Network functions virtualization and software management

Size: px
Start display at page:

Download "Network functions virtualization and software management"

Transcription

1 ericsson White paper Uen December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology allows for easier creation and expansion of separate logical nodes and functions for a specified group of traffic and signaling, often referred to as a network slice. In turn, network slicing opens up a new way of achieving in-service software management at the network level.

2 The purpose of NFV Network Functions Virtualization (NFV) is commonly described as a network architecture concept that uses IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may be connected or chained together to create communication services. The initial interest in introducing NFV into telecom has, to a large extent, been driven by the desire to decrease costs through the use of generic hardware platforms as well as the separation of software and hardware lifecycles. This discussion has subsequently been combined with promises of increased efficiency from the IT industry when running networking applications in virtual machines within data centers. As the discussion has progressed, it has shifted further towards efficient management and improved time-to-market for new services. Some of the most promoted benefits of NFV include: Flexibility easier and quicker installation and provisioning of the network, which allows for more rapid service deployments. Cost the above-mentioned flexibility has the potential to lower costs for managing services deployed in a network, as well as managing the network itself. Scalability introduction of software services allows for easier scaling of available hardware resources. By scaling resource needs up and down over the course of the day and expanding capacity over time or in reaction to extraordinary events, it would be possible, for some use-cases, to increase the utilization of the equipment and allow for more efficient use of investments in the installed compute power. Security security has been and continues to be, along with virtualization, a major challenge in networking. Operators want to be able to provision and manage the network in a secured manner, and NFV helps them achieve security and integrity through separation and isolation (as long as the environment is secured). Rapid deployment in another network to better meet user needs, service providers want the ability to deploy their offerings anywhere in the world. Virtualization simplifies this. For NFV to become really useful, software-defined networking (SDN) technology is required. SDN allows computer-network administrators to manage network services by hiding physical deployments and presenting them as virtualized services. Network services also need to be virtualized in order to reach the same level of flexibility and achieve the advertised simplifications and gains of NFV. Without this, it is not possible to realize many of the promises of NFV in the data center. The introduction of SDN adds even more potential to NFV, as traffic no longer needs to be steered based on IP addresses alone. With SDN technology, it can instead be handled on a per-flow basis, which allows for fine granular control of the traffic, with service-chaining solutions of subscriber policies serving as good examples. SDN may, of course, also be used to steer which path to use when several functionally identical paths are available. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT THE PURPOSE OF NFV 2

3 Network slicing A logical instantiation of a network is often called a network slice. Network slices are possible to create with both legacy platforms and network functions, but virtualization technologies substantially lower barriers to using the technology, for example through increased flexibility and decreased costs. Currently, management of networks is mostly about managing individual network elements. One of the major ideas behind NFV is to automate management for the entire network so that complex network-spanning tasks are easier to perform. Integration of different NFV components will still be a complex task for the operator, but on the other hand NFV allows an entire network to be delivered as a pre-integrated network slice. Another aspect of management and network slicing is setting up separate management domains for different network slices. This may allow for completely separate management of different parts of the network that are used for different purposes. Examples of use cases include mobile virtual network operators (MVNOs) and enterprise solutions. This kind of network slice would, in current Evolved Packet Core (EPC) networks, only cover the PDN gateway (PGW) and the policy control resource function (PCRF). However, for machine type communication (MTC) and machine-tomachine (M2M) solutions, it is likely that it would also cover the Mobile Management Entities (MMEs) and Serving Gateways (SGWs). Separation of management may also be expanded into security aspects. Separate management per network slice, as described above, is a first step towards this, but by using network slicing it would be possible to deploy virtual network functions (VNFs) in separate networks with separate configuration and network topology. Add to this the potential to run VNFs on dedicated hardware, which provides more predictive characteristics as well, and it is obvious that improved security and improved quality of service assurance are also important aspects of network slicing technology. When the operator sources a complete network slice from a single vendor, the vendor can deploy a network optimized for a selected set of terminals according to policy and behavior. The network slice may, for example, be resilient to hardware and software failures, or it may be optimized for signaling intensive behaviors, such as in machine-to-machine terminals. When a network slice covers only a part of the network topology, it is called a sub-network slice, which indicates that network slicing can also be hierarchical. The most commonly used containment of network slices in EPC is the PGW and PCRF in the same slice. Since the PGW selects the PCRF and the Access Point Name (APN) name is used for PGW selection from the MME, the selection mechanisms employed here are often already in use in legacy networks. But with network slicing in the data center, they are likely to be even more commonly used. It is also likely that there will be dedicated PGWs and PCRFs for many different deployments, both small and large. Adding a SGW to the previous network slice of a PGW and PCRF and thereby creating another level of network slicing (while still supporting connections from other SGWs to the PGW) is a solution that is of interest when co-located SGWs and PGWs are used. As specified by 3GPP, the SGW selection in the MME can take the selected PGW into account. Throughout this paper, virtualized EPC networks and other mobile network solutions will be used as specific examples, although the generic principles are just as applicable to other scenarios such as fixed broadband access, legacy platforms and other networking nodes. Figure 1: Examples of network slices in an Evolved Packet Core deployment. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT NETWORK SLICING 3

