James Haensly James Haensly Chief Technology Officer Chief Technology Officer Avaya Asia Pacific Avaya Asia Pacific From Here to There: From Here to There: Multi-modal, Converged Multi-modal, Converged Communications Trends & Communications Trends & Strategies Strategies
32
Embed
James Haensly Chief Technology Officer Avaya Asia Pacific From Here to There: Multi-modal, Converged Communications Trends & Strategies.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
James HaenslyJames HaenslyChief Technology OfficerChief Technology Officer
Avaya Asia PacificAvaya Asia Pacific
From Here to There:From Here to There:Multi-modal, Converged Multi-modal, Converged Communications Trends & StrategiesCommunications Trends & Strategies
Business & Institution Needs Create Increasing Business & Institution Needs Create Increasing Demands for CommunicationsDemands for Communications
Any device, Any device, any process, any networkany process, any network
Enterprises & Institutions Enterprises & Institutions becoming virtual becoming virtual • Globally distributed value Globally distributed value
Demand for performanceDemand for performance• RevenueRevenue
• ProductivityProductivity
• ProfitabilityProfitability
Revenue
Cost
Traditional
• Separate voice and data networks
• Emerging IP phones
The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications
BestEfforts
IP Telephony
Real-TimeReliable
TrafficMgmt
IP QoS
Stand-alone
Traditional
• Separate voice and data networks
• Emerging IP phones
Converged Networks
• Integrated voice-data applications
• IP as universal infrastructure
• SIP evaluation by carriers and enterprises
The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications
BestEfforts
IP Telephony
Real-TimeReliable
TrafficMgmt
IP QoS
VirtualStand-alone
Traditional
• Separate voice and data networks
• Emerging IP phones
Converged Communications
• Rich multimodal user experience
• Dynamic application creation using Comm. Services
• Built on Converged Networks
Converged Networks
• Integrated voice-data applications
• IP as universal infrastructure
• SIP evaluation by carriers and enterprises
The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications
BestEfforts
IP Telephony
Real-TimeReliable
TrafficMgmt
IP QoS
VirtualStand-alone EcoSystem
ManagementManagement
Sec
uri
tyS
ecu
rity
Dir
ecto
ries
Dir
ecto
ries
Su
pp
ort
an
d S
ervi
ces
Su
pp
ort
an
d S
ervi
ces
InfrastructureInfrastructure
NetworkNetworkServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Comm EnabledComm EnabledPortalPortal
Communication ModelCommunication Model
QoS Policy RegistrationSIP User Provisioning
QoS Policy RegistrationSIP User Provisioning
CRM SCM ERM Presence Telephony
CRM SCM ERM Presence Telephony
xUI Access ControlPresentation Server
xUI Access ControlPresentation Server
SAN Servers WirelessRouters Gb Switches
SAN Servers WirelessRouters Gb Switches
Interactions: Natural,
Multi-Modal
Plug & Play transmission
Transport: QoS-enabled IP
From stand-alone to federated apps
TrendsTrends
Su
pp
ort
an
d S
erv
ice
sS
up
po
rt a
nd
Se
rvic
es
Communication Model and TrendsCommunication Model and Trends
InfrastructureInfrastructure
Network Network ServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Comm Enabled Comm Enabled PortalPortal
Management:HeterogeneityManagement:Heterogeneity
Security: Securing distributed
open systems
Security: Securing distributed
open systems
Directories:Fundamental to management,security & apps
Directories:Fundamental to management,security & apps
From stand-alone to federated apps
Su
pp
ort
an
d S
erv
ice
sS
up
po
rt a
nd
Se
rvic
es
Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices
ManagementManagement
Security End-to-end technologies &processes
Security End-to-end technologies &processes
DirectoriesDirectories
QoS-Enabled IP
Communication-Enabled Federated
Apps
InfrastructureInfrastructure
Network Network ServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Natural InterfacesComm Enabled Comm Enabled
PortalPortal
Su
pp
ort
an
d S
erv
ice
sS
up
po
rt a
nd
Se
rvic
es
Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices
ManagementManagement
Security End-to-end technologies &processes
Security End-to-end technologies &processes
DirectoriesDirectories
QoS-Enabled IP
Communication-Enabled Federated
Apps
InfrastructureInfrastructure
Network Network ServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Natural Interfaces
Comm Enabled Comm Enabled PortalPortal
Natural Interfaces are Multi-ModalNatural Interfaces are Multi-Modal
The most natural communication mediacan be voice, text, image, annotation . . .
