Lean NFV Ops at IIT Real Time Comms 2015.


IIT RTC Conference and Expo is a globally recognized collaborative event, where industry and academia connect. Leveraging its unique academic setting, this annual conference brings together technical professionals and business executives from the data and telecommunications industry, standards bodies, policy and regulatory institutions, and academic educators and researchers to promote an open exchange of ideas to lead future development in the rapidly changing field of real-time communications.”IIT Real Time Communications. October 6-8, IIT Hermann Hall, 3241 South Federal, Chicago, IL 60616. Registration.

TADHack-mini Chicago will run just before the Illinois Institute of Technology’s Real Time Communications (IIT RTC) Conference. The Hackathon will focus on IoT (Internet of Things), next generation emergency services (NG911), Telecom APIs, WebRTC, identity / federation, and speech / video processing.”TADHack. October 3-4. Registration.


image

Illinois Tech’s Real Time Comms has become a not-to-miss technical event for the past 10 years. Our team is glad to be back as platinum sponsors jointly with AT&T, T-Mobile, Comcast, Cisco’s Tropo and the International Multimedia Teleconferencing Consortium, IMTC. Here are the abstracts for our two talks on Lean NFV Ops:


“Communication Networks Reloaded – Ted East, VP of CTO NFV & Cloud Innovation Center. See and experience key emerging technologies converging to deliver Software Defined Networking (SDN) and Network Functions Virtualization (NFV) in innovative ways that clearly outpace and disrupt today’s communication networks. This tech talk addresses sophisticated concepts in an interactive and fast paced demonstration where services are subjected to a number of configuration changes in real time, including deployment, scaling and failures. Note that this is not a Proof of Concept (PoC) project but rather a state of the art demonstration integrating commercial and open source solutions. Look for the presentation on “Lean NFV Ops” that complements this session at IIT Real Time Communications 2015.”

“Lean NFV Ops – Jose de Francisco, Director of Cloud Solutions Marketing. Lean Network Functions Virtualization Operations is a practice delivering nimble communication systems that remain lean and agile at any scale. Lean NFV Ops addresses a pressing need for enabling what can otherwise become elusive dynamic services impacted by sprawling silos, bloated architectures and disjointed development creep. This presentation introduces Lean’s quality management principles defined at the intersection of service level effectiveness and highly efficient asset utilization. We will discuss maturity and technology readiness as well as RAS (Reliability, Availability, Serviceability) in the context of software defined communication systems. Look for “Communication Networks Reloaded,” a related tech talk and demonstration on this conference’s agenda.”


The above two are part of a set of a total of six tech talks by the Alcatel-Lucent team:


“IMS, WebRTC, and 3D: The r/evolution continues progressing …Anne Lee, Bell Labs Fellow, Corporate CTO Group. The deployment of IMS around the world is now well underway. Telcos are moving forward with IMS for VoLTE. And while the industry begins to define 5G, 4G provides the impetus to transform the PSTN and PLMN to All-IP. It is with an IP base, that new innovations in communications become possible. This includes extending communications with WebRTC into many devices, into many apps while also making the addition of context inherent. Next comes the integration of 3D leading to a fully immersive experience through the combination of IMS, WebRTC, and 3D cameras. This presentation will discuss making this next step possible. Note that the speaker may be giving the presentation immersively via IMS + WebRTC + 3D.”

“Cognitive Security: Security Analytics and Autonomics for Virtualized NetworksLalita Jagadeesan, Bell Labs. Virtualized networks offer the potential to dynamically reconfigure themselves in real-time. Coupled with automated real-time analytics, these capabilities can be leveraged to enable such networks to automatically detect security threats in real-time, dynamically reconfigure themselves to protect against these threats, and automatically immunize themselves against evolving threats. We present an approach that combines real-time analytics with autonomics — using anomaly detection to identify potential security threats, in combination with autonomics to enable dynamic network reconfigurations to mitigate against these threats. A key challenge is to distinguish “good anomalies” arising from legitimate increases in network traffic, for example due to natural disasters, flash mobs, or other unexpected events, from “bad anomalies” arising from potential security attacks, as the autonomic actions may widely vary: e.g., dynamic increase of network resources for increases in legitimate traffic, instantiation of virtual security functions in the face of security attacks. We present a combination of machine learning based detection with temporal logic based analysis that provides a foundation for distinguishing these anomalies and enabling dynamic network autonomics in response. We illustrate our approach through a case study on distributed denial of service attacks on SIP-based virtualized networks.”

“Anomaly detection in wireless networks — Exploratory analysis using Self-Organizing MapsVeena B. Mendiratta, Technical Leader, Network Reliability and Analytics. Communications traffic on wireless networks generates large volumes of metadata on a continuous basis across the various servers involved in the communication session. The networks are engineered for high reliability and hence, the data from these networks is predominantly normal with a small proportion being anomalous. From an operations perspective, however, it is important to detect these anomalies when they occur to correct any vulnerabilities in the network. The objective of our work is anomaly detection in communication networks to improve network performance and reliability. In this presentation we explore the use of neural network based Kohonen Self Organizing Maps (SOM) applied to Per Call Measurement Data (PCMD) records from a 4G network for data analysis and anomaly detection.”

“A characterization of short-video and distributed hot-spot activity in InstagramVijay Gurbani, Distinguished Member of Technical Staff, Bell Labs. Social networks like Instagram and Vine encourage the generation and consumption of user generated content (UGC) on a large scale. In this paper, we perform crawl the Instagram social network in two waves. First, we seek to characterize the composition of short-video streams on the Instagram network in terms of audio/video codecs used, file sizes, ratio of images to videos in Instagram and playout times among other features. Two, we further study the use of Instagram in five diverse geographic locations, or “hot-spots”: Trafalgar Square and Piccadilly Circus in London, UK; Tour Eiffel in Paris, France; Statue of Liberty in New York, USA; and World War II Memorial in Washington D.C., USA. In this crawl, we focus on user characteristics across the hot-spots: How many users are active in the hot-spots? What is the inter-arrival rate of upload requests per user at the hot- spots? What is the composition of media objects? Overall, we seek to determine commonality among the user population at these hot-spots and emergent signs of synchronicity across time zones where the hot-spots are located.”


Unfortunately, I will only be able to be there on the first day due to business travel. I would like to take this chance to thank Carol Davids, Conference Chair, Warren Bent, Content Coordinator, Tom Costello, Public Relations, and Alan Johnston whom I have the pleasure to co-chair the track on WebRTC and Cloud Communications with. Given my limited availability, there is a need for publicly acknowledging Warren’s tireless dedication and Alan’s support. Last but not least I would also like to credit Alcatel-Lucent’s Ed Elkin and Karyn Homer’s sponsorship management.


image

Photo Album: IIT Real Time Comms 2014


One comment

  1. Pingback: New Lean NFV Ops Webinar on Chanel123: “Applying LEAN Principles to NFV” | innovarista

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s