Upgrading To A New Era

Keeping the ever-increasing demand for anytime, anywhere data under control

The recent eruption of mobile applications coupled with increasing IP-based data traffic on mobile devices is fueling the uptake of 4G technologies and driving the migration to faster data rates. In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies. Both handset vendors and carriers are busy rolling out application portals in order to differentiate their offerings and provide better monetization and ARPU. The increasing trend for “anywhere, anytime” data technology is pushed by user mobility and subscriber need.

The move to mobile connectivity and mobile broadband, and more overall data traffic, is powering this expansion. Subscribers are dictating what applications they want to use and where they want to use them. This is pushing operators to move to an all-IP core by reducing network complexity and lowering costs.

With this much network transformation, the migration won’t happen overnight. Network operators still need to support a hybrid network for the foreseeable future, interconnecting next-generation systems and devices with the various types of existing platforms. The future of the network is becoming more complex, and the journey toward a converged all-IP network brings a whole new set of network performance and management guidelines to be implemented by IT organizations. Real-time network troubleshooting, monitoring and provisioning must be implemented strategically, as they are driven by the ever-important need to maintain and manage the subscriber experience.

Real-time monitoring of network traffic has proven to be particularly important for analyzing and diagnosing network performance and, consequently, the subscriber’s quality of experience (QoE).

Legacy Tools Fall Short of Real-Time Monitoring Needs

Performance and complexity problems are only made worse by fragmented monitoring approaches. The constant push for more efficient connectivity is leaving traditional approaches toward network monitoring incapable of managing network components on service provider and enterprise infrastructures. The accumulation of outdated network monitoring components coupled with the growing complexity of data on the network is causing several major problems.

Traditionally, placing a host of tools into the network was the solution to improving visibility of network performance. While this strategy does solve some problems, it introduces others. The inability to access a particular point in a network with multiple tools is often considered the biggest challenge IT managers face. This limitation, combined with the type of overhead management used in legacy monitoring schemes, creates a network “blind spot” and makes troubleshooting inefficient because there often are different sets of tools scattered across the network in different physical locations, each with individual management software that is inoperable with the software of other vendors.

Monitoring costs become increasingly expensive as network management becomes more inefficient and network engineers have limited accessibility to certain points in the network yet still have to manage an immense overflow of data. Reduced ROI and increased costs from the lack of fast and efficient troubleshooting is impacting revenues across the board—and adding performance and complexity problems.

Smarter Solutions: The Economics of Network Intelligence Optimization

Network operators—especially those in the telecom, enterprise or government industries—must carefully consider the price-performance, agility, diversity and intelligent capabilities of a traffic capture solution before making a decision. They must develop a complete and forward-looking strategy for network monitoring and management. There are a rising number of macro trends that, depending on future requirements, network operators should be mindful of when determining their network monitoring needs; technology development, “flattening the network” and purchasing economics are examples.

The continued expansion of IP only looks to accelerate the need to displace legacy systems with a next-generation network. With the network “flattening,” more distributed IP components in the network will be created, thus effectively generating more potential points of failure. A broader range of IP services will be rolled out as a result, further increasing the complexity of the network. Added complexity creates more opportunities for points of monitoring; the monitoring infrastructure should be “flat” and flexible across the whole network.

The Network Intelligence Optimization framework is laying the foundation for a smarter network monitoring solution. In order to withstand the increase in speed and complexities, the traffic-capture layer must continue to be utilized in the hardware because it is necessary to have a deeper awareness of packets and applications, along with a more dynamic handling of them.

With the need to improve service delivery while having tighter budget control, it is no surprise that network managers must now do more with less. However, the network monitoring optimization framework enables an organization to shift from a high initial CAPEX business model to a lower and variable CAPEX model when looking at the network monitoring component of the budget.

Network managers can do more in other areas such as network forensics, lawful intercepts and behavioral analysis now that there is less to worry about. With managed service providers (MSPs) having become mainstream, and primarily focused on monetization of QoS/QoE rather than on monitoring network elements and packets, the layered approach to network monitoring is essential to enabling the business model and differentiation in such network environments.

This article originally appeared in the March 2012 issue of Security Today.

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.