Each technology market era seems to be defined by inflection points. We are at the beginning of an emerging market defined by three key inflection points:Consumerization of ITPervasive collaborationCloud computing and networkingLook with me at some of the early indicators of this emerging era. 72% of Enterprises are permitting employee’s to use personal devices for business. It is predicted that 40% of PCs in 2014 to be on a Virtual Desktop Infrastructure. And, Over 80% of new applications will be deployed or distributed on cloud-based networks.I am going to speak to you today in the context of these inflection points and how Avaya Networking can help you turn these into opportunities for your business. Back up information on sources:15.43M iPads sold in Q4, 2011Over 918 million tablets by 2016 (Gartner)Mobile device spending will exceed PC 4x (IDC)72% of orgs permitting employee devices for business (Aberdeen Group)Up to 40% of employees spend >20% of time far from desk (Gartner)40% of PCs in 2014 with be VDI (Gartner) Video soft clients growth expected to increase 340% from 2010–12Almost ¾ of mobile apps in 2012 will be integrated with enterprise services (IDC)Cloud computing market is a $74 billion industry (Gartner)"digital universe" will grow to 2.7ZB (zetabytes) in 2012, up 48% from 2011 (IDC)Over 80% of new apps will be deployed/distributed on clouds (IDC)
To do this, we need to approach our discussion at the most fundamental level. At the end of the day, network users really care about 2 things: applications and how a user accesses applications.
But, our competition looks at this in a very different way. They look at the network as an entity in and of itself…the applications of a business seem to simply be a component of the network. [click] We take the opposite view…we take the network user’s view. Applications are user’s lifeblood to business and productivity. The network’s role is to be 100% subservient to the applications of the Enterprise. Every attribute of a network should have a direct relationship to the applications it serves.
Here are some of the proof points of Avaya Networking’s long history of innovation. I’ll just review a couple of highlights. In the mid 90’s the first high performance stackable switches were introduced along with the first high performance VPN. In 2009 the terabit backplane barrier was broken with the introduction of the ERS 5600. The launch of Virtual Enterprise Network Architecture was introduced in late 2010 followed by the first truly integrated wireless architecture test and then the delivery of a standards based Ethernet fabric in 2011.
The first technology transition that I am going to address is that of the network edge. The edge has the greatest number of devices and users and can potentially absorb the greatest number resources. Here is where we are at today: (Separate device Configuration)Today customers would perform configuration for each device individually. As an example, there is little to no synergy between the switch or the device such as an IP phone connecting to it. Therefore all parameters are individually configured(Modular chassis and pile-ables)Customers have been using modular chassis for edge campus connectivity, those that wanted a more cost effective solution chose for the most part standalone switches that could be clustered for IP management. (PoE for IP phone)For the most part PoE has been sufficient to provide power to IP phones and devices such as 802.11a/b/g AP’s. However, there have been limits to PoE deployments due to expensive redundant high power options on edge switches.(End device security control)Customers are generally able to retain control over the end devices connecting to the network… through corporate asset distribution… hence the security requirements are implemented by imposing specific functionality to be present on the end device such as personal firewall, virus scanner, 802.1x NAC, etc…(Applications afterthought)And finally, today Customers don’t pay attention to applications much, in fact, many applications simply run over the network as best effort…with no specific security control and typically over the same VLAN.
