Upload
irma-waters
View
225
Download
0
Embed Size (px)
Citation preview
The Power of Technology to Transform the Future
Opportunities & Challenges for Next-Decade Services
Dr. Hossein Eslambolchi
Outline
2
Top 10 Services/Technology Trends
Cyber & IoT Security
What Is Next?
3
Services Of The Future1. Doctors Inside You…........Predicting & Preventing heart attack
2. Tele Immersion……………...Shared presence via simulated environment
3. Self Driving Cars…………….Driverless Uber
4. Ambient Intelligence Services ..Manage our lives effortlessly via IOT
5. Smart Car/Building/City…Detecting population concerns
6. Privacy Services……………..I am Cloaked
7. Super & Personal Clouds..Always-on, your content
8. Nano Bot Shot……………….No more virus shots
9. Financial Planner…………..I made you money today
10. Personal Assistant………..My trusted computer assistant
The Power of Technology to Transform the Future
4
1. Fully Distributed(IP/MPLS/Enet)
for the Sextuple PlayPhotonic – Automated - AAN
6. E-Collaboration& Mobility & M2M, IOT Dominate
the Workplace
2. Wireless AccessWill be Common @1Tbps
3. SecurityMassively
Critical
8. Apps / NLU / ASR Convergence -
(SIP, XML, VXML, HTML5, WebRTC)5. Remote
Intelligence/SensorsEverywhere (M2M, IOT)
4. Wired/WLAN/MobilityPersonal Device Convergence
Wi-Fi/Li-Fi Off-Load
7. Business Analytics =E-Apps + Knowledge Mining + Big Data
9. Open SourceComponents at the
Network Edge
10. DynamicNetwork
Computing/StorageCloud Computing
(SDN-NFV-OF-OAPI)
Top Ten Technology Trends
Massive Implication for the Networks of CSPs
Pervasive Content = Bandwidth Crunch
Global Mobile Network Data Traffic
20,000
2008 2009 2010 2011 2012 2013 2014
18,000
16,000
14,000
12,000
10,000
8,000
6,000
4,000
2,000
0
Web/Internet
VoIP
Video Streaming/TV
P2P
Audio Streaming
Peta
byte
ss
20 xBandwidth
Gap
LTE offers only~3x-5x improvement
Mobile Data Demand is Exploding Due to Pervasive Content, Leading to a Looming Wireless Bandwidth Gap
5
Solving the Bandwidth CrunchInvent spectrum-multiplying solutions that enable optimal data usage and a richer multimedia experience
Bigger Pipes
More Pipes
Better Pipes
Push Shannon’s Limit - More Bps/Hz
(5 – 10X)
Maximize throughput at cell
edge, uniform coverage, Smart Cell
Compression (3-5X), caching, local content routing,
streaming UHDTV media (1/2 Cost and Opex), mobility
Inventions for efficient bandwidth utilization across Tier 1 networks
6
Maximize ThroughputBigger Pipes
More Efficient Data Handling
Better Pipes
Connectivity and Mobility
More Pipes
Core Solutions That Support Increased Data Usage & A Richer Multimedia Experience
LTE
Collaborative Communications
Compression
Untapped Spectrum
LTE-A/5-6G
Local Content Routing
Femto / WiFi/LiFi
Cognitive Spectrum
Management
Connectivity Challenges For “The Services of The Future”
7
M2M/IOT
Cloud: Global ImpactVirtualization – Servers, Storage and Networks
8
Social, Political and Financial Considerations
From Physical Infrastructure To Virtual
Apps & Workload
Data Center EvolutionVirtualize Consolidate Integrate Automate Federate
Data Center Consolidation For Lower
Cost & Complexity
Deeper Integration
with Business Processes / OSS / BSS
Data Center Management Automation
And Orchestration
Optimal Combination of Private & Public Cloud
Resources
PrivateData Center
PublicCloud
PrivateCloud
PrivateData Center
(Self-Hosted) (Service Provider-Hosted)
Apps & VMs
Compute Network Storage
From Physical Silo’s To Network-Based IT-As-A-Service &Anything-As-A-Service (XaaS) Compounded with Big Data
9
SDN –NFV
9
IoT Fog
Outline
10
Trends: Data, Services & Networks
Cyber & IoT Security
What Is Next?
