32
James Haensly James Haensly Chief Technology Officer Chief Technology Officer Avaya Asia Pacific Avaya Asia Pacific From Here to There: From Here to There: Multi-modal, Converged Multi-modal, Converged Communications Trends & Communications Trends & Strategies Strategies

James Haensly Chief Technology Officer Avaya Asia Pacific From Here to There: Multi-modal, Converged Communications Trends & Strategies

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

James HaenslyJames HaenslyChief Technology OfficerChief Technology Officer

Avaya Asia PacificAvaya Asia Pacific

From Here to There:From Here to There:Multi-modal, Converged Multi-modal, Converged Communications Trends & StrategiesCommunications Trends & Strategies

Business & Institution Needs Create Increasing Business & Institution Needs Create Increasing Demands for CommunicationsDemands for Communications

Any device, Any device, any process, any networkany process, any network

Enterprises & Institutions Enterprises & Institutions becoming virtual becoming virtual • Globally distributed value Globally distributed value

chainschains• Collaborating communitiesCollaborating communities• Interconnected processesInterconnected processes• Security & reliabilitySecurity & reliability

Demand for performanceDemand for performance• RevenueRevenue

• ProductivityProductivity

• ProfitabilityProfitability

Revenue

Cost

Traditional

• Separate voice and data networks

• Emerging IP phones

The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications

BestEfforts

IP Telephony

Real-TimeReliable

TrafficMgmt

IP QoS

Stand-alone

Traditional

• Separate voice and data networks

• Emerging IP phones

Converged Networks

• Integrated voice-data applications

• IP as universal infrastructure

• SIP evaluation by carriers and enterprises

The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications

BestEfforts

IP Telephony

Real-TimeReliable

TrafficMgmt

IP QoS

VirtualStand-alone

Traditional

• Separate voice and data networks

• Emerging IP phones

Converged Communications

• Rich multimodal user experience

• Dynamic application creation using Comm. Services

• Built on Converged Networks

Converged Networks

• Integrated voice-data applications

• IP as universal infrastructure

• SIP evaluation by carriers and enterprises

The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications The Three Phase Evolution to The Three Phase Evolution to Converged CommunicationsConverged Communications

BestEfforts

IP Telephony

Real-TimeReliable

TrafficMgmt

IP QoS

VirtualStand-alone EcoSystem

ManagementManagement

Sec

uri

tyS

ecu

rity

Dir

ecto

ries

Dir

ecto

ries

Su

pp

ort

an

d S

ervi

ces

Su

pp

ort

an

d S

ervi

ces

InfrastructureInfrastructure

NetworkNetworkServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Comm EnabledComm EnabledPortalPortal

Communication ModelCommunication Model

QoS Policy RegistrationSIP User Provisioning

QoS Policy RegistrationSIP User Provisioning

CRM SCM ERM Presence Telephony

CRM SCM ERM Presence Telephony

xUI Access ControlPresentation Server

xUI Access ControlPresentation Server

SAN Servers WirelessRouters Gb Switches

SAN Servers WirelessRouters Gb Switches

Interactions: Natural,

Multi-Modal

Plug & Play transmission

Transport: QoS-enabled IP

From stand-alone to federated apps

TrendsTrends

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Communication Model and TrendsCommunication Model and Trends

InfrastructureInfrastructure

Network Network ServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Comm Enabled Comm Enabled PortalPortal

Management:HeterogeneityManagement:Heterogeneity

Security: Securing distributed

open systems

Security: Securing distributed

open systems

Directories:Fundamental to management,security & apps

Directories:Fundamental to management,security & apps

From stand-alone to federated apps

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices

ManagementManagement

Security End-to-end technologies &processes

Security End-to-end technologies &processes

DirectoriesDirectories

QoS-Enabled IP

Communication-Enabled Federated

Apps

InfrastructureInfrastructure

Network Network ServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Natural InterfacesComm Enabled Comm Enabled

PortalPortal

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices

ManagementManagement

Security End-to-end technologies &processes

Security End-to-end technologies &processes

DirectoriesDirectories

QoS-Enabled IP

Communication-Enabled Federated

Apps

InfrastructureInfrastructure

Network Network ServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Natural Interfaces

Comm Enabled Comm Enabled PortalPortal

Natural Interfaces are Multi-ModalNatural Interfaces are Multi-Modal

The most natural communication mediacan be voice, text, image, annotation . . .

