SlideShare uma empresa Scribd logo
1 de 18
Identifying the needle in the 10/40/100G haystackSharon Besser, VP Technologies Net Optics  Intelligent Access and Monitoring Architecture
Goal  Present a methodology and solution of leveraging access switching to overcome current and future Lawful Interception challenges
Net Optics In a Nutshell  Customers Financial, Telco, Healthcare & Government 85% of the Fortune 100 50% of the Fortune 500 7000 Global Deployments Highlights Founded in 1996, Private, Self-Funded 55 Quarters of Growth & Profitability Strong Management Team Sales Offices in New York, Atlanta, Germany 300 plus new direct customers annually  Go to Market Strategy 30% Direct Sales 25% OEM/Partner Relationship 45% Global Channel Technology 20+ Patents and Patent Pending Requests
Cause and Effect  Industry / Networking  Data Center  Lawful Interception
Industry Trends Expanding continuous layering of new applications ,[object Object],Expanding compliance requirements  ,[object Object],Increasing internal and external intrusions ,[object Object],Convergence of voice, data and video traffic ,[object Object],Networks becoming faster and more complex ,[object Object],[object Object]
Passive monitoring of Inter-VM traffic is MIA ToR and 10G copper switch implementation  ,[object Object]
ToR and EoR deployments increase monitoring oversubscription Convergence of data and storage  ,[object Object],[object Object]
Unique Operational Challenges with 10G Net Optics observe exponential growth of 10G network deployments. Some common LI deployment challenges: Lack of tools ,[object Object]
Tools ability to operate at line rate with low latency Quality ,[object Object],Ridiculous cost  ,[object Object]
Leveraging existing investments of 1G tools
Cost of knowledge, migration, operations  TCOSource: Net Optics Customer Advisory Board 7/2010
Other Technical Challenges Jitter, Oversubscription and Blocking are more severe with 10G networks:  Switching oversubscription takes place when two input ports forward all the packets to the same output port ,[object Object],Substantial latency variability and jitter can be introduced under moderate or low traffic condition as well due to head of line blocking ,[object Object]
Resource contention might happen when two packets arrive from separate input ports to the same output port (e.g. uplink) at about the same time,[object Object]
Oversubscription Source: Cisco
What Customers Want Meet Lawful interception challenges in high capacity networks But how?
The LI Foundation: Reliable Copy  End user 1 End user 2 Application  Application  Interception Node Transport Transport Network Network Network Link + Physical  Link + Physical  Link + Physical  Copy LEA Site LEMF Application  Application  Transport Transport Network Network Link + Physical  Link + Physical  Source: ETSI TR 101 943 Concepts of Interception in a Generic Network Architecture
Current Approach Is Not Scalable  Invest in new systems capable to handle 10G/40G/100G  Packet duplication add burden on the network Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN
The Solution: Leveraging Access Switching  Leveraging Access Switching  ,[object Object],Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 
Edge computing
Edge computingEdge computing
Edge computing
 
Keepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge ComputingKeepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge Computing
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
IoT Meets the Cloud: The Origins of Edge Computing
IoT Meets the Cloud:  The Origins of Edge ComputingIoT Meets the Cloud:  The Origins of Edge Computing
IoT Meets the Cloud: The Origins of Edge Computing
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
JCConf 2017 - Next Generation of Cloud Computing: Edge Computing and Apache E...
 
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT EnablementFIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
FIWARE Global Summit - Edge Computing - Near Edge for IoT Enablement
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the Industry
 
Edge computing
Edge computingEdge computing
Edge computing
 

Semelhante a Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event

Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet world
Arief Gunawan
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber future
Melanie Brandt
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
mashiur
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
ProjectENhANCE
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
IJNSA Journal
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
MohammadSwerki2
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFAST
Ann Treacy
 

Semelhante a Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event (20)

MWC 2010 DPI
MWC 2010 DPIMWC 2010 DPI
MWC 2010 DPI
 
Examining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet worldExamining Regulatory Environment in the Ethernet world
Examining Regulatory Environment in the Ethernet world
 
Sustainability, the all fiber future
Sustainability, the all fiber futureSustainability, the all fiber future
Sustainability, the all fiber future
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
5 g latin america april 2019 network densification requirements v1.0
5 g latin america april 2019   network densification requirements v1.05 g latin america april 2019   network densification requirements v1.0
5 g latin america april 2019 network densification requirements v1.0
 