(or a combination of these)depending on the interaction and device(s) available
• A shared space involving pen, sound and document allowing multi-modal collaboration and real time communications
• Annotation saved, sent, and retrieved as ink data
Handheld PDA sending directions
Another Handheld PDAreceiving directions
PacketNetwor
kMANLANwi-fi
• Example:Example: Voice request results in Voice request results in a multimedia response on a WAP a multimedia response on a WAP clientclient
Multi-Modal ChallengesMulti-Modal Challenges Mismatch between communication capabilities of sender and Mismatch between communication capabilities of sender and
receiver receiver Managing simultaneous input streams from more than one Managing simultaneous input streams from more than one
modality into a single communication event modality into a single communication event Associating annotations with documentsAssociating annotations with documents
• Understanding, storing and rendering device dependent annotations Understanding, storing and rendering device dependent annotations in a device independent mannerin a device independent manner
• Mapping annotations at a logical rather than presentation levelMapping annotations at a logical rather than presentation level
Natural Language ChallengesNatural Language Challenges Broadening understandingBroadening understanding
Continued advances in speech generation and dialog systemsContinued advances in speech generation and dialog systems
Intelligent dialog between human and machine is the ultimate Intelligent dialog between human and machine is the ultimate
challenge for computing machine challenge for computing machine
Business Apps Business Apps & Comm Services& Comm Services
Natural InterfacesComm Enabled Comm Enabled
PortalPortal
SIP is to Real-Time People-to-People Communications what HTTP was to Information Exchange on the World Wide Web.
Phones
PBX
Telephony Apps (Voice Mail, CTI, Call Center…)
SIP User AgentsIP Network
SIP Servers and SIP-Enabled Communication Apps
• Enables rapid creation of communication-enabled enterprise applications from standardized components
• Supports multi-modal communications and devices
• Changes the focus from mode to user by equalizing real-time and near-real-time communications into a session
• Standardized personal address means there’s one way to “place the call” regardless of device being used by recipient
• Services-based environment accommodates both peer-to-peer and client-server apps
Converged Communication TopologyConverged Communication Topology
Key technologies• SIP: Session Initiation Protocol provides simple signaling for
session setup and control• Web Services: Protocols for data and application interoperability• Presence: Find “the Right person, in the Right place at the Right
time in the Right way”• Peer-to-Peer: Putting users in direct control of communications
Process changesProcess changes• Business process managementBusiness process management
• Programmer & operations staff trainingProgrammer & operations staff training
Integration with existing applicationsIntegration with existing applications• Integration with legacy systems & architecturesIntegration with legacy systems & architectures
• Interoperable information modelsInteroperable information models
Standardization and conformanceStandardization and conformance• Web services standards are still evolvingWeb services standards are still evolving
• Interoperability between .NET and J2EE environments and Interoperability between .NET and J2EE environments and applicationsapplications
Other Technology dependenciesOther Technology dependencies• User and application level security & managementUser and application level security & management
An Example: Unified Communication SolutionsAn Example: Unified Communication SolutionsGreater Speed, Quality and MobilityGreater Speed, Quality and Mobility
Integrated access to directory anddatabases
Near and Non real- time integrated voice, email, fax and video
Personal Efficiency Management
Individually customizable
communication rules
Real-time “any media” conferencing and collaboration
Contact & InformationManagement
Calling & Conferencing Management
WEB, WIRELESS & SPEECH ACCESS
Message Management
Su
pp
ort
an
d S
erv
ice
sS
up
po
rt a
nd
Se
rvic
es
Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices
ManagementManagement
Security End-to-end technologies &processes
Security End-to-end technologies &processes
DirectoriesDirectories
Communication-Enabled Federated
Apps
InfrastructureInfrastructure
Business Apps Business Apps & Comm Services& Comm Services
Natural InterfacesComm Enabled Comm Enabled
PortalPortal
QoS-Enabled IP Network Network ServicesServices
QoS Goals are at the Application Level;QoS Goals are at the Application Level;Managed at all LevelsManaged at all Levels
Any solution should be able to monitor and control a variety of network elements and applications
QoS = Performance: Response time; Delay; Jitter; Loss etc.
+ Reliability: Availability(99.999%); Data/Transaction Integrity etc.
QoS Management Server
NetworkNetworkServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Business Apps Business Apps & Comm Services& Comm Services
Prevention• Monitoring and rejuvenation• Hardened OSRecovery• Failure detection and fail-over• Hardware redundancyData Integrity• In-memory data checkpointing• Persistent data replication
Path Redundancy• Spanning tree protocols in
switches for LANs and MANs• MPLS dynamic reconfigurationRecovery • Expert systems detect/repair
Network readinessNetwork readiness• Configure to support desired QoSConfigure to support desired QoS• Provide desired bandwidth, delay, jitter, loss, etc.Provide desired bandwidth, delay, jitter, loss, etc.