As we lead through a market and technology transition at the edge of the network, let me show you how an Avaya solution can transform your wiring closets and data center racks into an intelligent edge. (Auto Provisioning)So, first. Today customers expect end devices to be automatically provisioned; they seem to be past the days when they need to wait for IT to make moves, adds and changes. So, with the Avaya solution, the deployment of end points has been greatly simplified and plug and play achieved. This substantially reduces time to service. Avaya’s own IT group determined to could save 12-15 minutes per end devices being deployed representing a considerable OPEX saving to them.(Up to 100x performance)Customers can now choose a mature resilient stacking solution for their edge campus connectivity. Avaya provides unmatched scalability where compared to some of our competitors who continue to use daisy chain clustering that lack scalability when deploying GIG desktop technology. (Their “pseudo stacking” has blocking 10GIG throughput. Avaya’s ERS5600 as an example delivers 1.152 Terabits which is 100x more throughput than these competitors (HP = 10GIG = 100x, Cisco = 64GIG =18x, Juniper 128GIG = 9X))(Network-based control)Consumerization of end devices is changing the enterprise security paradigm as IT can no longer control the devices connecting to the network, end users want to bring their own laptops, SIP phones, etc…therefore they (IT) can no longer impose security requirements on these devices (University students are good example of that) and yet they must still implement security measures to control what devices connect to the network. Avaya provides centralized access control through Identity engines which interacts with the edge devices (ERS stackables) to ensure network access policies are applied based on the identity of the individual, device type they use, IOS used, etc….and control access to resources based on this authentication.(Virtualization to the edge)Now here is where Avaya’s vision starts to become disruptive. In order to reduce the provisioning time when new services are being deployed or when new Layer 2 domains need to be extended across the entire Enterprise (Campus/DC for most part), it forces “all devices” to be reconfigured to extend the VLAN. Avaya has brought to market a next generation stackable switch in the ERS4800 which has hardware support to be able to extend the virtualization all the way to the edge of the network greatly simplifying the provisioning to the edge, hence TTS (Time to Service) is now in minutes as opposed to days/weeks of configuration changes planning. In a short amount of time, Avaya will be extending virtualization enterprise wide. (Real-time app monitoring)As applications run over the converged infrastructure, new tools are needed to help monitoring the health of these applications end to end. Avaya is developing a lite-weight app on all end points and switches to provide statistics around latency, jitter, MOS (Mean Opinion Score – end user voice quality), etc. This will create a differentiation deploying our applications.Now, what does this solution consist of? Moving from the end-user inward, the Avaya solution contains a customer’s choice of end-points. Endpoints may include VoIP desk sets, or may include Avaya’s Desktop Video Device. Then, the solution includes Avaya One X for true mobility on corporate or personal endpoints. Next, Avaya’s identity Engines creates the security linkage between corporate information and switches and any device. Then add the Avaya ERS family of switches just spoken about and you have a real-time ready Avaya end to end solution.
This slide shows how Avaya stacked up against the competition in a series of competitive tests. We used the Ethernet Routing Switch 4548GT-PWR model as our platform to test with. The first test was energy. The results showed that Avaya was 20-25% more efficient that equivalent solutions from HP and Cisco (namely the HP E4500 and the Cisco Catalyst 3750-X). We were 50% more efficient than the Juniper EX 4200. The second comparison was total cost of ownership, which is comprised of energy consumption, annual maintenance (8x5xNBD), and product acquisition cost. As you can see Cisco and Juniper are about double the other competitors, and Avaya is slightly lower than HP, who is typically known in the market as the cheap solution. Finally Switch Backplane capacity is something that we blow the competition away with. Our Stackable Chassis products combine non-blocking internal switching fabrics with a high-speed virtual backplane architecture to deliver a high performance solution that scales proportionally as new switches are added. Avaya is up to 5x greater backplane capacity than the competition and 3.3x better than the average. With our latest generation stackable product, the VSP 7000 (not included in the Miercom testing) we offer 40x the backplane capacity of the nearest competitor in the test set and up to 100x against the lowest performing model that our competitors sell.
Let’s talk about the current situation for wireless…(Corporate devices only)For the most part, most Enterprise are resisting BYOD, therefore corporate devices are being used to connect to the network. But, there is immense pressure for IT to support BYOD but security concerns are a road block to such deployment. (Wi-Fi overlay infrastructure)Today’s 802.11 a/b/g wi-fi deployments are a pure overlay deployment, there is no integration with the wired infrastructure and management is completely separate from each other. (Primarily PC end points)For the most part today, traditional PC’s are being used to connect to the network, this is partly due to IT resisting BYOD as much as possible, and partly due to PC’s having been the computing device of choice for many years.(NAC based authentication)IT focuses on device authentication today, pure NAC security is based on MAC addresses, basic 802.1x, etc… It is simply based on Machine authentication of corporate assets used by employees or registered guest/contractors using the same mechanisms. (Best effort Wi-Fi for all apps)current Wi-Fi deployments are still considered to be best effort, hence, it is not typically used for mission critical applications access but rather for connectivity convenience as you move around the Enterprise campus. Seamless mobility is not expected with current overlay architecture.
