primary goal is to sell monitoring tools –Leading US carrier sees this approach as the only way forward for managing Big Data
19
Big-data: Monetized… SMART features, FlowVUE & GTP Correlation: Restoring the ARPU 19 Confidential and Proprietary. Not to be distributed without the expressed written consent of Gigamon. ©2013 Gigamon All rights reserved.
20
Unified Monitoring Fabric Manager End-to-end provisioning with GigaVUE-FM (GigaVUE G/H/VM Fabric Nodes, and SDN Visibility Fabric Nodes) Unified Monitoring Fabric Manager End-to-end provisioning with GigaVUE-FM (GigaVUE G/H/VM Fabric Nodes, and SDN Visibility Fabric Nodes) Introducing an Open Programmable Framework 20 Enabling Visibility Fabric Orchestration Open Framework with APIs and SDK Establish framework to enable Technology Vendors and Customers to develop applications across Gigamon’s Visibility Fabric Applications Read Write Read Write Read Application Performance Network Management Security Tools and Analytics Read Write Visibility Fabric Production Network Virtual Data Center SERVER Hypervisor Read Write T T T S S S Read GigaVUE & GigaSMART Write Read (in development)
21
Thank you 21 ©2012 Gigamon, LLC | Corporate Overview | Company Confidential
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.