Challenges opportunities 2017 onwards v5.0.
Challenges opportunities 2017   onwards v5.0.Challenges opportunities 2017   onwards v5.0.
Challenges opportunities 2017 onwards v5.0.
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
 
Richard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdf
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Noticias tel dic
Noticias tel dicNoticias tel dic
Noticias tel dic
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGNBarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
 
Fiber not Just for bREAKFAST
Fiber not Just for bREAKFASTFiber not Just for bREAKFAST
Fiber not Just for bREAKFAST
 
Intelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G eraIntelligently connecting our world in the 5G era
Intelligently connecting our world in the 5G era
 

Mais de LiveAction Next Generation Network Management Software

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 

Mais de LiveAction Next Generation Network Management Software (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 

Último

Último (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Intercept at ISS Event

  • 1. Identifying the needle in the 10/40/100G haystackSharon Besser, VP Technologies Net Optics Intelligent Access and Monitoring Architecture
  • 2. Goal Present a methodology and solution of leveraging access switching to overcome current and future Lawful Interception challenges
  • 3. Net Optics In a Nutshell Customers Financial, Telco, Healthcare & Government 85% of the Fortune 100 50% of the Fortune 500 7000 Global Deployments Highlights Founded in 1996, Private, Self-Funded 55 Quarters of Growth & Profitability Strong Management Team Sales Offices in New York, Atlanta, Germany 300 plus new direct customers annually Go to Market Strategy 30% Direct Sales 25% OEM/Partner Relationship 45% Global Channel Technology 20+ Patents and Patent Pending Requests
  • 4. Cause and Effect Industry / Networking Data Center Lawful Interception
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11. Cost of knowledge, migration, operations  TCOSource: Net Optics Customer Advisory Board 7/2010
  • 12.
  • 13.
  • 15. What Customers Want Meet Lawful interception challenges in high capacity networks But how?
  • 16. The LI Foundation: Reliable Copy End user 1 End user 2 Application Application Interception Node Transport Transport Network Network Network Link + Physical Link + Physical Link + Physical Copy LEA Site LEMF Application Application Transport Transport Network Network Link + Physical Link + Physical Source: ETSI TR 101 943 Concepts of Interception in a Generic Network Architecture
  • 17. Current Approach Is Not Scalable Invest in new systems capable to handle 10G/40G/100G Packet duplication add burden on the network Source: Cisco systems 2010: Lawful Interception for 3GPP: Cisco Service Independent Intercept in the GGSN
  • 18.
  • 19. Access Switching: Do More With Less 10/40/100Load Balancing Share the load between multiple tools Centralized intelligence for more endpoint Leverage existing / cheap / 1G tools Plan for growth Pre-filter w/ DPI to detect desired traffic on any port Pre-filtering is a mature technology DPI allows to identify data of interest and forward to the monitoring/recording tool GRE tunneling Distribute the collection infrastructure Cloud Monitoring Inter-VM and cloud based monitoring Any type of media Fiber, copper or both
  • 20. Summary Modern and advanced Access switching technology provides the scalable solution to meet Lawful Interception challenges in high capacity networks by focusing on improving collection infrastructure

Notas do Editor

  1. Capture – CC (Content of Communication) and IRI (Intercept Related Information) related to the subject are extracted from the network.Filtering – information related to the subject that falls within the topic of the inquiry is separated from accidentally gathered information, and formatted to a pre-defined delivery formatDelivery – requested information is delivered to the LEMF The Administration Function (ADMF) receives interception ordersfrom the LEA and hands them over to• Internal Intercept Functions (IIF), which are located tactically within network nodes and generate the two desired types of information, CC and IRI.• Mediation Functions (MF) take charge of delineation between thetwo networks. They implement Internal Network Interfaces (INI),which may be proprietary, to communicate within the PTN, andstandardized interfaces, to deliver requested information to one ormoreLEMFs.
  2. From Cisco:The switch fabric performs the duplication of the original filtered packet. One packet is forwarded to the egress line card. The other packet is forwarded to the Route Processor or to the SIP-400 for LI hardware acceleration.