4 Using network slicing for software upgrades Network slicing is not only used for simplifying the management of the network when running it with a static function set. It also has the potential to make changes to the functionality realized by networking functions. One of the more costly processes when managing an operator network is to upgrade networking software. This process includes many complex and costly tasks, such as maintaining a parallel network deployment for testing new software and configurations, including validation of compatibility of the different software versions of different networking products. The process also includes validation of network configuration changes and validation of features and properties added by the vendor, as well as running the system to make sure that no issues are introduced in old functionality when upgrading the system. Another aspect to consider is that the tests in the lab network do not correspond to the actual behavior of the network in live operation. This real-world behavior might require rollback of an upgrade if issues are identified. With a complex network with many different network elements, the total time it takes to upgrade a network can be as high as the total sum of upgrading all of the network elements one by one in a row. This is often the limiting factor for adding functionality to a network. If an operator is orchestrating management for data center functionality such as VNF scaling, it also makes sense to use that particular management solution when handling software upgrades. If the management solution is orchestrating a network slice, it also makes sense to upgrade the end to end service per network slice as well. This is especially true if upgrades of the individual VNFs impact the operation and maintenance (O&M) solution and perhaps also business systems such as charging and event logging servers. This then drives an integration of O&M and business solutions. Network slicing can drastically simplify the installation, validation and on-boarding of traffic for new software versions and, at the same time, decrease risks, as the integration can be done in advance and the on-boarding can also be done step-by-step while still evaluating the functionality. This has the potential to reduce deployment time of a slice down to minutes, and validation down to hours. If something goes wrong when activating a new network slice, the step-by-step migration is available for rollbacks as well, minimizing the risk of impacting higher-prioritized active user sessions. SETTING UP A PARALLEL NETWORK SLICE FOR VALIDATION When adding new functionality to a network, the affected network elements must all be updated and verified to support both the new and legacy functionalities. This is a complex integration activity that often takes several months. To avoid problems with live networks, some of these activities are often performed in a separate lab network that is used to verify new integration of products and configurations. This lab network can then be seen as a separate slice of the operator s network, even though it only has limited connectivity to the rest of the network. Network slicing allows operators to set up a lab network in parallel with the live network in the data center environment. Here they may reuse parts of the network configuration for the live instance. By taking a snapshot of the running configuration as a baseline for the new network slice, reconfigurations can be kept at a minimum. Test tools and other validation mechanisms can then be run on this network deployment without risking the live network. When the network slice is fully tested, the same setup can be taken into live service as it is already running in the same data center environment. Other aspects of network slicing, such as security features and separate management, enhance this solution even further. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 4

