SlideShare uma empresa Scribd logo
1 de 19
SCALING THE NETWORK
RISE OF THE “THING”
29/11/2013
Agenda
1.

The “Things”

2. Where do they fit in?
3. What should we prepare for
4. Adapting the Network Model

WE ARE
COMING
The Things and M2M
Varying Applications
– Consumer Electronics

– Automotive

– Energy

– Logistics

– Healthcare

– Advertising

– Retail

– Retail

The list goes on………..

ADVERTISE
HERE
Adding “Things” to the Existing Profiles
Increasing
Attached
High number
of connected
devices

IoT

– Higher overall numbers at
lower throughput

– Some applications exceed
traditional consumer usage
– Significant overlap between
usage Points, but at much
lower volumes

Areas of
significant
commonality

Smartphone

Fixed
M2M
MBB

Increasing
Throughput
A Varied Ecosystem already exists
– Varied profiles already
exist
– Consolidation of these
profiles create the overall
demand
– Future services should
have less unpredictability
as functions are more
specific
– However device numbers
increase significantly as
specialised functionality
increases
Comparative Traffic Profiles
– The less specific the segment the more variability in profile
– Specific devices will have predictable behaviour
– We understand these behaviours
Where will the Impact be?
Knowing the expected behaviour allows us to predict
based upon current behaviour where impact areas will
be.
Given the common discussed use cases, areas of focus
are:

– Registration and Authentication
– Signalling and Control plane
– Policy Control and Security
– Data Storage and monitoring
Registration and Identification
Additional Register Demands:
– Significant uplift in number of provisioned
devices
– Increases queries to HSS/HLR and load on
signalling too
– Registers will scale but cost is key

IP Addressing and Identity
– IPv6 is key to support growth
– IP Addresses are becoming a commodity
– What about identity?

REGISTERS
Signalling and Control Plane
Use Case Dependant
Drives Mobility:
•
Highly Mobile Use Cases e.g. Cars,
Freight
•
Increases handover signalling

Area Updates

Impact
Area
MME/SGSN
Spot the iOS update

Number of attached Devices :
•
Increased Edge and Core resource
•
Simultaneous Usage will cause peaks
•
e.g. software updates

RAN
Processing

Low Power Devices/Infrequent sessions:
•
Increases session set-up/teardown.
•
LTE bearers or PDP Contexts
•
Increases RAN signalling
•
Simultaneous Usage

PGW/GGSN
Telemetry - Peaking

Firewalls and
Policy
Security and Increased Flows
Multiple Flows to many points
Security and Policy Control is
significantly impacted:
−
−

Increased sessions = Increased processing
Processing larger number of smaller flows is
more intensive

ADVERTISE
HERE

ADVERTISE
HERE

Large Number of Flows

Common points in network will need to
be protected from spikes in
simultaneous traffic or attack
Policy control if implemented will
increase significantly

Common Control points such as in
MNO networks allow this to be
managed centrally

ADVERTISE
HERE
Big Data goes Huge?
Information will flow between more places
than ever before.

We need Intelligence to:
•

Predict Device Behaviour to accurately
dimension network and forecast growth

•

Support Network optimisation and
dimensioning

But what About Adding Value?
 Can we use this information to enhance
or provide value add services?
 Privacy questions must be answered

Are we ready to store this? Do we know
how effectively to use/process the
information? Do you have the organisation
structure?

BIG
DATA

HUGE
DATA
Adapting your Network Model
•

Challenge License Model
•

Unlink number of devices from licence

•

Flexible, should not be linked to customer type or a
specific metric

•

Embrace NFV
•

Commodity hardware with Network as software to
allow flex of resource

•

Prevents micromanagement of network elements
and scaling elements individually

•

Flexibility

Support Effective QoS
•

•

Traffic peaks will occur, how crucial are the
services you support, who takes priority?

Security and Policy Control
•

Consider what level of security for various
applications

•

Don’t assume it can just be “Open”

Understand your Customers
Summary
1.

