Skip to main content

NFV business Case: Highlight the big picture for Telco Operators


A business case of NFV includes by default all the benefits coming up within virtualization.

Virtualization improves  the cost spent on different hardware types by unify infrastructure layer and separates applications and OS layer form hardware layer.

This change have bring a lot of saving  to CAPEX and also to OPEX area.
Today, most of IT applications ,and even mission critical application, are running on top of virtualization platforms. Operators have already started a stage of application migration and database consolidation to run on virtualization environment. A lot of saving was observed from license model, hardware utilization, and no more skills are needed to manage these different kinds of servers and storage systems.

A single type of support contract and process was applied for a common layer of infrastructure and virtualization. Investment for  converged  platforms of back up, security, load balancers,network was  done and prove a good business case .

Automation has proved more the business case of virtualization. When speaking about NFV, we have to know that even virtualizing Telco and network applications on a common infrastructure will bring a lot of saving on CAPEX and OPEX. Consider that not only form a simple Silos virtualized platforms, but also from converged security, storage system, back up, server, management layer, common skills to manage infrastructure, Hardware license, Hardware utilization, converged cooling systems, power consumption, datacenter consolidation.

Of course having these NFV components connecting together and orchestrated by  a common orchestrator will be more cost exciting.

I think, form an operation perspective, virtualizing Telco and Network components, even without automating all the stuff, will improve cost saving at a first stage. Sure, automate all the NFV components across a unique automation engine will reduce more time and cost needed for customization, but deploying Telco Apps (VNFs) on few days instead of month improve not only cost needed for services implementaion but also time to market and service readiness for operators.

Telco vendors are not yet ready to adapt a common automation engine. Each of them use its own VNFM to ensure auto-scale of their VNFs . A common NFV orchestrator is not a simple stuff to implement, but when it comes up, operation process and service delivery will be improved more and more.

Another stream to not forget, is about datacenter consolidation.
Actually, all of these Telco applications are running on a specific hardware, are not standardized inside the datacenter. Cooling and power systems are not well dimensioned. Datacenter manager find difficult to estimate or manage his capacity plans : space, facility, power and cooling consumption.

Moving forward to a common infrastructure, including IT, network and Telco application will help greatly cost saving.

Today, virtualization of compute, storage, network helps a lot operators to think about Datacenter consolidation. Today, a common Disaster Recovery solution is capable to host different kind of applications and satisfy their relative RTO and RPO.
NFV business case should include all of the consolidation streams that can be started with the virtualization of the Telco domain

Governments, in different countries, have already stared  doing a datacenter consolidation across their footprints. Companies like Google, IBM, HP … have done the same strategy.
With the Telco virtualization movement, Operators will be able to consolidate their data rooms and datacenters on a common and converged ones.
This will bring them a lot of saving, operational efficiency, respect SLA regarding customers.

Don’t forget Public cloud, many operators try to deliver cloud services (Iaas, Paas, Sass) to their customers. Business case for new datacenters should  include public, private and telco cloud uses case . Hybrid cloud, is more and more suitable. Global Marketspace and Global and converged orchestrator will allow end user to enjoy coupling offers across different domains, thing that OTT can not offer. Operators, with NFV, SDN, cloud, their backbone and network capabilities will deliver a very exciting and complete end to end offers that other concurrents  could not do.

To reach such target design, a lot of work and change have to be done, convergence between IT and Telco should be done very fast. People with cloud background should take the lead  of vision and strategy. What have been done on the IT industry since decades should be adapted very fast by Telco to guaranty a considerable revenue and cost saving.



Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...