Threat Velocities are Sophisticated
33%
24%
15%
28%
Espionage Targets
Manufacturing Professional
Transportation Other
75%
25%
Attack Motivation
Financial Espionage
24%
31%17%
21%
7%1%
Attack Methods
Malware Hacking Social (pf) Physical
Misuse
o Nearly 70% of attacks were discovered by external parties o 700% increase in mobile malware on smart phoneso 66% of breaches were discovered months after the attack (156 day avg)
Security Is Broken Across Enterprise & SPs11
ClientEnterprise
Data CentersPrivate &
Hybrid Clouds
ClientEnterprise
Network “Intelligence and Analytics
Edge Edge
Continuous Machine Learning Smart Packet Inspection Behavioral Big Data Analytics Integration with legacy systems Visualization
IP Network Core
3rd Party Network
Behavioral AnalyticsAutomated Forensics
Core visibilityBYOD & Mobility
Security built into the network core,
protecting customerFrom inside -> out
ClientEnterprise
ClientEnterprise
Current State of Industry “Distributed Enterprise Edge Security”
Edge Edge
Security Investment at Edge IDS, Firewalls, Anti-Virus, Anti-SPAM
Deployed by Customer Inefficient, Expensive, Non-Holistic Legacy SIEM, Log Management
3rd Party Network
Attacks enter into the core of the network and no longer through the perimeter Causing Broken Security Model within Enterprise
Security shifted from Perimeter to Network
IP Network EdgeVPN, Firewall, IDS,
Anti-Virus, Etc.
12
Once inside a Threat Actor must move Lateral
Behavioural Analytics will Become Golden Thread For Cyber Security Detection in 21st Century 13
Internet
WAN
Unified Network Security Policy
Console
LAN
Network Edge
WirelessLAN
Network Core
DataCenter
RemoteOffices andBranches
Virtual Machines
•Blocks threats attacking
applications and op
Firewall, IPS, IDS, Anti Vius
14
EventsLogs
Correlation
Network
Security Analytics
Security Framework:• SIEM/Splunk• Firewall• End Point Protection• Security Anomalytics - 10%
90%
Anomaly Detection
Proactive Incident
Response
Remediation
Post-Threat Assessment
Modify Controls for
Security Posture
Threat Detection
Greater Risk Visibility
Lower Detection Times
Perimeter + Core Monitoring
End-to-End Security
New “Anomaly Detection” compliance requirement for Financial Services
How do we stay ahead of the bad guys?
}
15
16
Hyper-Converged Data-centers
with Fog computing
Securing Smart Cities
Analytics Engines to
Process IoT Data and IoT Security
Securing BYOD
Securing IoT
Devices
Securing Smart
Buildings
How to Secure and Manage the Ever Growing IoT?
Securing Smart
Factories Securing Smart
Electric Grids
Outline
17
Trends: Data, Services & Networks
Cyber & IoT Security
What Is Next?
NetworksNetworks
WirelessWireless
Devices Devices
Content /Applications
Content /Applications
o Biometric
o Autonomous networks
o Rich Media Search
o RFID
o Wireless VoIP
o Interactive Video
o Distributed networks
o Storage visualization
o Application aware networks
o eCollaboration
o 3-D Printing
o Fuel Cellso 1TB Mobile
Storageo Thumb Print
Scanner
o Nano Bot Shot
o Hybrid cloud services
o Speech to Speech Translation
o Cognitive Radio
o Wearable networks
o On-demand reconfig. networks
o Nano Computers
o Agricultural robot
o Exabyte backbone
o Tele- immersion2030 2025
2025
2020
2020
2015
2015202520202015
2025
2020
2015
o Affordable Green Energy
o End of Bcast TV
o 100 Gbps consumer BB
o 100 to 1 Wireless vs. Wireline End Points
o SDN dominates
o Common Robotics
o 7G 10 Gbps
o Big DataEverywhere
o Ambient Intelligence solutions
What Is Next?
18
o Doctor inside U
o Privacy services
o Self driving car
o Cognitive financial planner
o Cognitive SMEs
o Cognitive personal assistant
o 3D Display
o Holographic Display
o Virtual retinal display
o Cognitive computing
o IoT Sensorso Smart Sensors
o Robot vision
o NLU / NLP
o Location based services
o 1 Gbps consumer BB
o Computer generated imagery
o Digital scent
o 100Gbps last mile everywhere
o Cloaked network
o Quantum cryptography
o NFV o Cognitive networks
o Personal device convergence
o Autonomous UI
o 256 GB SSD
o LTE-a 50 Mbps
o 5G 500 Mbps
o 6G 1+ Gbps
o Yottabyte DC
o 10 Gbps consumer BB
o Ultra Hi Def TV- 4Ko Super Hi Def TV- 8K
o WiFi OffLoad
o Mobile video w/ QoS
o Drone Domination
o Last wireline phone retired
o Netflix on steroid
o RT/On-demand sport streaming
Dr. Eslambolchi - 2020 Venture Partners, 2015
o IPV6o 8K Broadcasting
The Power of Technology to Transform the Future
Opportunities & Challenges for Next-Decade Services
Dr. Hossein Eslambolchi