SDN Technologies Primer: Revolution or Evolution in Architecture?
|
|
- Judith Cooper
- 6 years ago
- Views:
Transcription
1
2 There is no single, clear definition of softwaredefined networking (SDN), but there are two sets of beliefs centralized control and management of packet forwarding vs. a distributed architecture. This expert E-Guide discusses these SDN strategies and what kind of implementation will follow. Additionally, learn about a new portfolio of SDN products that will launch in There is no single, clear definition of software-defined networking. But there are two camps with two sets of beliefs: One camp consists of SDN purists and the other of SDN pragmatists. The purists believe in centralized control and management of packet forwarding, while the pragmatists rely on a distributed architecture where decision making is spread throughout the network. Each SDN strategy has its strong points and both are likely to see implementation depending on the scenario. The problem with traditional networks Switches in traditional physical networks forward information in packet form based on a combination of knowledge, including a network address in the packet and information about the topology and connectivity of the network itself. Forwarding tables tell each device what port should be used as the destination of a given packet. In traditional networks, these tables are built through the exchange of topology and status information among network devices. This discovery process is managed through special control packets, and thus the discovery and forwarding table is called the control plane, which is separate from the data plane where data packets are handled. But discovery and adaptive autonomic behavior makes it difficult to engineer traffic patterns, predict performance or create quick and orderly recovery from failures. problems create a period of disorder as devices attempt to discover new paths. During this period, data can be lost or Page 2 of 8
3 delayed significantly, and no device has full knowledge of what other devices might be contributing to its traffic. This makes load calculations and Quality of Service (QoS) difficult to secure. SDN purists and the centralized controller model The purist model of SDN technologies evolved from researchers who aimed to replace adaptive discovery with central control of forwarding. In this architecture, a central software process -- or centralized SDN controller -- maintains the entire topology and status of the network's devices and trunks and understands the network addressing and connectivity from the user's perspective. This central process then uses various algorithms and policies to define routes through the network for each permitted flow. The paths are created by telling all devices along the way to change their forwarding table to pass the packets along the path correctly. The OpenFlow protocol was designed to be the language used by the centralized controller to communicate forwarding table changes to network devices. This communication could happen proactively based on a network map or in response to a request from a device for instructions on how to handle a packet for which it had no forwarding entry. More on SDN architecture and strategy The challenge in this SDN approach is the lack of a proven model for centralized control. The Internet and its IP foundation demonstrably scale to the scope of today's online world, but there is no proof that central control of networking can scale and no currently accepted technology to test its capabilities. What is most likely to happen with centralized SDN is a kind of interior deployment. The problems of scalability and central control are most easily addressed not over the whole of the Internet or even an enterprise WAN, but in a data center, within a cloud, in a content delivery network or in a WAN core. Page 3 of 8
4 Deploying centralized SDN in these interior domains can spread widely and quickly. Over time, the standards bodies and vendors can address the best way of linking disparate SDN domains into a complete end-to-end network. When and if this happens, the centralized and distributed SDN models will be in a state suitable for side-by-side comparison, and the question of the ideal SDN technology can then be answered. Distributed SDN -- or evolution instead of revolution For now, many experts and vendors believe this centralized SDN strategy, however pure its foundation, is unnecessarily revolutionary; evolution is more prudent. The value of adaptive discovery in building forwarding tables has been established by decades of use, including the success of IP as the foundation of the Internet. To this group, which includes many IP experts and router equipment vendors, the software that should be defining network behavior is higher-level software, perhaps even application software. The centralized SDN strategy substitutes computer-hosted software processes to control forwarding behavior while the distributed model adds mechanisms for software (and increasingly cloud) control to traditional IP and Ethernet networks. The distributed model, like the centralized model of SDN, accepts the need to gather information about network status and collect it at a central point where it can be acted on to manage performance. But in the distributed model, the goal of SDN is to offer more controllable behavior, and that goal could be met by leveraging extension protocols like PCC/PCE/PCRF (policy and charging rules function), MPLS and GRE. Of these protocols, policy-controlled networking appears most important. Virtual networking principles, such as those used by Nicira (recently acquired by VMware), could make Ethernet and IP more suitable for virtual-network applications and cloud computing, and can be easily added on top of the evolutionary model. This could be executed using distributed decision making. Page 4 of 8