Devices will exhibit behaviour we already see in higher volume

2. Challenge licencing and embrace Flexibility
3. Know your Customers – “Thing” is not enough
THANK YOU
BACKUP SLIDES
The Smartphone as the Hub?

For the consumer more information
will be available to manage their lives
Smartphones and tablets are
established as platforms to control and
consolidate
More “Things” will drive increased
flows
Will add to the increase of policy
control and the flow of information
Possible Security/Policy Modes of Operation
Network Supported Security
Internet
Model

Walled Garden

Application/Device Led Security

Application
Walled Garden

Walled Garden

Internet
Model

Application
Walled Garden

Application
Transport
Security &
Policy

3GPP Core

Access

•
•

Communication
possible within
walled garden
Network enforces
security rules and
policy

•
•
•

Any device can
•
communicate with
any other
Any device can
•
communicate with
any service
Security
rules/policies more
important

Network helps secure
access to
applications
Communication
between device only
possible via servers
e.g. whatsapp,
imessage, RCSe

•

•
•
•

Everything within
•
walled garden is
trusted
•
Does not prevent
from attacks of
•
devices of same type
Application or device
holds security
Core prevents comms
outside walled
garden

Open comms
•
between devices
Requires device led
security rules
•
Application requires
security
•

Devices can only
work with one
Application
Rule based upon hard
device configuration
Core prevents comms
outside walled
garden
Predicting Capacity Demand
Capacity Demands can be predicted if the
following is known:
• Quantity
We know quantities will be high. How high
depends upon your target market and Use
Cases
• Volume
Mixed volumes but primarily low volume
• Behaviour
Use case dependant

School
Finishing
time
3GPP Based IoT Services
34.7m Registered vehicles
With Roaming

Haulage with Roaming across
borders

63.7m UK Population

Ease of International Roaming

26.3m households

Hubs to aggregate localised
solutions

63.7m Population
Personal Area network

Cats 19% of households
Dogs 25% of households

YES!

Mais conteúdo relacionado

Mais procurados

How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your applicationlloyd barnette
 
Next Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsNext Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsAlcatel-Lucent Enterprise
 
IoT and the Impact on Roadside IP Networking
IoT and the Impact on Roadside IP NetworkingIoT and the Impact on Roadside IP Networking
IoT and the Impact on Roadside IP NetworkingAlcatel-Lucent Enterprise
 
Internet connections
Internet connectionsInternet connections
Internet connectionsentonline
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021Doug Newdick
 
IRJET- Web-Based Air and Noise Pollution Monitoring and Alerting Syetem
IRJET-  	  Web-Based Air and Noise Pollution Monitoring and Alerting SyetemIRJET-  	  Web-Based Air and Noise Pollution Monitoring and Alerting Syetem
IRJET- Web-Based Air and Noise Pollution Monitoring and Alerting SyetemIRJET Journal
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Industrial IOT and Security
Industrial IOT and SecurityIndustrial IOT and Security
Industrial IOT and SecurityKapil Sabharwal
 

Mais procurados (19)

How to choose the right network monitor for your application
How to choose the right network monitor for your applicationHow to choose the right network monitor for your application
How to choose the right network monitor for your application
 
Next Generation Network For Next Generation Students
Next Generation Network For Next Generation StudentsNext Generation Network For Next Generation Students
Next Generation Network For Next Generation Students
 
Wi fi
Wi fiWi fi
Wi fi
 
IoT and the Impact on Roadside IP Networking
IoT and the Impact on Roadside IP NetworkingIoT and the Impact on Roadside IP Networking
IoT and the Impact on Roadside IP Networking
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
3 IoT Connection Challenges
3 IoT Connection Challenges3 IoT Connection Challenges
3 IoT Connection Challenges
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
CYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENTCYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENT
 
