Network Infrastructure, Network Management
Article | July 10, 2023
In today’s shop-from-anywhere world, the model for success continues to change. Tried and true techniques are becoming obsolete as consumer expectations evolve, demand volatility rises, and supply chain disruptions become more frequent. Retailers are also dealing with online shopping surges that add new complexities to existing data strategies due to an influx of raw, unprepped, and largely underutilized data.
Read More
Wireless, 5G
Article | May 18, 2023
Asia stands out as home to a handful of telcos busy building an international business out of selling their internally developed IT platforms. Leading the way are Jio in India, Japan’s Rakuten and Singapore operator Singtel.
Having built their own businesses, they are now selling their platforms to support new 5G business models for enterprises and other operators. In the case of Singtel, this means its 5G multi-access edge computing (MEC) services, based on Paragon, its orchestration platform for enterprise services.
Manoj Prasanna Kumar, Head of Enterprise Platforms at Singtel, who is responsible for the Paragon platform, discusses in this article the company’s enterprise service ambitions, how it’s partnering with global enterprise software vendors and the obstacles it still sees to 5G B2B service uptake.
Paragon, which falls under the telco’s DigitalInfraCo arm, aims to give enterprises “a single pane of glass that provides an end-to-end view and control of the network, the edge and the application ecosystem,” says Manoj. “It opens up the edge to the enterprise world, allowing them to deploy either their own applications or applications from Singtel's ecosystem.”
Launched last year, Paragon also lets telcos orchestrate end-to-end 5G enterprise networking services in combination with applications from software and cloud computing partners. Paragon’s application partners include Amazon Web Services, Intel, Microsoft and SAP, and the platform is available to every 5G enterprise user within the Singtel Group.
Singtel’s bet is that a growing number of enterprises will need a tightly intertwined combination of 5G connectivity and cloud computing on the edge to run specific vertical applications.
“Our strategy is to become a super aggregator of MEC,” says Manoj. “We focus on high throughput, low latency use cases, such as video analytics or streaming, mixed reality and virtual reality which pump data into the back-end applications and where the decision-making cannot afford even a few milliseconds of extra latency.”
In addition to Paragon, Singtel Group’s investments in 5G infrastructure and service delivery include a national 5G standalone (SA) network, covering more than 95% of Singapore, and international investment in data centers to support cloud computing on the network edge. Today, there are signs that its investments in 5G enterprise services are starting to bear fruit. In the second half of the 2022/23 financial year, which ended on 31 March, Singtel reported that higher demand for technology solutions and 5G services contributed to ICT revenue growth of 11%, with ICT revenues contributing 23% of Singtel Group’s overall enterprise revenue.
Singtel scored a notable win for the Enterprise 5G offering powered by Paragon platform last year when Silicon manufacturer Micron said it would deploy it and Singtel’s 5G campus network infrastructure to support its smart manufacturing operations. Micron is using Singtel’s solution to help manage and analyze its manufacturing processes for enhanced efficiency. Likewise, Singtel recently announced Hyundai as another customer for their Enterprise 5G offering powered by the Paragon platform to deliver digital twin for their electric vehicle manufacturing plant in Singapore for advanced manufacturing operations.
Nonetheless, Manoj recognizes that challenges remain when it comes to growing the 5G enterprise business. “5G and edge in Singapore have had quite a good start. But I would say we've got a long way to go,” he says.
Convincing customers
One of the biggest obstacles is generating customer demand. After all, just because enterprises are able to set 5G connectivity parameters on demand or use MEC for 5G applications at the click of a button doesn’t mean they see a reason to do so.
“Many customers don't have a lot of awareness of how edge computing can really transform their business and how a few milliseconds of latency can actually save money for them, make them more efficient, and reduce errors and so on,” says Manoj.
This reality has shaped Singtel’s sales process. “We spend quite a lot of time in raising awareness amongst customers,” he explains. “We never start with what 5G can do. Instead, we focus on understanding their challenges, their current processes, what gaps there are, and…start with applications that can help solve their problems.”