5 The challenge for distributed SDN is that it has yet to prove that it can offer the kind of tight control over traffic and connectivity that centralized SDN technologies could offer. Here again, there's also the problem of an accepted framework for applying distributed SDN principles. Many users fear that this model of SDN will become proprietary since vendors will work to integrate it into their existing closed systems. By: Shamus McGillicuddy Juniper s will launch a portfolio of software-defined networking products later this year under the brand name JunosV Contrail. The first Juniper SDN product -- available in the third quarter -- will be the Contrail Controller, which will initially provide centralized control for a virtual overlay network. The Juniper SDN controller is based on technology Juniper acquired last year when it bought startup Contrail Systems. Today, JunosV Contrail Controller is an overlay network solution comparable to VMware NSX, Midokura MidoNet and Nuage s. The controller interacts with virtual switches on hypervisor hosts using Extensible Messaging and Presence Protocol (XMPP) as its control plane protocol. Contrail Controller also uses Border Gateway Protocol (BGP) for control plane scaling across LANs and WANs. "XMPP offers lower overhead and higher performance," said Joe Skorupa, vice president and distinguished analyst at Stamford, Conn.-based Gartner Inc. "And they use BGP for federation across controllers." The Contrail Controller doesn't support OpenFlow or any other protocols for direct control of network hardware, but Juniper didn't rule out future support. For now, Juniper is focusing on delivering a virtual overlay network. Page 5 of 8
6 "Most of the infrastructure that is out there today either doesn't have OpenFlow capabilities on it or will require some upgrade to get it, which means rip and replace," said Brad Brooks, Juniper vice president of marketing and strategy. "The protocols we're using with Contrail mean you can overlay software right on top of existing infrastructure and get benefits right away. It's not to say we won't support OpenFlow [in our controller]. If it becomes a de facto standard for how to communicate with the underlying physical network, then we can put that in support for the controller. But we're really looking at and focusing on standard protocols that already exist in physical networks today." Juniper SDN eyes carriers and enterprises with scale, open APIs Juniper s Inc. is angling JunosV Contrail at both carriers and enterprises, said Jennifer Lin, senior director of product management for Sunnyvale, Calif.-based Juniper. Both are looking for "ways to drive better operational efficiency and ensure that the network is exposed as a service or set of services, and not just a siloed part of the infrastructure," she said. To that end, Juniper is exposing a RESTful application programming interface (API), instantiating its own OpenStack Quantum plug-in, and announcing several partnerships geared toward integrating its SDN technology with leading cloud orchestration systems. It's partnering with Citrix on CloudStack integration and with Cloudscaling and Mirantis on OpenStack integration. Contrail's scale-out control plane based on BGP will appeal to carriers, enterprises and cloud providers looking to federate controllers across the WAN. "We're focused on how to get a scale-out control plane. In this case, we're extending mature protocols like BGP, which run today's Internet, and linking together autonomous systems across IP networks," Lin said. Juniper SDN will integrate overlay and underlay for diagnostics and analytics Page 6 of 8
7 Like other vendors who are enabling an SDN-like virtual overlay network, Juniper requires basic Layer 3 connectivity on the underlying physical network. Juniper hopes to differentiate itself from VMware and others by connecting the physical and virtual networks together. "One difference between Juniper and VMware is that Juniper will link management of virtual and physical to enable debugging problems," Skorupa said. "Otherwise, figuring out if the [network] problem is in the overlay or the physical IP network is extremely difficult at best." Juniper is working on bridging protocols like BGP and MPLS into its overlay network so JunosV Contrail can interact with Juniper's switches and routers to extract diagnostics and analytics from the physical network and combine it with the software overlay, Lin said. "We're able to correlate if something goes wrong in your pod," she said. "You have both the diagnostics of the virtual infrastructure as well as the physical underlay." Integrating physical and overlay networks will be essential, according to Bob Laliberte, senior analyst with Milford, Mass.-based Enterprise Strategy Group. "Just like you can't keep on provisioning virtual machines in physical servers without an understanding of what is going on (memory and CPU usage, etc.), these overlay networks need to understand what is going on in the physical infrastructure or underlay," he said. Page 7 of 8
8 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 8 of 8
TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS
E-Guide TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS SearchSDN T here is some confusion surrounding as there is no one definition. In this exclusive guide, you ll find ten to help you better understand
More informationWHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY
E-Guide WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY SearchSDN : S oftware-defined networking (SDN) and network technologies are being combined to fundamentally change our approach
More informationEvaluating the Security of Software Defined Networking
Evaluating the Security of Software Defined Networking This expert e-guide explores the latest challenges in network security. Get tips for evaluating network security virtualization and explore the security
More informationE-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY
E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored
More informationAn introduction to the VDI landscape
The : An Virtual desktop infrastructures are quickly gaining popularity in the IT industry as end users are now able to connect to their desktops from any location, at any time. This e-guide, from SearchVirtualDesktop.com,
More informationServer Hardware for Virtualization: Exploring the Options
Server Virtualization: Exploring the Options As virtualization moves toward the private cloud, server hardware will also have to evolve. Soon, when you talk about hardware for virtualization, you ll mean
More informationFROM SDN TO CLOUD NETWORKING. Bob Muglia EXECUTIVE VICE PRESIDENT, SOFTWARE SOLUTIONS DIVISION
FROM SDN TO CLOUD NETWORKING Bob Muglia EXECUTIVE VICE PRESIDENT, SOFTWARE SOLUTIONS DIVISION TODAY S REALITY Instability & Constant Change 10 % of CEOs feel confident in their ability to plan for growth
More informationKNOW THE FEATURES OF WINDOWS SERVER 2012 R2
E-Guide KNOW THE FEATURES OF WINDOWS SERVER 2012 R2 SearchWindows Server T hinking of upgrading to Windows Server 2012 R2? In this eguide learn about five new features. From managing the cloud faster to
More informationVMware vsphere Beginner s Guide
The latest version of VMware s virtualization platform, vsphere 5, builds on the already solid foundation of. With the growth of cloud computing and the move from ESX to ESXi, it s imperative for IT pros
More informationBUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE
E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up
More informationStorage Virtualization Explained
Storage Virtualization Explained In order to understand the benefits of storage virtualization, it is important to understand how it works. In this e-guide, brought to you by SearchServerVirtualization.com,
More informationThe Emergence of SDN in WLAN
The Emergence of SDN in WLAN SDN is being implemented rapidly find out how SDN can benefit your wireless network. Contents architectures? Chuck Moozakis Some experts predict that the network functions
More informationSSL Certificate Management: Common Mistakes and How to Avoid Them
Common Mistakes and How to Avoid Them Common Mistakes and Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. How to Avoid Them By:
More informationDesktop Virtualization: What Windows Managers Should Know
One of the biggest jobs for any Windows shop is managing client workstations. Using desktop virtualization can help make that job a little bit easier. This e-guide, from SearchVirtualDesktop.com, can help
More informationAUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER
E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those
More information10 Cloud Storage Concepts to Master
10 Cloud Storage Concepts to Master Cloud hype has given way to a certain amount of confusion, particularly around the terms used to describe the technology itself. This E-Guide defines "cloud washing"
More informationE-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD
E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD A modern trend in IT infrastructures reveals that more and more companies are installing solid-state storage and caching. Additionally,
More informationBEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES
E-Guide BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES SearchAWS T here is no catch-all for securing a cloud network. Administrators should take a comprehensive approach to protect AWS cloud resources
More informationAS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?
E-Guide AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER? SearchSecurity A pplication development teams often prioritize timely delivery of software above all other concerns
More informationE-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT
E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT E nterprise adoption of Windows 10 isn t likely to follow the same pattern as for Windows 7, and that s a good thing, writes columnist Brian Madden. And even
More informationOPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT
OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,
More informationUtilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI
Utilizing Windows Server 2012 Key workarounds for avoiding the Modern UI Even though the graphical user interface (GUI) Microsoft introduced in Windows Server 2012 has its benefits, IT admins are reluctant
More informationNETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS
E-Guide NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS SearchSecurity D evices may not connect to enterprise access systems or inventory and patching mechanisms. This expert eguide explains how
More informationRequirements for virtualizing Exchange Server 2010
Requirements for Exchange : Hardware Microsoft Exchange Server is one of the most mission-critical IT services for many enterprises. Yet while isn t difficult, it must be done properly to ensure success.