(or a combination of these)depending on the interaction and device(s) available

• A shared space involving pen, sound and document allowing multi-modal collaboration and real time communications

• Annotation saved, sent, and retrieved as ink data

Handheld PDA sending directions

Another Handheld PDAreceiving directions

PacketNetwor

kMANLANwi-fi

• Example:Example: Voice request results in Voice request results in a multimedia response on a WAP a multimedia response on a WAP clientclient

WAP Gateway

WAP Gateway

Mobile Client

Mobile Client

WML Content Generator

WML Content Generator

Push Initiator

Push Initiator

Push Proxy Gateway

Push Proxy Gateway

HTTP (Request/Content)WAP (Request/Content)

OTA (SI) PAP (SI)

Internet/IntranetWireless Network

HTTP

Dialog SystemsVoiceXMLASR/TTS

Etc.

Dialog SystemsVoiceXMLASR/TTS

Etc.

Work FlowVoice

Fax

Document

E-Mail

Web

Multimedia Integration PlatformMultimedia Integration Platform

Integrates Multimedia Technologiesenabling rapid communication application development

MTIP

• In-progressIn-progress• Tight integration with web Tight integration with web

servicesservices• Multi-modal interactionsMulti-modal interactions

Increasing Sophistication of Natural Interfaces Increasing Sophistication of Natural Interfaces

Dial the extension X 2002 (non-speech; DTMF)

Speak the extension two-zero-zero-two (ASR)

Speak the name “Operator” “Reservations” (ASR)

Speak the purpose “Please connect me to room service” (NLCR)

Request service via email “Please tell me when my shipment will arrive”

Inquire in natural language “What is my current balance?” (NLU)

Classify spoken or written text “Customer query about billing cycle”

Summarize typed document “ABC Corp reports quarterly progress”

Extract audio-visual information Here is today’s weather report

Extract & summarize multimedia information

Recap news events of the day

Summarize web page Show this on my PDA

Conversion Gisting Understanding

Evolution ofspeech and languageapplications

Natural Interfaces – Technology ChallengesNatural Interfaces – Technology Challenges

Multi-Modal ChallengesMulti-Modal Challenges Mismatch between communication capabilities of sender and Mismatch between communication capabilities of sender and

receiver receiver Managing simultaneous input streams from more than one Managing simultaneous input streams from more than one

modality into a single communication event modality into a single communication event Associating annotations with documentsAssociating annotations with documents

• Understanding, storing and rendering device dependent annotations Understanding, storing and rendering device dependent annotations in a device independent mannerin a device independent manner

• Mapping annotations at a logical rather than presentation levelMapping annotations at a logical rather than presentation level

Natural Language ChallengesNatural Language Challenges Broadening understandingBroadening understanding

Continued advances in speech generation and dialog systemsContinued advances in speech generation and dialog systems

Intelligent dialog between human and machine is the ultimate Intelligent dialog between human and machine is the ultimate

challenge for computing machine challenge for computing machine

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Disruptive Technologies Radically Redefine Disruptive Technologies Radically Redefine Business PracticesBusiness Practices

ManagementManagement

Security End-to-end technologies &processes

Security End-to-end technologies &processes

DirectoriesDirectories

QoS-Enabled IP

Communication-Enabled Federated

Apps

InfrastructureInfrastructure

Network Network ServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Natural InterfacesComm Enabled Comm Enabled

PortalPortal

SIP is to Real-Time People-to-People Communications what HTTP was to Information Exchange on the World Wide Web.

Phones

PBX

Telephony Apps (Voice Mail, CTI, Call Center…)

SIP User AgentsIP Network

SIP Servers and SIP-Enabled Communication Apps

• Enables rapid creation of communication-enabled enterprise applications from standardized components

• Supports multi-modal communications and devices

• Changes the focus from mode to user by equalizing real-time and near-real-time communications into a session

• Standardized personal address means there’s one way to “place the call” regardless of device being used by recipient

• Services-based environment accommodates both peer-to-peer and client-server apps

Converged Communication TopologyConverged Communication Topology

Key technologies• SIP: Session Initiation Protocol provides simple signaling for

session setup and control• Web Services: Protocols for data and application interoperability• Presence: Find “the Right person, in the Right place at the Right

time in the Right way”• Peer-to-Peer: Putting users in direct control of communications

sessions and capabilities

Existing apps

SIPendpoint

Existingendpoint

TelephonyApp ServerTelephonyApp Server

SIP endpoint

SIPendpoint

Communication App Server

Communication App Server

Existingcomm server

Application Services

IPendpoint

PresenceServer

PresenceServer

ContextServer

ContextServer

ServiceRegistryServiceRegistry

Session Services

eBusinessApp ServereBusinessApp Server

Converged Communications Applications - Converged Communications Applications - ChallengesChallenges