IRJET- Web-Based Air and Noise Pollution Monitoring and Alerting Syetem
IRJET-  	  Web-Based Air and Noise Pollution Monitoring and Alerting SyetemIRJET-  	  Web-Based Air and Noise Pollution Monitoring and Alerting Syetem
IRJET- Web-Based Air and Noise Pollution Monitoring and Alerting Syetem
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Slow wifi
Slow wifiSlow wifi
Slow wifi
 
Www.sensatrack.com
Www.sensatrack.comWww.sensatrack.com
Www.sensatrack.com
 
Industrial IOT and Security
Industrial IOT and SecurityIndustrial IOT and Security
Industrial IOT and Security
 

Destaque

TDX - TDH800 Brochure.PDF
TDX - TDH800 Brochure.PDFTDX - TDH800 Brochure.PDF
TDX - TDH800 Brochure.PDFJason Bull
 
Some Interesting Marketing Charts about Technology 2013
Some Interesting Marketing Charts about Technology 2013Some Interesting Marketing Charts about Technology 2013
Some Interesting Marketing Charts about Technology 2013Muhammad Rauf Akram
 
LS-RDIO0404 Wireless I/O module
LS-RDIO0404 Wireless I/O moduleLS-RDIO0404 Wireless I/O module
LS-RDIO0404 Wireless I/O moduleSunny Chou
 
Metis by Mircom presentation 2016 08 16
Metis by Mircom presentation 2016 08 16Metis by Mircom presentation 2016 08 16
Metis by Mircom presentation 2016 08 16Howard Ryan
 
Lte tdd-the-global-solution-for-unpaired-spectrum
Lte tdd-the-global-solution-for-unpaired-spectrumLte tdd-the-global-solution-for-unpaired-spectrum
Lte tdd-the-global-solution-for-unpaired-spectrumMuhammad Rauf Akram
 
16 9 болдырев в.и
16 9 болдырев в.и16 9 болдырев в.и
16 9 болдырев в.иjournalrubezh
 
Hanwha introduction pt(may)
Hanwha introduction pt(may)Hanwha introduction pt(may)
Hanwha introduction pt(may)journalrubezh
 
Hanwha group brief presentation.tmp
Hanwha group brief presentation.tmpHanwha group brief presentation.tmp
Hanwha group brief presentation.tmpbpeak1
 
Итоги работы Ростехнадзора
Итоги работы РостехнадзораИтоги работы Ростехнадзора
Итоги работы Ростехнадзораjournalrubezh
 
16 9 масалович а.и.
16 9 масалович а.и.16 9 масалович а.и.
16 9 масалович а.и.journalrubezh
 
3 g networks technologies, services & benefits
3 g networks   technologies, services & benefits3 g networks   technologies, services & benefits
3 g networks technologies, services & benefitsMuhammad Rauf Akram
 

Destaque (20)

Smart Batteries
Smart BatteriesSmart Batteries
Smart Batteries
 
Triax
TriaxTriax
Triax
 
TDX - TDH800 Brochure.PDF
TDX - TDH800 Brochure.PDFTDX - TDH800 Brochure.PDF
TDX - TDH800 Brochure.PDF
 
Some Interesting Marketing Charts about Technology 2013
Some Interesting Marketing Charts about Technology 2013Some Interesting Marketing Charts about Technology 2013
Some Interesting Marketing Charts about Technology 2013
 
LS-RDIO0404 Wireless I/O module
LS-RDIO0404 Wireless I/O moduleLS-RDIO0404 Wireless I/O module
LS-RDIO0404 Wireless I/O module
 
Whats my address
Whats my addressWhats my address
Whats my address
 
Recomandare PwC
Recomandare PwCRecomandare PwC
Recomandare PwC
 
Metis by Mircom presentation 2016 08 16
Metis by Mircom presentation 2016 08 16Metis by Mircom presentation 2016 08 16
Metis by Mircom presentation 2016 08 16
 
Lte tdd-the-global-solution-for-unpaired-spectrum
Lte tdd-the-global-solution-for-unpaired-spectrumLte tdd-the-global-solution-for-unpaired-spectrum
Lte tdd-the-global-solution-for-unpaired-spectrum
 