More informationIdentify and Eliminate Oracle Database Bottlenecks
Identify and Eliminate Oracle Database Bottlenecks Improving database performance isn t just about optimizing your queries. Oftentimes the infrastructure that surrounds it can inhibit or enhance Oracle
More informationAutomated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper
Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks Mobile Cloud Architecture Automated Control and Orchrestration Juniper
More informationBest Practices for the Hybrid Cloud
Best Practices for the Hybrid Cloud Private clouds have been a popular topic amongst IT managers in the past year, but IT organizations that build private clouds need the peak computing power of a public
More informationSolid State Storage: Trends, Pricing Concerns, and Predictions for the Future
Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent
More informationMANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH
E-Guide MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH SearchSecurity L earn how to implement appropriate security controls for endpoint management. PAGE 2 OF 7 MANAGING ENDPOINTS WITH DEFENSE-IN-DEPTH Mike
More informationDisaster Recovery Planning: Weighing your customer s options
Disaster Recovery Planning: Weighing your Even though backing up data and developing a plan to restore it isn't the first step in business continuity planning (BCP), it's still a cornerstone. Without a
More informationSTORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES
E-Guide STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES SearchStorage S torage network technology is changing and speed is the name of the game. To handle the burgeoning data growth, organizations
More informationE-Guide REINVENTING WAN ARCHITECTURE FOR CLOUD SERVICES
E-Guide REINVENTING ARCHITECTURE FOR CLOUD SERVICES REINVENTING ARCHITECTURE FOR CLOUD SERVICES Cloud architecture: service delivers E nterprises need to reinvent architecture for cloud services. The data
More informationPREVENTING PRIVILEGE CREEP
E-Guide PREVENTING PRIVILEGE CREEP SearchSecurity Mike Cobb The security principle of least privilege is the practice of limiting permissions to the minimal level that will allow users to perform their
More informationSECURITY MONITORING: BE EVERYWHERE AT ONCE
E-Guide SECURITY MONITORING: BE EVERYWHERE AT ONCE SearchNetworking P ervasive security improves on defense in depth by layering security according to risk and assigning it specifically to each critical
More informationSUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY
E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationBackup Appliances: Key Players and Criteria for Selection
Backup Appliances: Key Players and Criteria for Selection Backup appliances may have been created with the SMB in mind, but that doesn't mean larger companies can't derive value from them. In fact, recent
More informationBRING SPEAR PHISHING PROTECTION TO THE MASSES
E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put
More informationWELCOME. Chicago Juniper Users Group SEPT 18TH, 2013
WELCOME Chicago Juniper Users Group SEPT 18TH, 2013 THE SDN OPPORTUNITY James Kelly SDN PORTFOLIO & PARTNER MANAGEMENT SSD STRATEGY & MARKETING WHY SDN NOW? SOFTWARE TRENDS AND TECHNOLOGY DAMANDS + + Software
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationSoftware-Defined Networking (SDN) Overview
Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationA primer to SQL Server 2012
A primer to SQL Server 2012 Many industry insiders have declared SQL Server 2012 to be the strongest version Microsoft has released in a long time. The 2012 edition offers new features geared toward enterprises
More informationColt Novitas: Bringing SDN & NFV in Production. Javier Benitez, Strategy & Architecture,
Colt Novitas: Bringing SDN & NFV in Production Javier Benitez, Strategy & Architecture, Javier.benitez@colt.net 09 May 2016 ESNOG GORE 17, Barc elona 2016 1 Colt at a glance 187k+ LDN, metro fibre and
More informationLESSONS LEARNED FROM AN OFFICE 365 MIGRATION
E-Guide LESSONS LEARNED FROM AN OFFICE 365 MIGRATION SearchExchange Office 365. O ffice 365 s take time and careful research, but even then, some mistakes are inevitable. Find out what one expert learned
More informationCisco APIC Enterprise Module Simplifies Network Operations
Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º
More informationADDRESSING TODAY S VULNERABILITIES
E-Guide ADDRESSING TODAY S VULNERABILITIES SearchSecurity E ven if your firm has no legal or contractual obligation to perform them, authenticated scans should be an essential part of your security program.