Business policies around QoSBusiness policies around QoS• Determining QoS goals and granularity (per flow type, per Determining QoS goals and granularity (per flow type, per
application, per user, etc.)application, per user, etc.)• Mapping goals to network/application mechanismsMapping goals to network/application mechanisms
Dynamic conditionsDynamic conditions• Load, applications, network conditions and usersLoad, applications, network conditions and users• Correctness of network data in face of constant changeCorrectness of network data in face of constant change
HeterogeneityHeterogeneity • Non-uniform implementation of QoS mechanisms across Non-uniform implementation of QoS mechanisms across
vendors, domains, systems and layersvendors, domains, systems and layers• Bandwidth in different segmentsBandwidth in different segments• Common management schema/standardsCommon management schema/standards
Su
pp
ort
an
d S
erv
ice
sS
up
po
rt a
nd
Se
rvic
es
Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices
ManagementManagement
Security End-to-end technologies &processes
Security End-to-end technologies &processes
DirectoriesDirectories
QoS-Enabled IP
Communication-Enabled Federated
Apps
InfrastructureInfrastructure
Network Network ServicesServices
Business Apps Business Apps & Comm Services& Comm Services
Natural InterfacesComm Enabled Comm Enabled
PortalPortal
0
10000
20000
30000
40000
50000
60000
1988 1991 1994 1997 2000
CERT Security Reports 1988 - 2001
incident count
Security is Increasingly ImportantSecurity is Increasingly Important
* Global Information Security Survey (InformationWeek and Price Waterhouse Coopers)
Data from Carnegie Mellon Computer Emergency Response Team
Attacks increasing• Data & service theft • Spoofing• Denial of Service• Viruses & Vandalism• EavesdroppingAttacks exist at every level• Terminals, LAN, Switches, Network,
Servers, ApplicationsAttack sophistication increasing• Toolkits• Coordinated, distributed attacksWireless & Mobility issues• Wireless protocols less secure• Mobile devices lack physical security
• 150 to 200 new viruses per month
• 60-70% of security breaches are internal
• Viruses and hacking cost $266 billion in US last year*
Extended Perimeter
Perimeter
Firewalls
Firewalls
Control Domain
VPN
OS, applications, data
Resource DomainIdentity and
Access Mgmt
SecurityManagement
Security policies and procedures beyond the physical perimeter ofthe enterprise: remote workers, B2B partners & suppliers, extranets etc.
Network level controlsto filter traffic and manage access;Encryption
Media• Encrypt voice so sniffers hear only white noise
Session• Session level encryption with private key administration• Link encryption for key distribution
Server• Eliminate common attacks by disabling un-needed services; e.g.
NFS, X-windows, rexec, …• Protect network servers against viruses by eliminating incoming
e-mail, web browsers, shared drives Network
• Filter packets based on addresses, port numbers• Defend against denial-of-service attacks by discarding suspicious
packets Administration
• Set, communicate, and enforce security policies• Make it convenient: if it’s too hard, it’ll be circumvented
Securing Converged Networks and Applications – Securing Converged Networks and Applications – ChallengesChallenges
Keeping currentKeeping current• New forms of attacksNew forms of attacks• Attacks increasing: data and service theft; spoofing; denial of Attacks increasing: data and service theft; spoofing; denial of
service; viruses and vandalism; eavesdroppingservice; viruses and vandalism; eavesdropping• Security patches from vendorsSecurity patches from vendors
User and operations staff education and trainingUser and operations staff education and training• Security awarenessSecurity awareness• Following good security practices: strong passwords, regular Following good security practices: strong passwords, regular
virus checker updates etc.virus checker updates etc.• Security intrusion detection and response processesSecurity intrusion detection and response processes
Incorporating secure programming practicesIncorporating secure programming practices• By vendorsBy vendors• By in-house programming staffBy in-house programming staff
ManagementManagementManagementManagement
Sec
uri
tyS
ecu
rity
Sec
uri
tyS
ecu
rity
Dir
ecto
ries
Dir
ecto
ries
Dir
ecto
ries
Dir
ecto
ries
Su
pp
ort
an
d S
ervi
ces
Su
pp
ort
an
d S
ervi
ces
Infrastructure
Network Services
Business Apps & Comm Services
Comm Enabled Portal
End-to-end Security
QoS-Enabled IP
Communication-Enabled Federated
Apps
Disruptive Technologies
Disruptive Technologies
Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices