Upgrading To A New Era

Keeping the ever-increasing demand for anytime, anywhere data under control

The recent eruption of mobile applications coupled with increasing IP-based data traffic on mobile devices is fueling the uptake of 4G technologies and driving the migration to faster data rates. In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies. Both handset vendors and carriers are busy rolling out application portals in order to differentiate their offerings and provide better monetization and ARPU. The increasing trend for “anywhere, anytime” data technology is pushed by user mobility and subscriber need.

The move to mobile connectivity and mobile broadband, and more overall data traffic, is powering this expansion. Subscribers are dictating what applications they want to use and where they want to use them. This is pushing operators to move to an all-IP core by reducing network complexity and lowering costs.

With this much network transformation, the migration won’t happen overnight. Network operators still need to support a hybrid network for the foreseeable future, interconnecting next-generation systems and devices with the various types of existing platforms. The future of the network is becoming more complex, and the journey toward a converged all-IP network brings a whole new set of network performance and management guidelines to be implemented by IT organizations. Real-time network troubleshooting, monitoring and provisioning must be implemented strategically, as they are driven by the ever-important need to maintain and manage the subscriber experience.

Real-time monitoring of network traffic has proven to be particularly important for analyzing and diagnosing network performance and, consequently, the subscriber’s quality of experience (QoE).

Legacy Tools Fall Short of Real-Time Monitoring Needs

Performance and complexity problems are only made worse by fragmented monitoring approaches. The constant push for more efficient connectivity is leaving traditional approaches toward network monitoring incapable of managing network components on service provider and enterprise infrastructures. The accumulation of outdated network monitoring components coupled with the growing complexity of data on the network is causing several major problems.

Traditionally, placing a host of tools into the network was the solution to improving visibility of network performance. While this strategy does solve some problems, it introduces others. The inability to access a particular point in a network with multiple tools is often considered the biggest challenge IT managers face. This limitation, combined with the type of overhead management used in legacy monitoring schemes, creates a network “blind spot” and makes troubleshooting inefficient because there often are different sets of tools scattered across the network in different physical locations, each with individual management software that is inoperable with the software of other vendors.

Monitoring costs become increasingly expensive as network management becomes more inefficient and network engineers have limited accessibility to certain points in the network yet still have to manage an immense overflow of data. Reduced ROI and increased costs from the lack of fast and efficient troubleshooting is impacting revenues across the board—and adding performance and complexity problems.

Smarter Solutions: The Economics of Network Intelligence Optimization

Network operators—especially those in the telecom, enterprise or government industries—must carefully consider the price-performance, agility, diversity and intelligent capabilities of a traffic capture solution before making a decision. They must develop a complete and forward-looking strategy for network monitoring and management. There are a rising number of macro trends that, depending on future requirements, network operators should be mindful of when determining their network monitoring needs; technology development, “flattening the network” and purchasing economics are examples.

The continued expansion of IP only looks to accelerate the need to displace legacy systems with a next-generation network. With the network “flattening,” more distributed IP components in the network will be created, thus effectively generating more potential points of failure. A broader range of IP services will be rolled out as a result, further increasing the complexity of the network. Added complexity creates more opportunities for points of monitoring; the monitoring infrastructure should be “flat” and flexible across the whole network.

The Network Intelligence Optimization framework is laying the foundation for a smarter network monitoring solution. In order to withstand the increase in speed and complexities, the traffic-capture layer must continue to be utilized in the hardware because it is necessary to have a deeper awareness of packets and applications, along with a more dynamic handling of them.

With the need to improve service delivery while having tighter budget control, it is no surprise that network managers must now do more with less. However, the network monitoring optimization framework enables an organization to shift from a high initial CAPEX business model to a lower and variable CAPEX model when looking at the network monitoring component of the budget.

Network managers can do more in other areas such as network forensics, lawful intercepts and behavioral analysis now that there is less to worry about. With managed service providers (MSPs) having become mainstream, and primarily focused on monetization of QoS/QoE rather than on monitoring network elements and packets, the layered approach to network monitoring is essential to enabling the business model and differentiation in such network environments.

This article originally appeared in the March 2012 issue of Security Today.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3