5 CONNECT THE PARALLEL NETWORK TO THE TERMINALS If the new software deployment works well in the lab environment, it is possible to add real terminals to the setup. Depending on the networking setup, different identifiers may be of interest. As an example, selection of APN in EPC can be used to select SGW and PGW. When applicable, steering based on the International Mobile Subscriber Identity (IMSI) of an actual terminal, or even IMSI-series or PLMN-IDs, can allow actual terminals to use the live radio interfaces. This allows further verification that is hard to simulate in a test environment. With real terminals in the network slice, the KPIs from these can be compared to KPIs from the live network. For instance, if the functionality is to be the same after a software upgrade of the components in a network slice, the KPIs should scale in the same manner, which makes this validation possible to automate as well. Figure 2: Load when migrating between network slices. STEP-BY-STEP MIGRATION OF SESSIONS Once testing with friendly users has been performed, a major advantage of network slices appears. As the deployment is done on virtual resources, there are minimal obstacles preventing it from being set to live service. The needed functionality is there, including scalability. The software deployment is therefore ready to take into service. To do this, real user terminals need to start using the new network slice. With the proper selection mechanisms in place such as Domain Name System (DNS) for SGW and PGW, and in the future Dedicated Core (DECOR) for MME, with PLMN-ID possibly used in some cases (for example, for handling roamers differently) this can be implemented in a finer and more granular way. By first re-attaching terminals that have a low monthly subscription fee or are pre-paid to the new network slice, the risk to subscribers that pay for and require a better service is decreased. Monitoring of KPIs during this process allows the operator to further evaluate whether everything is working as expected. There are many aspects to consider when performing a process like this. First of all, the re-attach rate is normally within reasonable limits, as the existing EPC nodes need to cater for the signaling load of reattaching terminals. However, in this case, scaling during operation requirements is added on top, though it is usually not an issue if the application scaling triggers are dimensioned properly. The next thing that vendors need to address is that not all terminals will re-attach within reasonable time. Sessions may have a lifetime of weeks or more, and terminal sessions therefore need to be terminated sooner or later. Figure 2 shows how load moves from one network slice to the other. At the end, one can also see sessions being torn down when the network slice is taken down and the corresponding gradual activation of sessions on the other network slice that maps to that. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 5

6 As an example, within EPC, the MME and SGW can be relocated with an active PDN connection through mobility procedures, but the PGW cannot be upgraded with an active session (due to the anchoring of a user IP address). So for the PGW and PCRF to be re-selected, current 3GPP standards require a re-attach that would terminate any ongoing traffic. Many of the services used in a terminal in an EPC network would accept a new IP address for the session due to a re-attachment to the network without only minor service impact. For many network deployments, it is therefore permissible to throw out the PDN connection (preferably with a re-attach requirement indication in the signaling) and wait for a new PDN connection to be established. Such an establishment can then be done directly towards the new network slice, including the PGW and PCRF. Figure 3: Example of parallel EPC networks with different software version combinations and configurations. A use case that needs more attention is when a service that requires high end to end availability is running on a dedicated APN on a dedicated PGW that is not part of the upgraded network slice in EPC, which could, for instance, be a VoLTE service. Upgrading the network slice would need to support mobility procedures in between the network slices if this upgrade is to be done without service interruption. This is possible, but might not be a prioritized solution. Instead, the simplest and most obvious way to address long-lived sessions during software upgrades is to initiate a re-attach procedure from the dedicated services APN when it is suitable for that service. Then it is only the service on the dedicated APN and PGW that needs to be re-attached. This does not have to be managed together in a service-oriented network slicing deployment with mobile-broadband services; instead it may be handled together with management procedures dedicated to the service in order to decrease the end to end impact. As this example shows, when multiple coordinated connections exist, the solution becomes more complex but still easier to manage and with less service impact compared to the legacy solutions. With NFV technology and network slicing, a parallel network can therefore be easily provisioned and tested in a data center environment. It allows for easy verification and for a step-by-step approach to migrating sessions to the new network. It is also worth noting that when a single vendor delivers the software for an entire network slice, the solution for parts of the network may be pre-integrated and delivered by that vendor. This simplifies the integration activities for the operator, as the components can be sourced and maintained as a ready solution. With software upgrades based on network slicing, the value of pre-integrated software increases even further as much of the complexity of the software upgrades becomes the responsibility of the vendor. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 6