Process changesProcess changes• Business process managementBusiness process management

• Programmer & operations staff trainingProgrammer & operations staff training

Integration with existing applicationsIntegration with existing applications• Integration with legacy systems & architecturesIntegration with legacy systems & architectures

• Interoperable information modelsInteroperable information models

Standardization and conformanceStandardization and conformance• Web services standards are still evolvingWeb services standards are still evolving

• Interoperability between .NET and J2EE environments and Interoperability between .NET and J2EE environments and applicationsapplications

Other Technology dependenciesOther Technology dependencies• User and application level security & managementUser and application level security & management

• Integrated enterprise-wide directoriesIntegrated enterprise-wide directories

An Example: Unified Communication SolutionsAn Example: Unified Communication SolutionsGreater Speed, Quality and MobilityGreater Speed, Quality and Mobility

Integrated access to directory anddatabases

Near and Non real- time integrated voice, email, fax and video

Personal Efficiency Management

Individually customizable

communication rules

Real-time “any media” conferencing and collaboration

Contact & InformationManagement

Calling & Conferencing Management

WEB, WIRELESS & SPEECH ACCESS

Message Management

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices

ManagementManagement

Security End-to-end technologies &processes

Security End-to-end technologies &processes

DirectoriesDirectories

Communication-Enabled Federated

Apps

InfrastructureInfrastructure

Business Apps Business Apps & Comm Services& Comm Services

Natural InterfacesComm Enabled Comm Enabled

PortalPortal

QoS-Enabled IP Network Network ServicesServices

QoS Goals are at the Application Level;QoS Goals are at the Application Level;Managed at all LevelsManaged at all Levels

Any solution should be able to monitor and control a variety of network elements and applications

QoS = Performance: Response time; Delay; Jitter; Loss etc.

+ Reliability: Availability(99.999%); Data/Transaction Integrity etc.

QoS Management Server

NetworkNetworkServicesServices

Business Apps Business Apps & Comm Services& Comm Services

QoSGoals

• Specify per-user/application-level QoS goalsSpecify per-user/application-level QoS goals

• Measure QoS conformanceMeasure QoS conformance

• (Re)Configure network and servers to achieve QoS goals(Re)Configure network and servers to achieve QoS goals

Control/Signals

Status/Events

QoS Performance StrategiesQoS Performance Strategies

NetworkNetworkServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Over-provision• More powerful CPUs • High Performance components,

e.g. OS, Database etc.Load balancing

Over-provision• Fatter pipes

Priority managed

• Traffic managers • Network assessments for

various services including voice• DiffServ, RSVP, MPLS

Application Aware Routing• Using Application Knowledge

for session establishment

QoS Reliability StrategiesQoS Reliability Strategies

NetworkNetworkServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Prevention• Monitoring and rejuvenation• Hardened OSRecovery• Failure detection and fail-over• Hardware redundancyData Integrity• In-memory data checkpointing• Persistent data replication

Path Redundancy• Spanning tree protocols in

switches for LANs and MANs• MPLS dynamic reconfigurationRecovery • Expert systems detect/repair

network level faultsHardened network elements

QoS-enabled Networks - ChallengesQoS-enabled Networks - Challenges

Network readinessNetwork readiness• Configure to support desired QoSConfigure to support desired QoS• Provide desired bandwidth, delay, jitter, loss, etc.Provide desired bandwidth, delay, jitter, loss, etc.

Business policies around QoSBusiness policies around QoS• Determining QoS goals and granularity (per flow type, per Determining QoS goals and granularity (per flow type, per

application, per user, etc.)application, per user, etc.)• Mapping goals to network/application mechanismsMapping goals to network/application mechanisms

Dynamic conditionsDynamic conditions• Load, applications, network conditions and usersLoad, applications, network conditions and users• Correctness of network data in face of constant changeCorrectness of network data in face of constant change

HeterogeneityHeterogeneity • Non-uniform implementation of QoS mechanisms across Non-uniform implementation of QoS mechanisms across

vendors, domains, systems and layersvendors, domains, systems and layers• Bandwidth in different segmentsBandwidth in different segments• Common management schema/standardsCommon management schema/standards