More informationSDN TO BE OR NOT TO BE. Uwe Richter SE Director Russia/CIS, East and South East Europe
SDN TO BE OR NOT TO BE Uwe Richter SE Director Russia/CIS, East and South East Europe uwe@juniper.net FUNDAMENTAL PROBLEMS TO SOLVE Want more innovation in networking Want it more quickly too Want more
More informationADOPTING FIDO SearchSecurity
E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2
More informationDisaster recovery planning for health care data and HIPAA compliance regulations
Disaster recovery care data and HIPAA compliance regulations Disaster recovery care Disaster recovery planning takes on special importance in health care organizations dealing with patients and care delivery.
More informationNuage Networks Product Architecture. White Paper
Nuage Networks Product Architecture White Paper Table of Contents Abstract... 3 Networking from the Application s Perspective... 4 Design Principles... 4 Architecture... 4 Integrating Bare Metal Resources...
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center For more info contact Sol Distribution Ltd. A NEW NETWORK PARADIGM What do the following trends have
More informationMETAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER
METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH
More informationEthernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade
Ethernet Fabrics- the logical step to Software Defined Networking (SDN) Frank Koelmel, Brocade fkoelmel@broc 10/28/2013 2 2012 Brocade Communications Systems, Inc. Proprietary Information ETHERNET FABRICS
More informationThe Market Disruptor. Mark Pearce EMEA Director Channel Networking November 16 th Networking Solutions for the Future-Ready Enterprise
Dell EMC Networking The Market Disruptor Mark Pearce EMEA Director Channel Networking November 16 th 2016 Networking Solutions for the Future-Ready Enterprise DELL EMC Networking Innovations & Thought
More informationUse Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION
Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private
More informationE-Guide CLOUD COMPUTING VS. VIRTUALIZATION
E-Guide CLOUD COMPUTING VS. VIRTUALIZATION A lthough cloud computing uses virtualization, virtualization is simply one element that makes cloud computing. In this e- guide, brought to you by SearchServerVirtualization.com,
More informationImprove application deployment by 400% with your own private cloud
Improve application deployment by 400% with your own private cloud Increase Business Agility and Revenue Andy Leung Senior Consulting Manager, Center of Excellence THE NATURAL DESIRE FOR CUSTOMIZATION
More informationInnovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief
Innovative. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Technology Brief Comparison of SD WAN SD-WAN Overview By the end of 2019, 30% of enterprises will use SD-WAN products in
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationBROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK
BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK Ken Cheng VP, Service Provider and Application Delivery Products September 12, 2012 Brocade Cloud-Optimized Networking
More informationSDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS
January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.
More informationAccelerating SDN and NFV Deployments. Malathi Malla Spirent Communications
Accelerating SDN and NFV Deployments Malathi Malla Spirent Communications 2 Traditional Networks Vertically integrated Closed, proprietary Slow innovation 3 Infinite Complexity of Testing Across virtual
More informationThe Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization
The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization May 2014 Prepared by: Zeus Kerravala The Top Five Reasons to Deploy Software-Defined Networks and Network Functions
More informationLessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO
Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption
More informationE-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE
E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE D atabase performance can be sensitive to the adjustments you make to design. In this e-guide, discover the affects database performance data
More informationNetwork Edge Innovation With Virtual Routing
Independent market research and competitive analysis of next-generation business and technology solutions for service providers and vendors Network Edge Innovation With Virtual Routing A Heavy Reading
More informationHybrid Cloud (Telco & IT) - en fleksibel og optimal implementering
Hybrid Cloud (Telco & IT) - en fleksibel og optimal implementering June 6th, 2017 1 Nokia 2016 Drivers - Agility is the prime reason to move to the Cloud 16% New revenues 16% Fluctuating demand 13% Customer
More informationSOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?
SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used
More informationCarrier SDN for Multilayer Control
Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration
More informationExtreme Networks How to Build Scalable and Resilient Fabric Networks
Extreme Networks How to Build Scalable and Resilient Fabric Networks Mikael Holmberg Distinguished Systems Engineer Fabrics MLAG IETF TRILL Cisco FabricPath Extreme (Brocade) VCS Juniper QFabric IEEE Fabric
More informationOpenStack Networking: Where to Next?