7 A SUMMARIZED SOFTWARE UPGRADE PROCEDURE (AN EXAMPLE USING EPC) Task: The operator wants to upgrade the network to a new software version to support new services. Pre-requisite: A set of terminals is attached to the radio network and an existing network slice of the EPC. First step: Create a new network slice. The slice is deployed with the desired software versions of the desired VNFs. The software components and versions may be pre-delivered and integrated by a single vendor, but this is not a requirement. The software is then configured according to the desired functionality. For a pure software upgrade, this is, in principle, a clone of the software configuration of the currently active network slice. If a change in behavior is to be activated, the configuration is modified accordingly. Second step: Run quality assurance procedures. When quality assurance tools are available, such as end to end test tools, these can be run to ensure that the new network slice is behaving according to expectations. The next level of assurance is to let friendly users use the network. Validation during and after such procedures can also be done through inspection of KPIs. Third step: Migration of re-activating sessions. According to existing 3GPP procedures, active sessions cannot be migrated when they are active, so migration of sessions is done during attach and re-attach procedures. The migration can be done slowly to allow for automatic inspection of KPIs in order to identify potential issues with the new software versions or configurations. It is reasonable to address the most demanding subscriptions last, as the risk of something going wrong normally decreases with time and load of the new deployment. Fourth step: Schedule re-activation of sessions. Active sessions that do not re-attach to the network will not be able to connect to a new PGW, even though the SGW and MME can be relocated. To handle this, the PGW needs to disconnect active PDN connections. One efficient way of doing this with minimal service impact is to disconnect inactive subscribers, which will disconnect sessions that have not been used for a configured time. Fallback: If there is any indication that the new network slice is not able to fulfill the requirements for the solution, it is easy to perform a fallback at any step in the process. All that is required is to update the slice selection configuration and wait for the sessions to move over. When the new slice is to be removed, or if the issues with the new slice are too troublesome, then a controlled scheduling of re-attachment procedures for active sessions on the new network slice can be initiated. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 7

8 Conclusion Network slicing allows an operator to put more focus on the management of network solutions driven by business cases. With network slicing, a parallel network can be set up with a new software version of the involved functionality, followed by step-by-step migration of sessions lowering the risk for the operator and ensuring minimal disruption to subscribers. Network slicing is simplified by NFV, and therefore opens up a new way of achieving telecomgrade software management at the network level by focusing on the characteristics needed for a specific business segment. As a result, it enables more efficient business models for operators while simplifying software architecture requirements, including software upgrades, on network elements such as MME, SGW and PGW. With software upgrades based on network slicing, the value of vendor pre-integrated software increases, as much of the complexity of the software upgrades can become the responsibility of the vendor. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT CONCLUSION 8

9 GLOSSARY APN DECOR DNS EPC IMSI M2M MME MTC MVNO NFV O&M PCRF PDN PGW PLMN-ID SDN SGW VNF Access Point Name Dedicated Core (3GPP Work Item) Domain Name System Evolved Packet Core International Mobile Subscriber Identity machine-to-machine Mobility Management Entity machine type communication mobile virtual network operator Network Functions Virtualization operation and maintenance policy control resource function Public Data Network PDN gateway Public Land Mobile Network Identifier software-defined networking Serving Gateway virtual network function 2014 Ericsson AB All rights reserved NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT GLOSSARY 9

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit NFV & SDN World Practical Approaches to NFV Orchestration Deployment Terry McCabe CTO Mobile Business Unit May 2015 Mitel 2 2015 Mitel. Proprietary and Confidential. Mavenir 4G Customer Launches Mavenir

More information

Network Virtualization Mist to MUST

Network Virtualization Mist to MUST Network Virtualization Mist to MUST Ching-Wen Cheng ITRI ICL M100 2015.03.07 Motivation and background (ITU-T T Aspect) Objectives and motivation FNs are recommended to provide services whose functions

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

How to bridge the gap between business, IT and networks

How to bridge the gap between business, IT and networks ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can

More information

Nokia Siemens Networks Flexi Network Server

Nokia Siemens Networks Flexi Network Server Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted

More information

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

NFV: What Exactly Can Be Virtualized?

