Page 10 - Cisco Tribune Q2 2015
P. 10





l l l 
10 2nd Quarter 2015 NEWS PRODUCTS PEOPLE EVENTS
Telecom Reseller: Cisco Tribune 

form the WAN/LAN monitoring.
virtualization technology to consolidate
virtualized automated network can happen end result will be analyses that do not offer 
Network and data center monitoring data many network equipment types onto in milliseconds. If left unanalyzed, the useful actionable results.
deinitely qualiies as big data. It continues industry standard high volume servers, data value may decrease to where it is only 
to increase the volume of data produced. switches and storage, which could be historical data. Then the data cannot be What do we need?
The monitored data also changes rapidly in located in datacenters, network nodes and used to deal with real time situations.
Software-deined networking is a 
milliseconds and even microseconds, and in the end user premises.” If the ETSI
* Variability--Data creation does not networking technique that allows network 
can change faster than humans can analyze can standardize NFV and its monitoring follow a nice smooth creation pattern. administrators to manage network 
and respond.
data, then we may not have the same Large data production may be produced by resources. This is done by separating the 
multivendor approach of SDN. If not, then unexpected events (trafic bursts, resource resource that makes decisions about where 
Big Data as a Tool
we need standards here as well.
failure, and security attacks) as well as trafic is sent from the resources that 
In Big Data: A Tool, Not an Answer, I described ive factors of big data that A third entry into the confusion is the service provider community. Nearly all periodic events.
* Many Formats--It would be nice if all forward trafic to the selected destination. We do not have one but several SDN 
produce challenges for anyone who wants enterprises use some provider(s) in their the data was in a common format. Vendors approaches on the market. We need some 
to process big data and generate useful and networks. The providers may be reluctant add proprietary data extensions to make agreement on the data generated by 
timely results:
and therefore limit the data available for big their products more attractive by adding different vendors and standardization of 
* Quantity--The amount of data produced data analysis. They may also add their own more collectable information. The variety format and data content.
by a wide range of network resources keeps formats and content information.
of formats and data extensions is already 
increasing. Data comes in both structured What we need is a holistic approach to
signiicant. This makes analysis that much The Network Functions 
and unstructured forms. It depends on the big data network monitoring analysis. The more complicated.
Virtualization Working Group of the 
vendor of the resource.
fragmented condition of today means that * Many Sources--Attempting to connect, European
* Delivery Speed--The rate of data the enterprise will have to focus on one link, match, and transform the data is quite Telecommunications Standards Institute 
delivery stimulates rapid processing of resource vendor to reduce the variety of data a task. If correlations cannot be made, data (ETSI) states that NFV “aims to address. 
data. Trafic and resource changes in a
elements with varied formats and content. relationships will be fragmented and the
problems by leveraging standard IT
This will still not resolve the monitoring 
data difference from the providers.
Finally, many big data tools are focused 
on human behavior and consumer data. 
The tool vendors will have to expand
their products to handle the real-time fast 
response requirements of the network staff at the enterprise.

Conclusion
In Big Data: A Tool, Not an Answer, I wrote, 
“Big Data is nothing unless the data is 
properly digested, correlated, matched, and 
transformed across systems. A problem
for the [networking] staff in charge of Big 
Data is that most of the collecting systems 
are not connected--nor are they designed 
to be connected. It appears that analyzing 
collected data will require training, 
experience, new system connections, and a 
lot of feedback to see if the right data was 
collected and if the right questions were 
asked.”
The end results of analyzing the 
monitoring data will be useless and possibly 
dangerous to the health of the network and 
therefore detrimental to the enterprise.
An extensive list of various types on 
monitoring tools has been created at the 
Stanford Linear Accelerator Center http:// 
www.slac.stanford.edu/xorg/nmtf/nmtf-tools. 
html#intro
Ed Note: the original piece has several 
links not reproduced herein. See online 
version at tinyurl.com/on6sj8z for access to 
all links. n

Cisco
©
TRIBUNE

THE INDEPENDENT REPORT ON THE CISCO TELEPHONY MARKET
www.ciscotribune.com


is a production of



SUBSCRIPTIONS

Or change address, unsubscribe 
Call: 800 667-8965 •
Fax 360 260-9726
Web: www.ciscotribune.com 
Email: publisher@usernews.com
ADVERTISING

Call: 360 260-9708 •
Toll Free: 800 667-8965

Fax: 360 260-9726
Email: publisher@usernews.com







p1-8_2ndQtr_Cisco_Tribune_2015.indd 10
04/06/2015 10:34
   8   9   10   11   12