11. Nectar Monitoring
-
Upload
sureshkumar-singampallik -
Category
Documents
-
view
295 -
download
5
Transcript of 11. Nectar Monitoring
-
8/10/2019 11. Nectar Monitoring
1/35
-
8/10/2019 11. Nectar Monitoring
2/35
Todays Network Management Challenges
Networks are convergingCodependent systems rely on the same IP network
Can lead to finger-pointing during outages or eventsThe expertise required to fulfill a full-service IT staff is growing
More sophisticated and more diverse, cross-disciplineVoice, data, security, video, applications, handhelds, etc.
IT teams are understaffed and/or under-budgetedAs businesses expand and function 24x7
Tools that supported single use networks are outdatedConvergence requires deep and wide, cross-discipline functionalityMost management frameworks never make it to productionLack of available tools was the genesis for Nectar/CMP
Costs can be reduced via remote service bureaus
www.nectarcorp.com Confidential 2
-
8/10/2019 11. Nectar Monitoring
3/35
Nectar CMP is Different
Most management tools support silos of the infrastructureComplex relationships exist between apps & supporting networke.g. data network to VoIP assets, or applications and servers
Business level reporting packages are often expensiveSoftware frameworks for management are expensive
X to urchase1.52X to deploy
Nectar CMP is offered as an OpEx (SaaS) or CapEx serviceCMP provides a single view into both voice & data networksCMP correlates network issues with real business processesCMP reduces problem-resolution timeframesCMP reduces the burden on internal staff
www.nectarcorp.com Confidential 3
-
8/10/2019 11. Nectar Monitoring
4/35
Four Pillars of Nectar CMP
1. System Health & AvailabilitySingle view into both Voice & Data assetsRoot Cause Analysis
Dependency Trees, Contextual Monitoring360-degree view, Tier-1 and Tier-2 troubleshooting at-a-glance
2. Performance/Resource UtilizationCapacity Monitoring and Trending
3. Voice Quality (RTCP) MetricsTrace route & IP Network VisibilityAutomated Category (user community) creationEnhanced CDR linkage
4. Troubleshooting ToolsRemote Application Proxy, Connection BrokerSaved List Trace, File Transfer, Secure Chat
www.nectarcorp.com Confidential 4
-
8/10/2019 11. Nectar Monitoring
5/35
Key Features of Nectar CMP
Vendor Knowledge Modules & Information PacksAdjunct Application & Infrastructure support
ACM, System/Session Manager, Mod Mess, CMS, AES, Verint. . .Routing/Switching, Servers. . .
Auto-discovery and deployment WizardsMedia gateway registration table & default gateway ping
SNMP MIB import, CLI/Web access, Custom Dependency TreeFull Avaya Communication Manager Inventory
Hardware and Firmware versionsStandard & Custom Reporting
Scheduled, e-mail delivery
Skills Based Routing of Issues/Alerts (Intelli-Q)Vector-like escorts, queues and escalation policies
www.nectarcorp.com Confidential 5
-
8/10/2019 11. Nectar Monitoring
6/35
CMPs Building Blocks
Components:RIG Remote Intelligence Gateway
Client Site monitoring & reporting appliance
DA Distributed AgentPA Perspective Agent
EIP Enterprise Intelligence Portal
Support Delivery Network(SRSTP Nectar Proprietary Protocol)
Support Delivery Network(SRSTP Nectar Proprietary Protocol)
Help Desk & Support Service
Help Desk & Support Service
n erpr se ggrega on or aCIP Central Intelligence Platform
Service Provider Aggregation Portal
SRSTP Secure Remote Session TransportProtocol
128-bit, AES-Encrypted network protocol
Nervous system of platform that links allcomponents
Patent Pending
www.nectarcorp.com Confidential 6
Client Infrastructure
Client Infrastructure
CIP
CIPEIP, RIGs,DAs & PAs
EIP, RIGs,DAs & PAs
Portals &Dashboards
Portals &Dashboards
-
8/10/2019 11. Nectar Monitoring
7/35
DistributedArchitecture
Publish & Subscribeinformation model
Secure NOC
Highlights
Nectar/CMP Delivery System Overview
Client & Tech Centershare real-time data
On-premise devicemonitoring solution
On-premise real-timedashboards
-
8/10/2019 11. Nectar Monitoring
8/35
-
8/10/2019 11. Nectar Monitoring
9/35
Important Note:
RIG Appliances are ready to deploy wi thmultiple NICs to accommodate clientgated placement within a corporate DMZbetween external access network andinternal management networks.
ACL & FW use by client supported togate interaction with relevant equipmentfor monitoring and management underNOC contract.