NFV: What Exactly Can Be Virtualized? NFV: What Exactly Can Be Virtualized? Jim Hodges d Senior Analyst, Heavy Reading Agenda NFV Drivers ETSI NFV Use Cases Virtualization Criteria Applying the Criteria NFV Challenges Summary 2 NFV Adoption

More information

SBC Evolution to Virtualization and Cloud Deployments. December 2015

SBC Evolution to Virtualization and Cloud Deployments. December 2015 SBC Evolution to Virtualization and Cloud Deployments December 2015 Copyright Copyright 2015 Sonus Networks, Inc. All rights reserved. This item and the information contained herein are the property of

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

4G Americas Bringing Network Function Virtualization to LTE November 2014 0

4G Americas Bringing Network Function Virtualization to LTE November 2014 0 4G Americas Bringing Network Function Virtualization to LTE November 2014 0 TABLE OF CONTENTS Introduction...4 1. Benefits of NFV as a Concept...8 1.1 Improved Capital Efficiency...8 1.2 Operational Efficiencies...9

More information

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:

More information

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and

More information

Building Robust Signaling Networks

Building Robust Signaling Networks ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept

More information

CENTER I S Y O U R D ATA

CENTER I S Y O U R D ATA I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile

More information

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University

Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense

More information

Supporting mobility in the RAN cloud

Supporting mobility in the RAN cloud Supporting mobility in the RAN cloud Michael Fitch BT 23 rd October 2012 Cloud basics On-Demand Self-Service A consumer can provision computing capabilities, such as server time and network storage, automatically

More information

Ensuring end-user quality in NFV-based infrastructure

Ensuring end-user quality in NFV-based infrastructure Ensuring end-user quality in NFV-based infrastructure Distributed NFV cloud nodes provide instant assessment of the end-user experience EXECUTIVE SUMMARY Compute resources for virtual network functions

More information

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning

More information

SDN Interfaces and Performance Analysis of SDN components

SDN Interfaces and Performance Analysis of SDN components Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia SDN Interfaces and Performance Analysis of SDN components, David Hock, Michael Jarschel, Thomas Zinner, Phuoc

More information

Ensuring end-user quality in NFV-based infrastructures

Ensuring end-user quality in NFV-based infrastructures Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network

More information

The real-time cloud. ericsson White paper Uen 284 23-3219 Rev B February 2014

The real-time cloud. ericsson White paper Uen 284 23-3219 Rev B February 2014 ericsson White paper Uen 284 23-3219 Rev B February 2014 The real-time cloud COMBINING CLOUD, NFV AND SERVICE PROVIDER SDN Operators need to ensure that their networks remain a relevant and vital part

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

How To Manage A Virtualization Server

How To Manage A Virtualization Server Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires

More information

The programmable network cloud

The programmable network cloud ericsson White paper Uen 288 23-3211 Rev B December 2015 The programmable network cloud ENRICHING THE CLOUD WITH NFV AND SDN Operators need to ensure that their networks remain a relevant and vital part

More information

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

SOFTWARE DEFINED NETWORK AND NETWORK FUNCTIONS VIRTUALIZATION An Inevitable Evolution for Communication Networks

SOFTWARE DEFINED NETWORK AND NETWORK FUNCTIONS VIRTUALIZATION An Inevitable Evolution for Communication Networks SOFTWARE DEFINED NETWORK AND NETWORK FUNCTIONS VIRTUALIZATION An Inevitable Evolution for Communication Networks VIKRAM NAIR Director, Technology VINOD KUMAR GUPTA Senior Technical Leader, Technology SOFTWARE

More information

TO PACKET CORE. EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE

TO PACKET CORE. EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE The JOURNEY TO PACKET CORE Virtualization EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE TechNOLOGY White Paper In their efforts to become more competitive, mobile network operators (MNOs) have begun