Another challenge is a lack of 5G-native devices. “This puts us in a very tough spot because when we go and connect devices to wi-fi hotspots, and then use 5G as backhaul, customers often ask ‘isn't this similar to wi fi? Why do I need 5G?’” He adds: “It will be a bit of a roadblock…for all telcos until the 5G-native device ecosystem matures.”
There is also a need for software applications that can perform optimally on 5G and the edge, and switch between network slices with different payloads. “There is a little bit of hand holding required when we bring in an ISV to qualify their application so that it can benefit from all the capabilities of 5G and the edge,” says Manoj.
And then there are the engineering challenges associated with orchestration. Paragon sets out to automate much of the orchestration and management capabilities that make it possible to request quality of service on demand for specific applications and use cases. But here again, success is dependent on close partnerships with third parties.
“Strategic partnerships with Ericsson on the network side and with Intel, Microsoft and AWS help us boost the infrastructure and the application side to stitch together the network and the infrastructure capabilities,” explains Manoj.
Choosing your vertical
Singtel is currently targeting three strategic verticals: manufacturing, public safety and urban planning. Its choice reflects the opportunities in both Singapore and the domestic markets of members of the Singtel Group.
“In Singapore, we are lucky because both enterprises and the government are very, very future-looking and invest quite a lot in adopting new technology,” says Manoj. In particular, “public sector customers are more motivated to explore something new because they carry the digital footprint of the country,” he says.
And because governments operate public safety and urban planning systems at a national level, the promises are on enough scale to spur third parties to invest in developing devices and software applications. Typical public safety use cases include video analytics, surveillance systems and robotics applications; urban planning covers systems such as traffic management.
Some of the enterprise applications Singtel sees gaining traction include immersive B2B2C content, such as delivering real-time analytics to gamers via a 360-degree video feed or mixed reality applications to train factory workers on how to troubleshoot to use complex equipment. “If they need an augmented overlay of information through the camera feeds then they need 5G and edge because a lag will make users nauseous,” explains Manoj. Other promising use cases include autonomous drones and robots.
Singtel has drawn on standard APIs, including TM Forum’s Open APIs, CAMARA APIs to build Paragon. Manoj encourages both technology standardization and collaboration with hyperscalers and software vendors to grow the enterprise market.
“Telcos should be embracing tech players as partners, seeing them as catalysts of more pull through on their services,” says Manoj. “When you partner with them, you expose your services on the hyperscale infrastructure, you naturally work with developers, which allows telcos to expand the services market.”
Read More
Data Center Networking
Article | July 5, 2023
Discover network intrusion monitoring with top network monitoring books. Explore insights, best practices, and tools to secure network visibility and processes used in monitoring network performance.
Observing networks for performance and security anomalies is crucial for businesses that rely on their business network. Network monitoring solutions monitor performance metrics across an entire network to guarantee that your systems operate properly. From monitoring network performance to ensuring comprehensive visibility, the books listed below will offer a wealth of knowledge and expertise to empower professionals in the networking industry.
10 Network Monitoring Books to Effectively Monitor Performance
1 Zabbix Network Monitoring
Author: Rihards Olups
Zabbix Network Monitoring book is an indispensable resource for networking professionals seeking to enhance their network visibility and improve network performance monitoring. This comprehensive guide offers an approach to effectively monitor network devices and applications using Zabbix 3.0. One of the network monitoring books, Zabbix Network Monitoring covers essential topics such as data collection, native Zabbix agents, and SNMP devices. It also delves into monitoring Java application servers, VMware, notifications, permission management, system maintenance, and troubleshooting. It empowers readers to build a robust network monitoring solution to gather data from various systems. By exploring the intricacies of Zabbix, this book ensures that network monitoring becomes an efficient and effortless task, ultimately enhancing network visibility and performance for all stakeholders.