WHITE PAPER OpenStack Networking: Where to Next? WHAT IS STRIKING IS THE PERVASIVE USE OF OPEN VSWITCH (OVS), AND AMONG NEUTRON FEATURES, THE STRONG INTEREST IN SOFTWARE- BASED NETWORKING ON THE SERVER,
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More informationGuide to SDN, SD-WAN, NFV, and VNF
Evalu- ation Guide Technical Brief SD-WAN, NFV, and With so many acronyms and each one building on another, it can be confusing about how they work together. This guide describes the difference. 006180206
More informationHyper-Converged Infrastructure: Providing New Opportunities for Improved Availability
Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On
More informationWhat to Look for in a Partner for Software-Defined Data Center (SDDC)
What to Look for in a Partner for Software-Defined Data Center (SDDC) WHITE PAPER Software-defined data center (SDDC) has the potential to deliver enormous business value to organizations of any size and
More informationNext-Generation Data Center Interconnect Powered by the Adaptive Cloud Fabric
Solution Overview Next-Generation Interconnect Powered by the Adaptive Cloud Fabric Increases availability and simplifies the stretching and sharing of resources across distributed data centers Highlights
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationBest Practice Deployment of F5 App Services in Private Clouds. Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect
Best Practice Deployment of F5 App Services in Private Clouds Henry Tam, Senior Product Marketing Manager John Gruber, Sr. PM Solutions Architect Agenda 1 2 3 4 5 The trend of data center, private cloud
More informationJN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.
JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar
More informationSoftware-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time
A CONNECTED A CONNECTED Software-Defined Networking from Serro Solutions Enables Global Communication Services in Near Real-Time Service providers gain a competitive advantage by responding to customer
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationUnderstanding the Value behind Enterprise Application-Aware Firewalls
Value behind Enterprise Application-Aware Firewalls Value behind Enterprise Firewalls have remained largely unchanged since their emergence 25 years ago, but with Web 2.0 technologies surfacing, organizations
More informationManaging VoIP as a Business Service
An IT Briefing produced by By Chris Crowell 2005 TechTarget BIO Chris Crowell As Chief Technology Officer for Aprisma Management Technologies Inc., Mr. Crowell has 20 years of experience leading software
More informationMPLS vs SDWAN.
MPLS vs SDWAN MPLS MPLS It offers excellent QoS when it comes to avoiding packet loss and keeping a business s most important traffic flowing. This reliability is especially essential to maintain the quality
More informationPreparing your Business for Virtualization
Preparing your Business for Virtualization Pierre Lavillat NFV Director Program Manager - HPE 2018 TM Forum 1 Future Network will be virtualized Classic Appliance Approach Virtualization Approach Message
More informationMPLS SOLUTION How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will
More informationFuture-Ready Networking for the Data Center. Dell EMC Forum
Future-Ready Networking for the Data Center Dell EMC Forum Our world is changing We want it now Work is no longer a location We re drowning in information Everything is at risk 8 seconds Average human
More informationDeploying VMware NSX with OpenStack
Deploying VMware NSX with OpenStack Scott Lowe Engineering Architect NSBU 29 October 2015 2014 VMware Inc. All rights reserved. Before we begin Audience participation is encouraged Feel free to take pictures,
More informationNetwork Automation using Contrail Cloud (NACC)
Network Automation using Contrail Cloud (NACC) COURSE OVERVIEW: This five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail software-defined networking
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationDell Software Defined Enterprise
Dell Software Defined Enterprise A practical vision of Future Ready IT Armughan Ahmad Vice President, Dell Enterprise Solutions @ArmughanAA 1 2 3 Defining the Software-Defined Enterprise Strategy for success
More informationFederal Agencies and the Transition to IPv6
Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT
More informationPradeep Kathail Chief Software Architect Network Operating Systems Technology Group, Cisco Systems Inc.
Pradeep Kathail Chief Software Architect Network Operating Systems Technology Group, Cisco Systems Inc. March 4 th, 2014 2012 2010 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or
More informationTransport Software Defined Networking: Part 1 Grabbing the Low-Hanging Fruit
Advisory Report Transport Software Defined Networking: Part 1 Grabbing the Low-Hanging Fruit February 27, 2013 Rick Talbot Current Analysis Senior Analyst, Transport and Routing Infrastructure Contents
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationVortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and
More informationHitachi Unified Compute Platform Pro for VMware vsphere
SOLUTION PROFILE Hitachi Unified Compute Platform Pro for VMware vsphere Accelerate Your Business-Critical Workloads to the Next-Generation Converged Infrastructure Relentless trends of increasing data
More information