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number

More information

SDN in Mobile Broadband Networks

SDN in Mobile Broadband Networks SDN in Mobile Broadband Networks Advancing the transformation of the network architecture into a highly efficient and flexible software infrastructure, ensuring best customer experience Nurit Sprecher

More information

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ] [ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting

More information

Why Service Providers Need an NFV Platform Strategic White Paper

Why Service Providers Need an NFV Platform Strategic White Paper Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October

More information

Accelerating 4G Network Performance

Accelerating 4G Network Performance WHITE PAPER Accelerating 4G Network Performance OFFLOADING VIRTUALIZED EPC TRAFFIC ON AN OVS-ENABLED NETRONOME INTELLIGENT SERVER ADAPTER NETRONOME AGILIO INTELLIGENT SERVER ADAPTERS PROVIDE A 5X INCREASE

More information

APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK

APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK How operators can leverage ADCs to deploy scalable, virtualized networks and enable new business models Prepared by Signals Research

More information

Center SDN & NFV. Modern Data IN THE

Center SDN & NFV. Modern Data IN THE SDN & NFV IN THE Modern Data Center A GUIDE TO UNDERSTANDING THE IMPACT AND BENEFITS OF SOFTWARE-DEFINED NETWORKING AND NETWORK FUNCTIONS VIRTUALIZATION TABLE OF CONTENTS OF SDN AND NFV ARE SDN AND NFV

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Transforming Service Life Cycle Through Automation with SDN and NFV

Transforming Service Life Cycle Through Automation with SDN and NFV Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

Network Functions Virtualization (NFV) for Next Generation Networks (NGN) P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform

More information

2015 Spring Technical Forum Proceedings

2015 Spring Technical Forum Proceedings Virtualizing the Home Network Michael Kloberdans CableLabs Abstract One of the areas of focus in the Cable industry has been a virtualized home network. This paper proposes a road map with an analysis

More information

Testing Challenges for Modern Networks Built Using SDN and OpenFlow

Testing Challenges for Modern Networks Built Using SDN and OpenFlow Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 sales@spirent.com

More information

VIRTUALIZING THE EDGE

VIRTUALIZING THE EDGE VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks

More information

PLUMgrid Open Networking Suite Service Insertion Architecture

PLUMgrid Open Networking Suite Service Insertion Architecture White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid

More information

Introduction to Quality Assurance for Service Provider Network Functions Virtualization

Introduction to Quality Assurance for Service Provider Network Functions Virtualization Introduction to Quality Assurance for Service Provider Network Functions Virtualization Carsten Rossenhoevel, Managing Director European Advanced Networking Test Center 2015-09-08 Company Introduction

More information

UDC IN A BOX. A complete User Data Management Solution to meet different business needs

UDC IN A BOX. A complete User Data Management Solution to meet different business needs UDC IN A BOX A complete User Data Management Solution to meet different business needs Contents ENABLING CUSTOMER CENTRIC NETWORKS MORE THAN WHAT MEETS THE EYE CONCLUSION GLOSSARY FURTHER READING 2 4 6

More information

OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014

OpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014 OpenFlow-enabled SDN and Functions Virtualization ONF Solution Brief February 17, 2014 Table of Contents 2 Executive Summary 3 SDN Overview 4 Introduction to NFV 5 NFV Challenges 6 NFV/SDN Example Use

More information

Nokia Siemens Networks Flexi Network Gateway. Brochure

Nokia Siemens Networks Flexi Network Gateway. Brochure Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband

More information

NEC Virtualized Evolved Packet Core vepc

NEC Virtualized Evolved Packet Core vepc TE-524262 NEC Virtualized Evolved Packet Core vepc Design Concepts and Benefits INDEX Leading the transformation into Mobile Packet Core Virtualization P.3 Openness with Carrier-Grade Quality P.4 vepc

More information

The Promise and the Reality of a Software Defined Data Center

The Promise and the Reality of a Software Defined Data Center The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure

More information

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks

More information

NSN Liquid Core Management for Telco Cloud: Paving the way for reinventing telcos for the cloud

NSN Liquid Core Management for Telco Cloud: Paving the way for reinventing telcos for the cloud NSN Liquid Core Management for Telco Cloud: Paving the way for reinventing telcos for the cloud Keynotes Liquid Core Management provides operational support for NSN Liquid Core Network, covering all mobile

More information

LTE - Can SDN paradigm be applied?

