Si no puede visualizar las láminas de arriba, descargue esta versión en formato PDF y mantenga la ventana de su navegador abierta para seguir las instrucciones de audio.
Si no puede visualizar las láminas de arriba, descargue esta versión en formato PDF y mantenga la ventana de su navegador abierta para seguir las instrucciones de audio.
Rami Yaron
Link aggregation (LAG) could be used either for more
capacity or for redundancy. If, for example, you would like to protect your GigE
UNI with LAG, you would connect two Gig ports using LAG, but you will not exceed
the one Gig bandwidth. In this case if one of the link fails, all the traffic
will still go through the other link.
With regard to your second question, there are many protection
methods; slide 10 on my presentation (slide 26 on the combined deck) describes
few of them.
Rami
telesemana
Doug, it may seem to some listening to the webinar that some of the issues your brought up seem like problems that have not yet materialized in Latin America, is this a matter of time or can the region avoid them entirely? Meaning, we might not suffer them at all.
Doug Miller
It is true that the DNS only has visibility into IP address which (especially in mobile) is a constantly changing ID. However, since Nominum has built a complete architecture that has access to more than simply DNS information, we have the ability to merge queries with User IDs pulled from RADIUS for example. So, we can help our customers manage policy via the DNS down to the individual user level.
Doug Miller
Actually, it’s quite the opposite. With the customers we’ve worked with over the last 12-18 months, we’ve seen fairly significant infection rates in LATAM. While mobile operators may not be seeing it, I’d argue that it’s because bot-related threats aren’t currently being tracked closely in those networks. According to our research, the mobile threat is definitely real, but not quite to the same degree as fixed networks… yet. However, we also see it as being one of the fastest growing segments of bot activity. Bots are very real worldwide, and especially in LATAM.
telesemana
Hi Doug,
How can Nominum use DNS to track mobile users when the DNS only has access to IP address and those change very rapidly?Thanks!
Doug Miller
It is true that the DNS only has visibility into IP address
which (especially in mobile) is a constantly changing ID. However, since
Nominum has built a complete architecture that has access to more than simply
DNS information, we have the ability to merge queries with User IDs pulled from
RADIUS for example. So, we can help our customers manage policy via the DNS
down to the individual user level.
telesemana
Hi Rami,
Why should any operator move multi CoS, is it uses today the high CoS (real time CoS) for all types of traffic?
Rami Yaron
Rafael,
Here are few reasons to move to Multi CoS:
–
One CoS network is not
scalable.
–
One CoS backhaul, even the
highest CoS, would not provide the best performance – According to our study only around 8% of the
mobile traffic is very sensitive to delay variation and needs real time CoS. By
running all you traffic on a single CoS, that sensitive traffic is subject to
higher delay variation.
–
Multi CoS improves the performance
of the sensitive traffic and provides better bandwidth utilization.
–
LTE already has the tool to
optimize the traffic with multi CoS
–
When using microwave radio
for backhaul, multi CoS allows you to run adaptive modulation which increase
your availability for the high priority traffic.
Rami
telesemana
Thanks Rami!
Llugo
to Rami:
Could you explain us how the link aggregartion help to improve the resiliency? I’ve used it just to have more capacity aggregating links just like an array but I can’t undestand how it could be a UNI resiliency.
Beyond this specific resiliency, could you further extend the explanation of the other escenarios of resiliancy or maybe, could you tell me where could I find detailed information related?
Thanks in adavance.
Rami Yaron
Link aggregation (LAG) could be used either for more
capacity or for redundancy. If, for example, you would like to protect your GigEUNI with LAG, you would connect two Gig ports using LAG, but you will not exceedthe one Gig bandwidth. In this case if one of the link fails, all the trafficwill still go through the other link.
With regard to your second question, there are many protectionmethods; slide 10 on my presentation (slide 26 on the combined deck) describesfew of them.
Rami
telesemana
Bienvenidos a un nuevo seminario de TeleSemana.com. Recuerden que por este medio sólo antenderemos las preguntas sobre los temas tratados en las presentaciones. Para problemas técnicos por favor utilizar el link a la derecha de la pantalla en la caja bajo el nombre “Problemas técnicos”. Gracias.