16 9 болдырев в.и
16 9 болдырев в.и16 9 болдырев в.и
16 9 болдырев в.и
 
Hanwha introduction pt(may)
Hanwha introduction pt(may)Hanwha introduction pt(may)
Hanwha introduction pt(may)
 
Tenow
TenowTenow
Tenow
 
Hanwha group brief presentation.tmp
Hanwha group brief presentation.tmpHanwha group brief presentation.tmp
Hanwha group brief presentation.tmp
 
Demystifying Fault Isolators
Demystifying Fault IsolatorsDemystifying Fault Isolators
Demystifying Fault Isolators
 
Итоги работы Ростехнадзора
Итоги работы РостехнадзораИтоги работы Ростехнадзора
Итоги работы Ростехнадзора
 
16 9 масалович а.и.
16 9 масалович а.и.16 9 масалович а.и.
16 9 масалович а.и.
 
NFS2-640
NFS2-640NFS2-640
NFS2-640
 
NFS-320
NFS-320NFS-320
NFS-320
 
Fire Alarm Control Panel Operations
Fire Alarm Control Panel OperationsFire Alarm Control Panel Operations
Fire Alarm Control Panel Operations
 
3 g networks technologies, services & benefits
3 g networks   technologies, services & benefits3 g networks   technologies, services & benefits
3 g networks technologies, services & benefits
 

Semelhante a Scaling the Network - Rise of the Thing

Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014Tarek Nader
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsTom Kopko
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryEmulex Corporation
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?Mark Stokes
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 

Semelhante a Scaling the Network - Rise of the Thing (20)

Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
Fog computing
Fog computingFog computing
Fog computing
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Mdm intro-chapter1
Mdm intro-chapter1Mdm intro-chapter1
Mdm intro-chapter1
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
 

Mais de Muhammad Rauf Akram

Mais de Muhammad Rauf Akram (6)

Fiber to the Home - A Primer
Fiber to the Home - A PrimerFiber to the Home - A Primer
Fiber to the Home - A Primer
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
 
Lte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introductionLte advanced (3 gpp rel. 11) technology introduction
Lte advanced (3 gpp rel. 11) technology introduction
 
FTTX and Triple Play
FTTX and Triple PlayFTTX and Triple Play
FTTX and Triple Play
 
Huawei Solutions for Smart Cities
Huawei Solutions for Smart CitiesHuawei Solutions for Smart Cities
Huawei Solutions for Smart Cities
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Scaling the Network - Rise of the Thing

  • 1. SCALING THE NETWORK RISE OF THE “THING” 29/11/2013
  • 2. Agenda 1. The “Things” 2. Where do they fit in? 3. What should we prepare for 4. Adapting the Network Model WE ARE COMING
  • 3. The Things and M2M Varying Applications – Consumer Electronics – Automotive – Energy – Logistics – Healthcare – Advertising – Retail – Retail The list goes on……….. ADVERTISE HERE
  • 4. Adding “Things” to the Existing Profiles Increasing Attached High number of connected devices IoT – Higher overall numbers at lower throughput – Some applications exceed traditional consumer usage – Significant overlap between usage Points, but at much lower volumes Areas of significant commonality Smartphone Fixed M2M MBB Increasing Throughput
  • 5. A Varied Ecosystem already exists – Varied profiles already exist – Consolidation of these profiles create the overall demand – Future services should have less unpredictability as functions are more specific – However device numbers increase significantly as specialised functionality increases
  • 6. Comparative Traffic Profiles – The less specific the segment the more variability in profile – Specific devices will have predictable behaviour – We understand these behaviours
  • 7. Where will the Impact be? Knowing the expected behaviour allows us to predict based upon current behaviour where impact areas will be. Given the common discussed use cases, areas of focus are: – Registration and Authentication – Signalling and Control plane – Policy Control and Security – Data Storage and monitoring
  • 8. Registration and Identification Additional Register Demands: – Significant uplift in number of provisioned devices – Increases queries to HSS/HLR and load on signalling too – Registers will scale but cost is key IP Addressing and Identity – IPv6 is key to support growth – IP Addresses are becoming a commodity – What about identity? REGISTERS
  • 9. Signalling and Control Plane Use Case Dependant Drives Mobility: • Highly Mobile Use Cases e.g. Cars, Freight • Increases handover signalling Area Updates Impact Area MME/SGSN Spot the iOS update Number of attached Devices : • Increased Edge and Core resource • Simultaneous Usage will cause peaks • e.g. software updates RAN Processing Low Power Devices/Infrequent sessions: • Increases session set-up/teardown. • LTE bearers or PDP Contexts • Increases RAN signalling • Simultaneous Usage PGW/GGSN Telemetry - Peaking Firewalls and Policy
  • 10. Security and Increased Flows Multiple Flows to many points Security and Policy Control is significantly impacted: − − Increased sessions = Increased processing Processing larger number of smaller flows is more intensive ADVERTISE HERE ADVERTISE HERE Large Number of Flows Common points in network will need to be protected from spikes in simultaneous traffic or attack Policy control if implemented will increase significantly Common Control points such as in MNO networks allow this to be managed centrally ADVERTISE HERE
  • 11. Big Data goes Huge? Information will flow between more places than ever before. We need Intelligence to: • Predict Device Behaviour to accurately dimension network and forecast growth • Support Network optimisation and dimensioning But what About Adding Value?  Can we use this information to enhance or provide value add services?  Privacy questions must be answered Are we ready to store this? Do we know how effectively to use/process the information? Do you have the organisation structure? BIG DATA HUGE DATA
  • 12. Adapting your Network Model • Challenge License Model • Unlink number of devices from licence • Flexible, should not be linked to customer type or a specific metric • Embrace NFV • Commodity hardware with Network as software to allow flex of resource • Prevents micromanagement of network elements and scaling elements individually • Flexibility Support Effective QoS • • Traffic peaks will occur, how crucial are the services you support, who takes priority? Security and Policy Control • Consider what level of security for various applications • Don’t assume it can just be “Open” Understand your Customers
  • 13. Summary 1. Devices will exhibit behaviour we already see in higher volume 2. Challenge licencing and embrace Flexibility 3. Know your Customers – “Thing” is not enough
  • 16. The Smartphone as the Hub? For the consumer more information will be available to manage their lives Smartphones and tablets are established as platforms to control and consolidate More “Things” will drive increased flows Will add to the increase of policy control and the flow of information
  • 17. Possible Security/Policy Modes of Operation Network Supported Security Internet Model Walled Garden Application/Device Led Security Application Walled Garden Walled Garden Internet Model Application Walled Garden Application Transport Security & Policy 3GPP Core Access • • Communication possible within walled garden Network enforces security rules and policy • • • Any device can • communicate with any other Any device can • communicate with any service Security rules/policies more important Network helps secure access to applications Communication between device only possible via servers e.g. whatsapp, imessage, RCSe • • • • Everything within • walled garden is trusted • Does not prevent from attacks of • devices of same type Application or device holds security Core prevents comms outside walled garden Open comms • between devices Requires device led security rules • Application requires security • Devices can only work with one Application Rule based upon hard device configuration Core prevents comms outside walled garden
  • 18. Predicting Capacity Demand Capacity Demands can be predicted if the following is known: • Quantity We know quantities will be high. How high depends upon your target market and Use Cases • Volume Mixed volumes but primarily low volume • Behaviour Use case dependant School Finishing time
  • 19. 3GPP Based IoT Services 34.7m Registered vehicles With Roaming Haulage with Roaming across borders 63.7m UK Population Ease of International Roaming 26.3m households Hubs to aggregate localised solutions 63.7m Population Personal Area network Cats 19% of households Dogs 25% of households YES!