2 The Practice of Network Security Monitoring
Author: Richard Bejtlich
An essential book for networking professionals, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, helps to enhance network visibility and strengthen network security. The book's author, Richard, guides readers through implementing network security monitoring (NSM) as a proactive defense strategy. The book emphasizes integrating NSM into security measures to effectively detect and respond to intrusions. It also provides practical insights on deploying, building and operating an NSM operation using open-source software and vendor-neutral tools. With a focus on proactive incident response, this book equips readers with the knowledge and techniques to establish a robust security net that detects, contains and controls attacks. By implementing the practices outlined in this book, organizations can better safeguard their networks and prevent the loss of sensitive data.
3 Internet and Network Architecture
Author: Sang Hinch
Internet and Network Architecture: Analyzing Performance with Network Monitoring Tools is a must-read for professionals in the networking industry seeking to enhance network visibility and optimize network performance monitoring. This comprehensive guide offers a thorough introduction to TCP/IP, FTP, IP addresses, ports, and web page retrieval, providing a solid foundation in internet and network architecture. The book explores the complex workings of routers, data transmission, network configuration, and architecture, enabling readers to build efficient and secure networks. Focusing on practicality, it emphasizes using network monitoring tools to analyze performance and troubleshoot issues effectively. By mastering the fundamentals presented in this book, readers will gain the knowledge and confidence to navigate the World Wide Web, understand network protocols, and make informed decisions for network optimization.
4 Zabbix 4 Network Monitoring
Author: Patrik Uytterhoeven & Rihards Olups
Zabbix 4 Network Monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0, 3rd Edition is a comprehensive and highly valuable resource for professionals in the networking industry. This book serves as an essential guide to effectively monitor the performance of network devices and applications using Zabbix 4.0. Written for both beginners and experienced users, the book offers a step-by-step approach to help readers quickly grasp the installation process and explore the new features of network monitoring. From understanding native Zabbix agents and SNMP devices to harnessing Zabbix's integrated functionality for monitoring Java application servers and VMware, readers will gain comprehensive knowledge. With insights into optimizing performance, automating configurations, and troubleshooting network issues, it will develop advanced skills to ensure a healthy and efficient network.
5 Applied Network Security Monitoring
Author: Chris Sanders & Jason Smith
An indispensable book for professionals in the networking industry Applied Network Security Monitoring: Collection, Detection, and Analysis offers a comprehensive guide to become a proficient NSM analyst. Focusing on NSM's collection, detection, and analysis stages, this book equips readers with essential concepts through real-world examples and practical scenarios. Recognizing that prevention is not foolproof, the book emphasizes the critical role of detection and response in minimizing the impact of network intrusions. With insights from experienced NSM professionals and access to sample data, readers gain valuable knowledge to analyze network security incidents effectively. From data collection methods to in-depth coverage of tools like Snort, Suricata, Bro-IDS, SiLK, and Argus, this monitoring book provides hands-on experience and practical examples using real PCAP files. By leveraging Security Onion for lab examples, readers can develop and enhance their analytic techniques.
6 Practical Network Security Monitoring: Using Free Software
Author: Elizabeth Graham
Practical Network Security Monitoring: Using Free Software offers guidance on utilizing free software to collect, monitor, and analyze network traffic, thereby detecting and identifying potential threats. With a focus on providing practical exercises, this book equips beginner to intermediate users with the necessary knowledge to detect and defend cyber threats. Step-by-step instructions enable readers to install, configure, and effectively use free tools, allowing hands-on experience in analyzing network traffic and identifying malicious activity. This book edition covers Security Onion, introducing significant changes to the platform. The updated content includes new intrusions, malware, PCAP examples, and an introduction to web-based PCAP analysis tools. A bonus chapter challenges readers to test their knowledge through self-assessment.