Detail: On-Premise Appliance
The RIG is the only device that will communicate with equipment which the NOC is responsible forwithin the client environment
Client can gate/ACL from the RIG Appliance to equipment by IP and Port (well defined in advance ofdeployment based on devices monitored and responsible for by the NOC)
Access logs maintained on the on-premise RIG Appliance
Client access is provided to the RIG Appliance
-
8/10/2019 11. Nectar Monitoring
10/35
SRSTP Protocol Detail
Detail: Communications Protocol whenconnecting to Service Provider CIP
128-bit Encryption in Communications Protocol- end-to-end
Outbound connection only made to designated IPs in our Data Center (regardless of OTI, VPNor Private-Connect methods) and only on designated TCP port:443
Communication is made between on-premise supplied appliance (Remote Intelligence Gateway)and the NOCs Data Center not directly from PBX, Adjuncts or supporting equipment
Alarm data and management traffic (open or Client gated) access only to equipmentresponsible by NOC for monitoring or response/triage management
-
8/10/2019 11. Nectar Monitoring
11/35
Vendor Knowledge Modules (VKM)
Avaya Aura Communication Manager v2.x, 3.x, 4.x, 5.x, 6.0Avaya Aura Session Manager/Avaya Aura System Manager -v5.2, 6.0, 6.1Avaya Call Management System v13.x, 14.x, 15.xAvaya Modular Messaging v3.x, 4.x, 5.xAvaya INTUITY AUDIX v4.0, 5.0, LX2.0 (telnet only)Avaya Voice Portal v5.x
. , .Avaya IP Office v4.x, 5.x, 6.x, 7.xAvaya Business Communication Manager (formerly Nortel BCM) v5.0, 6.0Avaya Communication Server 1000 (formerly as Nortel CS 1000) v6.x, v.xVerint Witness Actionable Solutions NICE Perform eXpress
UPS Module [used to monitor any RFC1628 (UPS-MIB) compliant UPS]
www.nectarcorp.com Confidential 11
-
8/10/2019 11. Nectar Monitoring
12/35
Information Packs
NetApp Poller PackAvaya Interactive Response (product formally known as Nortel IVR) Poller PackOracle Poller PackAutonomy Corp. PLC etalk Qfiniti Call Recording Trap PackOracle Solaris Poller PackVMware Poller Pack
APC Power Distribution UnitCisco Router Poller PackCisco Switch Poller PackDell OpenManageExtreme Networks Poller Pack
Genesys Poller PackJuniper Networks Netscreen VPN Firewall Poller PackJuniper Networks Poller PackNagios Trap Pack
www.nectarcorp.com Confidential 12
-
8/10/2019 11. Nectar Monitoring
13/35
. . .voice, data, video, storage, virtualization, wirelessHost/Server WizardChoose key Linux, Windows, Solaris server metricsChoose required active services, processesDependency Trees automatically created
SNMP Traps/Polls
Extensibility (Can you monitor. . .)
MIB parser/importerSelect important OIDs, define responses & alert levels
Command Line & Web Admin Access for additional dataCreate a 360-Degree View
Add external links, trunks, integrationsUnderlying IP infrastructure
www.nectarcorp.com Confidential
-
8/10/2019 11. Nectar Monitoring
14/35
FEATURES & SCREEN SHOTS
-
8/10/2019 11. Nectar Monitoring
15/35
Enterprise Visibility - Real TimeDashboardsCMP software distributes monitoring, reporting and dashboards throughout global customers
internal network with information and alert routing to appropriate global resources
-
8/10/2019 11. Nectar Monitoring
16/35
Live & Historical Call Details with QualityRatings
Live list View of Active Calls
Detailed view of every call with end-to-end network path beginning from end user phone
Live & Historical Metrics MOS
Round Trip DelayPacket LossJitter
www.nectarcorp.com Confidential 16
-
8/10/2019 11. Nectar Monitoring
17/35
Proactive Network Monitoring viaSynthetic Calls - CMP PerspectiveCMPs Perspective establishes real-time QoS monitoring end-to-end
Key UsesSynthesize transactions to match VoIP traffic patterns in your enterpriseProactive monitoring of end-to-end VoIP/RTP experienceSpot partial WAN outages as they happenEnsure QoS Policy is working with MOS for Synthetic CallsMonitor QoS packet tags end-to-end
www.nectarcorp.com Confidential 17
-
8/10/2019 11. Nectar Monitoring
18/35
-
8/10/2019 11. Nectar Monitoring
19/35
VoIP Experience Reports
Automated reports MOS & VoIPExperienceTop 20 NegativeEndPoints
Com arison of VoIP
Understand end-user & critical resource experience at the Customer Premise
experience by IPnetwork segment
-
8/10/2019 11. Nectar Monitoring
20/35
Performance Trending Reports
Enable capacity planning on critical resources and facilities
Automated reports for:
MOS & VoIP Experience
Trunk Utilization
DSP Usage
www.nectarcorp.com Confidential 20
Registration Usage
Event Reports
Network Region & TDMbus usage
Centralized Gateway &
card inventory
-
8/10/2019 11. Nectar Monitoring
21/35
Real-time Global & Regional InventoryAsset Reporting
Automated reports:
Chassis Card &Firmware Inventory
Gateway Inventory
Cabinet layouts
Enable capacity planning on critical resources and facilities
-
8/10/2019 11. Nectar Monitoring
22/35
Cost Control Data Bandwidth & Trunk GroupUtilization
Switch,Router& FirewallInterfacesBandwidthUtilization
Real time and Historical Capacity and Performance Data for all systems
PRI & TrunkGroups Capacity
Utilization
www.nectarcorp.com Confidential 22
-
8/10/2019 11. Nectar Monitoring
23/35
Forensics - Drilling Down to Find theRoot Problem
Warning Level: Witness Call Recording Service Mapped to Multi-Vendor Technologies
Real-time Monitoringand Business Reportingon Dependency Tree
Recording ServiceElements: Clustered Witness Call Recorders
Avaya Soft phone Registrations PBX Components Database Stores LAN/WAN Infrastructure Data Infrastructure Components
Application Services.
