A Roadmap for End-to-End Monitoring of Enterprise Applications in Hybrid Multi-Cloud

March 20, 2018

ONUG provides a forum in which executives from IT organizations and vendors work together to develop guidance and recommendations for the IT industry. The ONUG Monitoring and Analytics (M&A) Working Group is focused on technologies and tools that support application and network assurance. In 2016, the M&A Working Group published a whitepaper describing some of the most common use cases for monitoring. This document builds on that work and describes a framework for IT Operations Monitoring and Analytics. It introduces the three pillars of an Enterprise monitoring architecture (Application, Network, and Infrastructure assurance). This paper also describes various approaches to monitoring and analytics. Finally, it identifies the Key Performance Indicators (KPIs) across each of the above areas.

Spotlight

Aspect Security

Every aspect of your business relies on software. Yet adoption of secure software development practices is often lagging, leaving data vulnerable.

OTHER WHITEPAPERS
news image

AI and ML – Enablers for Beyond 5G Networks

whitePaper | May 11, 2021

This white paper on AI and ML as enablers of beyond 5G (B5G) networks is based on contributions from almost 20 5G PPP projects, coordinated through the 5G PPP Technology Board, that research, implement and validate 5G and B5G network systems. The paper introduces the main relevant mechanisms in Artificial Intelligence (AI) and Machine Learning (ML), currently investigated and exploited for enhancing 5G and B5G networks.

Read More
news image

White Paper: Enhanced Policy Management & Control

whitePaper | August 12, 2022

This white paper describes the characteristics of effective, innovative policy management and control using the advantages of a standalone 5G wireless network. Network policy management and control refers to the rules that determine how network services are provided to customers in real-time. It includes access control policies, quality of service (QoS) requirements, service level agreement (SLA) considerations, traffic steering and routing configurations, charging policies and usage monitoring.

Read More
news image

NG.127 E2E Network Slicing Architecture

whitePaper | May 10, 2022

The purpose of this document is to emphasize necessity of cross-standardization collaboration to realize E2E Network Slicing Architecture designed from an End-to-End (E2E) perspective, spanning over different technical domains (e.g., device, access network, core network, transport network and network management system) and multiple vendors and to provide guidance on actions in each Standards Developing Organizations (SDOs) and open source projects.

Read More
news image

White Paper: Security in Open RAN

whitePaper | June 17, 2021

Despite misconceptions, open interfaces provide increased independent visibility and the opportunity for an enhanced and more secure system.

Read More
news image

Network Visibility in the 5G Era

whitePaper | February 22, 2023

By 2026, there will be close to six billion cellular Internet of Things (IoT) connections, and mobile data traffic will reach 226 exabytes (EB) per month, about 4.5 times the amount of cellular traffic in 20201 . This increase in internet traffic will result in an overwhelming session load on mobile network operators’ (MNOs) monitoring infrastructure.

Read More
news image

Lavelle Networks SD-WAN Improves Branch Office Cloud Access

whitePaper | January 5, 2020

The popularity of cloud services has meant big changes for branch office networks, which have been operating for years utilizing only dedicated multiprotocol label switching (MPLS) connections back to a corporate data centers. Now, there’s a need to add broadband connections for faster cloud access. But these links are less secure and complicate network management and policy enforcement. Software-defined wide area network (SD-WAN) systems enable branch offices to have both their broadband connections and to enforce policies designed to improve network security and performance.

Read More

Spotlight

Aspect Security

Every aspect of your business relies on software. Yet adoption of secure software development practices is often lagging, leaving data vulnerable.

Events