LTE - Can SDN paradigm be applied? LTE - Can SDN paradigm be applied? Source of this presentation: Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton

More information

Towards Software Defined Cellular Networks

Towards Software Defined Cellular Networks Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN

More information

Evolved Packet Core features build resiliency and preference

Evolved Packet Core features build resiliency and preference High Availability is more than five nines Evolved Packet Core features build resiliency and preference The availability of mobile broadband service has become essential to daily life. Without their smartphones,

More information

Spirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions

Spirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions Customer Experience Automating end-to-end user experience of data, voice and video

More information

WHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance

WHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance WHITE PAPER How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance www.ixiacom.com 915-3132-01 Rev. B, June 2014 2 Table of Contents Network Functions Virtualization (NFV): An

More information

CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES

CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

Control Plane Elasticity & Virtualization in the 4G Core

Control Plane Elasticity & Virtualization in the 4G Core White Paper Control Plane Elasticity & Virtualization in the 4G Core Prepared by Gabriel Brown Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.amdocs.com May 2013 Control-Plane Virtualization

More information

ehrpd Mike Keeley Market Segment Director

ehrpd Mike Keeley Market Segment Director ehrpd Mike Keeley Market Segment Director Agenda ehrpd What, Why, and When? ehrpd s Impact on the Core Network ehrpd s Impact on the Mobile Device Verifying ehrpd works 2 Acronyms AAA AN BSC EAP- AKA ehrpd

More information

Roland Bless, bless@tm.uka.de. Stephan Baucke Ericsson Research

Roland Bless, bless@tm.uka.de. Stephan Baucke Ericsson Research Network Virtualization within FP7 EU Project 4WARD Network of the Future Roland Bless, bless@tm.uka.de Institute of Telematics, University of Karlsruhe Stephan Baucke Ericsson Research 1 4WARD Overview

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Technical white paper. Enabling mobile broadband growth Evolved Packet Core Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective

More information

Software-defined networking: the service provider perspective

Software-defined networking: the service provider perspective The communications technology journal since 1924 Software-defined networking: the service provider perspective February 21, 2013 2013 2 New network abstraction layers 2 Software-defined networking: the

More information

Driving SDN Adoption in Service Provider Networks

Driving SDN Adoption in Service Provider Networks WHITEPAPER Software Defined Networking (SDN) Driving SDN Adoption in Service Provider Networks This whitepaper provides an overview of key requirements and enablers for driving SDN adoption in Service

More information

NFV Forum Progression to Launch

NFV Forum Progression to Launch NFV Forum Progression to Launch Laurent Laporte Technology Development Strategist Sprint September 25, 2014 Progression to NFV Forum Launch TOPS Council SDN/NFV Focus Group: NFV Landscape Assessment completed,

More information

White Paper - Huawei Observation to NFV

White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major

More information

VMware vcloud Networking and Security

VMware vcloud Networking and Security VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility

More information

Recommendations for Performance Benchmarking

Recommendations for Performance Benchmarking Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best

More information

Don t Fly Blind Through the Clouds: Avoiding the Pitfalls of Virtualization

Don t Fly Blind Through the Clouds: Avoiding the Pitfalls of Virtualization By Pablo L. Martinez, 06 May, 2014. Don t Fly Blind Through the Clouds: Avoiding the Pitfalls of ization These days, clouds don t have a silver lining. It s more like a vein of gold in particular when

More information

Service Automation Made Easy

Service Automation Made Easy Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their

More information

Virtual Platforms Addressing challenges in telecom product development

Virtual Platforms Addressing challenges in telecom product development white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous

More information

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................