SLA Performance
Measuring is wrappedaround solution
-
8/10/2019 11. Nectar Monitoring
24/35
SLAs Mapping Ready
-
8/10/2019 11. Nectar Monitoring
25/35
Full Event Management & LoggingCapabilities
-
8/10/2019 11. Nectar Monitoring
26/35
EIP SUPPORT SLIDES
-
8/10/2019 11. Nectar Monitoring
27/35
Key Features of Enterprise IntelligencePortal
Centralized Business Process Impact Views &Dashboards, single pane of glassAdvanced aggregate reportingIntelli-Q intelligent alarm routing & escallation
Integrated Chat Collaboration with alarmsharingCentralized Availability & PerformanceMonitoringCentralized Inventory
www.nectarcorp.com Confidential 27
-
8/10/2019 11. Nectar Monitoring
28/35
-
8/10/2019 11. Nectar Monitoring
29/35
Real Time, Synchronized AlarmDistribution
RIG Appliance sendsalarms northEIP and CIP jointlyreceive alarm
-
CustomerIntelli-Q
CustomerIntelli-Q
PartnerIntelli-Q PartnerIntelli-Q
Joint Service DeliveryHelp Desk & Support Services
Joint Service DeliveryHelp Desk & Support Services
processing byintelligence engineRIG alarms clearing
notify both EIP and CIPin real time Customer Premise RigCustomer Premise Rig
PartnerCIP
PartnerCIP
CustomerEIP
CustomerEIP
-
8/10/2019 11. Nectar Monitoring
30/35
Global Alarm and Alert Visibility Intelli-Q
Global Alliance, Regional Partner & Customers
One consistent, real time, coordinated view
www.nectarcorp.com Confidential 30
-
8/10/2019 11. Nectar Monitoring
31/35
Global Alarm Eco Components Intelli-Q
Issue:
An alarm represented by a dependency tree or a performance threshold alert that has beentriggered from a customer premise Remote Intelligence Gateway (RIG). Issue is immediately sentto MSP/Carrier and can be sent to customer NoC simultaneously.
Queue:Issue is routed to a queue on Enterprise (EIP) and MSP/Carrier (CIP). Once placed in a queuepartners and respective NoC engineers are notified by the Intelli-Q module. NoC dashboards showreal time status for each issue, which user is working on issue and how long issue exists.
Importance:An administrator-defined entry which consists of a name, a priority, and foreground andbackground colors. An importance is assigned to each issue in order to prioritize within a Queue.The importance can be assigned automatically based on policy (escort) or assigned manually by auser.
Escort:A policy which defines how Issues are handled at MSP/Carrier CIP. The escort routes an issue to aqueue and can escalate its importance over time. Escorts can move an Issue to difference Queuesbased on policy rules for escalation for additional action.
www.nectarcorp.com Confidential 31
-
8/10/2019 11. Nectar Monitoring
32/35
Intelli-Q enabled Global SLA withreporting
Entitlement
24x7 Policy
Time of Day Alert Level Assigned ? Accepted ? Queue Importance Change Policy
(escort)
www.nectarcorp.com Confidential 32
-
8/10/2019 11. Nectar Monitoring
33/35
IQ Ways to thinkabout it
Escorts are your business advocateSupport Policy
Envision Intelli-Q like and ACD for alarmsEscorts are your vectors
who are the agents
Notifications can be driven byQueue assignment of issue
Specific RIG with alarm level filterGranular Dependency Tree from RIG with alarm levelfilter
-
8/10/2019 11. Nectar Monitoring
34/35
CMP EventFlow
-
8/10/2019 11. Nectar Monitoring
35/35
Nectar Services Corp
CONFIDENTIALITY NOTICE: This Presentation, and any documents, files, or previous e-mail messages attached or associated to it,contains information that i s confidential, proprietary, a nd/or legally privileged. And covered under the Mutual NDA with Nectar ServicesCorp. You are hereby notif ied that any unauthorized re view, use, disclosure, or distribution of this Presentation is strictly prohibited.Disclosing this document, file, or previous e-mail message attached to it to anyone other than the intended recipient may cause thebreaching party to be liable to Nectar Services Corp. for damages. If you have received this presentation in error, please notify:
David Giangano, President of Global ChannelsNectar Services Corp
.Farmingdale, NY 11735(631) 270-1100
If you are not the intended recipient,Delete it from your computer, without saving it in any manner.
Confidential Subject to Non DisclosureCan not Be Copied or Reproduced DocA080111
mailto:[email protected]:[email protected]:[email protected]