Su

pp

ort

an

d S

erv

ice

sS

up

po

rt a

nd

Se

rvic

es

Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices

ManagementManagement

Security End-to-end technologies &processes

Security End-to-end technologies &processes

DirectoriesDirectories

QoS-Enabled IP

Communication-Enabled Federated

Apps

InfrastructureInfrastructure

Network Network ServicesServices

Business Apps Business Apps & Comm Services& Comm Services

Natural InterfacesComm Enabled Comm Enabled

PortalPortal

0

10000

20000

30000

40000

50000

60000

1988 1991 1994 1997 2000

CERT Security Reports 1988 - 2001

incident count

Security is Increasingly ImportantSecurity is Increasingly Important

* Global Information Security Survey (InformationWeek and Price Waterhouse Coopers)

Data from Carnegie Mellon Computer Emergency Response Team

Attacks increasing• Data & service theft • Spoofing• Denial of Service• Viruses & Vandalism• EavesdroppingAttacks exist at every level• Terminals, LAN, Switches, Network,

Servers, ApplicationsAttack sophistication increasing• Toolkits• Coordinated, distributed attacksWireless & Mobility issues• Wireless protocols less secure• Mobile devices lack physical security

• 150 to 200 new viruses per month

• 60-70% of security breaches are internal

• Viruses and hacking cost $266 billion in US last year*

Extended Perimeter

Perimeter

Firewalls

Firewalls

Control Domain

VPN

OS, applications, data

Resource DomainIdentity and

Access Mgmt

SecurityManagement

Security policies and procedures beyond the physical perimeter ofthe enterprise: remote workers, B2B partners & suppliers, extranets etc.

Network level controlsto filter traffic and manage access;Encryption

Security monitoring;Enterprise-wide Authentication; &Data protection

Application level access, authentication& authorization;Data Protection &Encryption

Layered Trust BoundariesLayered Trust Boundaries

Source: The Burton Group

Security MechanismsSecurity Mechanisms

PreventionAnticipate and prevent attacks

• e.g., authentication, firewalls, filters, VPNs, encryption

RedundancyProvide spare capacity ready for deployment

• e.g., backups, alternative sites

RecoveryTake corrective action to restore service

• e.g., define & test recovery procedures

ValidationValidate desired properties by modeling, simulation or testing

• e.g., digital signatures, network discovery, penetration testing

DetectionDetect and predict what-when-where of attacks

• e.g., intrusion detection, monitoring & alerts

Selected prevention techniquesSelected prevention techniques

Media• Encrypt voice so sniffers hear only white noise

Session• Session level encryption with private key administration• Link encryption for key distribution

Server• Eliminate common attacks by disabling un-needed services; e.g.

NFS, X-windows, rexec, …• Protect network servers against viruses by eliminating incoming

e-mail, web browsers, shared drives Network

• Filter packets based on addresses, port numbers• Defend against denial-of-service attacks by discarding suspicious

packets Administration

• Set, communicate, and enforce security policies• Make it convenient: if it’s too hard, it’ll be circumvented

Securing Converged Networks and Applications – Securing Converged Networks and Applications – ChallengesChallenges

Keeping currentKeeping current• New forms of attacksNew forms of attacks• Attacks increasing: data and service theft; spoofing; denial of Attacks increasing: data and service theft; spoofing; denial of

service; viruses and vandalism; eavesdroppingservice; viruses and vandalism; eavesdropping• Security patches from vendorsSecurity patches from vendors

User and operations staff education and trainingUser and operations staff education and training• Security awarenessSecurity awareness• Following good security practices: strong passwords, regular Following good security practices: strong passwords, regular

virus checker updates etc.virus checker updates etc.• Security intrusion detection and response processesSecurity intrusion detection and response processes

Incorporating secure programming practicesIncorporating secure programming practices• By vendorsBy vendors• By in-house programming staffBy in-house programming staff

ManagementManagementManagementManagement

Sec

uri

tyS

ecu

rity

Sec

uri

tyS

ecu

rity

Dir

ecto

ries

Dir

ecto

ries

Dir

ecto

ries

Dir

ecto

ries

Su

pp

ort

an

d S

ervi

ces

Su

pp

ort

an

d S

ervi

ces

Infrastructure

Network Services

Business Apps & Comm Services

Comm Enabled Portal

End-to-end Security

QoS-Enabled IP

Communication-Enabled Federated

Apps

Disruptive Technologies

Disruptive Technologies

Disruptive Technologies Redefine Business Disruptive Technologies Redefine Business PracticesPractices

Natural Interfaces

www.avaya.com