More information

New Approach to Mobile Traffic Management Needed

New Approach to Mobile Traffic Management Needed New Approach to Mobile Traffic Management Needed The variety of smart mobile devices and the apps that run on them, made mobile broadband more successful than anyone imagined. Now more than ever, mobile

More information

Virtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015

Virtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Virtualization techniques for network functions Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Introduction Network functions are today hosted by dedicated hardware, typically high performance

More information

Total Cost of Ownership Study Virtualizing the Mobile Core

Total Cost of Ownership Study Virtualizing the Mobile Core Sponsored by Affirmed Networks and VMWare July 2015 Don t wait on NFV, Immediate Cost Savings Creates Opportunity for Telcos Architecture Only one pla orm vs. Three separate pla orms to manage Capex Opex

More information

What is SDN all about?

What is SDN all about? What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

WHITE PAPER. Authoritative Guide to Advanced LTE Testing

WHITE PAPER. Authoritative Guide to Advanced LTE Testing WHITE PAPER Authoritative Guide to Advanced LTE Testing 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-3102-01 Rev. A, August 2013 2 Table of Contents Introduction...

More information

Network Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT

Network Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT Network Operations in the Era of NFV & SDN Chris Bilton - Director of Research & Technology, BT Agenda 1 2 3 4 Introduction Overview of NfV & SDN The Challenge Today s Carrier operations Contrasting Carrier

More information

BUSINESS CASE FOR MOVING DNS TO THE CLOUD STRATEGIC WHITE PAPER NFV INSIGHTS SERIES

BUSINESS CASE FOR MOVING DNS TO THE CLOUD STRATEGIC WHITE PAPER NFV INSIGHTS SERIES BUSINESS CASE FOR MOVING DNS TO THE CLOUD STRATEGIC WHITE PAPER NFV INSIGHTS SERIES The cloud and NFV are being touted as the means by which service providers can improve their current operations costs

More information

Software Defined Security Mechanisms for Critical Infrastructure Management

Software Defined Security Mechanisms for Critical Infrastructure Management Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Take Charge of the Cloud Platform for NFV to Maximize Success

Take Charge of the Cloud Platform for NFV to Maximize Success White Paper Take Charge of the Cloud Platform for NFV to Maximize Success Prepared by Caroline Chappell Principal Analyst, Cloud & NFV, Heavy Reading www.heavyreading.com on behalf of www.vmware.com February

More information

Nationwide Interoperability Framework

Nationwide Interoperability Framework Nationwide Interoperability Framework Emergency Response Interoperability Center (ERIC) Public Safety Homeland Security Bureau Federal Communications Commission PSCR, Boulder, CO Dec 2, 2010 7/9/101 1

More information

ALEPO IN THE VIRTUALIZED CORE NETWORK

ALEPO IN THE VIRTUALIZED CORE NETWORK In this Document INTRODUCTION What is NFV? NFV Drivers & Benefits Alepo Virtualized Solutions The Alepo Advantage Network Function Virtualization has dominated the conversation in the communications industry

More information

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE

More information

Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations

Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations Get Migration Right the First Time The virtualization of traditional networks promises vast and enduring benefits if the challenges

More information

The Virtual Ascent of Software Network Intelligence

The Virtual Ascent of Software Network Intelligence White Paper The Virtual Ascent of Software Network Intelligence Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.windriver.com July 2013 Introduction Although

More information

ETSI NFV ISG DIRECTION & PRIORITIES

ETSI NFV ISG DIRECTION & PRIORITIES ETSI NFV ISG DIRECTION & PRIORITIES San Jose, May 6th 2015 Steven Wright (AT&T), Chair ETSI NFV ISG 1 ETSI 2012. All rights reserved NFV: The Equipment Market TransformaJon Classical Network Appliance

More information

Business aware traffic steering

Business aware traffic steering Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer

More information

How Network Operators Do Prepare for the Rise of the Machines

How Network Operators Do Prepare for the Rise of the Machines Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases

More information