7 Efficient Body Sensor Networks for Patient Monitoring
Author: Jawaid Iqbal
Efficient Body Sensor Networks for Patient Monitoring is a book for professionals in the networking and healthcare industry, focusing on the challenges, Body Sensor Networks (BSNs) face in continuously monitoring patient vital signs. BSNs operate in constrained environments and encounter issues such as patient information privacy, secure data transmission over public networks, high overhead, and energy constraints. Being one of the prominent network monitoring books, it presents five efficient and secure attribute-based schemes designed explicitly for BSNs. These schemes address the mentioned challenges comprehensively, providing practical solutions to enhance network monitoring performance in patient monitoring scenarios. By proposing novel approaches, this book contributes to the advancement of efficient and secure patient monitoring within BSNs.
8 Mastering Python Networking
Author: Eric Chou
A comprehensive guide created for professionals in the networking industry seeking to leverage Python for network automation, monitoring, and management, Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management, focuses on the latest Python libraries and frameworks and equips readers with the necessary skills to tackle common & complex network challenges effectively. From interacting with network devices to implementing advanced features using Python 3, the book covers a wide range of topics, including Docker containers, network data analysis, cloud networking, and DevOps practices. With practical examples and insights into tools like GitLab & ELK, network engineers, developers, and SREs will gain valuable knowledge to enhance their network performance monitoring and visibility.
9 AWS Security Cookbook
Author: Heartin Kanikathottu
Focusing on securing Amazon Web Services (AWS) infrastructure, AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS is written. Being one of the network monitoring books that provide professionals with valuable insights related to network visibility and network performance management in the networking industry, this book offers practical solutions to address common security challenges, including permission policies, key management, network security, and cloud security best practices. Industry professionals can explore various AWS services and features that enhance security, including IAM, S3, CloudWatch, CloudTrail, Config, GuardDuty, and Macie. In addition, the book also covers compliance requirements and demonstrates how to maintain security and compliance using AWS security services.
10 The Best of TaoSecurity Blog, Volume 2
Author: Richard Bejtlich
The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat, guides professionals in the networking industry, particularly those interested in network security monitoring. Written by Richard Bejtlich, a renowned cybersecurity expert, he curates the best entries from his 17 years of writing on the TaoSecurity Blog. The book explores various intervention detection and response aspects, leveraging threat intelligence sources, network data, application and infrastructure data, and endpoint data. Additionally, it provides insights into Chinese hacking activities over the past two decades, offering a unique perspective from a defender on the front lines. With new analysis accompanying each post, readers can gain valuable knowledge on the evolution of the security industry, defensive methodologies, and strategies for enhancing national security.
Conclusion
In conclusion, the recommended books discussed in this article provide valuable insights and guidance for networking experts in the B2B sector. These resources cover various aspects of monitoring network performance, enhancing network visibility, and addressing security concerns. By delving into these monitoring books, professionals can gain a deeper understanding of effective network performance monitoring techniques, ensuring optimal visibility across their infrastructure. With the ever-evolving networking landscape, staying up-to-date with the latest trends and best practices, it is crucial for maintaining a high-performing network. These books offer industry-relevant knowledge and empower networking experts to make informed decisions, ultimately leading to a robust and efficient network infrastructure.
Read More
Article | July 6, 2021
The promise of Open vRAN is to give back to mobile operators some form of control over their networks. The “open” refers to the opening of RAN interfaces. It is critical because it gives operators the possibility to buy the radio unit and the baseband unit from different vendors, rather than having to buy an integrated system, and therefore helps them diversify their suppliers and reduce their dependence on traditional vendors. The “v” refers to virtual. Virtualization is about disaggregating hardware and software and enabling the use of commercial off-the-shelf servers, instead of the usual purpose-built hardware, to run network functions in order to increase flexibility and reduce costs.
Across Asia-Pacific, the announcements and activities from operators including Airtel, Axiata, NTT Docomo, Rakuten Mobile, Smartfren and Telkomsel indicate a growing appetite for open and virtualized radio access networks. In countries like India, Indonesia, Malaysia and Thailand, open RAN can for example help to address the challenges of remote connectivity and to deploy a network in places where it has been traditionally difficult to achieve a satisfactory return on investment.
Read More