The Avaya wireless solution addresses this major inflection point in the market with the following key enablers. (Optimized UC/CC/HD)Avaya’s next generation wi-fi architecture is purpose-built to provide business grade UC, CC, and HD video. Dynamic call admission control embedded in our solution, provides the ability to maximize the number of voice/uc/video calls that run over the converged infrastructure. Most of our competitors only support static configuration settings for maximum number of calls which despite the fact bandwidth may be available would not allow a call to be established if the limit is reached.(Enabling BYOD)Avaya delivers a strong BYOD solution allowing customers to bring their own devices. The combination of our Identity Engines and next generation wi-fi (WLAN8100) provides a centralized Identity based solution that goes above and beyond traditional NAC while having the ability to evolve immediately to Policy based access control. Therefore, different policies can be enforced controlling what end users can access based on the type of device they use, IOS version, identity, etc….(Next Generation Unified WLAN)Avaya is bringing to market a unique architecture which integrates for the first time wired and wireless while delivering the most scalable architecture and support for next gen applications as well as seamless roaming across the campus for applications such as Mobile VoIP, etc.. The Virtualization of the “WLAN Management – aka controller” eliminates the need for a hardware based appliance while maintaining centralized management of the RF environment. The forwarding is now provided by the Ethernet switching infrastructure offering scalable business grade wi-fi architecture optimized for collaborative applications. (Identity Aware)Avaya’s Identity Engines virtual appliance provides support for tradition NAC but more importantly Policy Based access control. As customers endorse BYOD, it is imperative they have a strong security implementation given them full visibility and control over what end users can or not access, our policy based control solution can be fully customized to meet their needs and ensure no corporate assets are compromised. (Emergency Services)While not applicable and as important to all verticals, the ability to track the location of users as they roam across the network can make the difference between life and death. Having a compliant e911 solution through the partnership with Conveyant provides customers the ability to deliver a compliant solution even though it is over wi-fi.So, what does the Avaya wireless solution look like? Again, from the end-user in, Avaya offers a selection of wireless end points, including the Flare Experience offered on an Ipad. Avaya One-X and Identity Engines ensure all your devices access the corporate network. Avaya Aura provides the communication infrastructure and the WLAN 8100 family provides the controllers, access points, and management system to run business grade wireless.
Third party validation of our voice and video performance…Competitive third party testing was recently conducted by Miercom, a leading, independent product testing firm. The testing compared voice call density and video stream density of Avaya WLAN 8100 versus Cisco, Aruba and Juniper (who recently purchased Trapeze).Against the competitive set average, Avaya WLAN 8100 supported 23% more voice over wlan calls and 31% more in unicast video streams.
As business has increased in complexity so has the core of the network…(Pervasive Spanning Tree)While far from ideal, spanning tree protocol continues to be broadly used as a resiliency solution. It was not fundamentally built for that purpose, but its limitations are causing substantial amount of challenges to IT staff and certainly adding a great deal of complexity.(Software based Resiliency)For customers that have chosen the right resiliency architecture by implementing an Active/Active model (Avaya’s SMLT/RSMLT, Cisco’s VSS (Only available today on 6500 10GIG and Nexus 7000 VPC) the model today is orchestrated through software. Therefore, 400ms-800ms is best recovery time possible. Now, at speeds of 10/100 or GIG, this may be sufficient but once 10GIG, 40GIG, and 100GIG are broadly deployed customers will require much faster recovery time especially if Lossless characteristics are required.(IPv4)Today’s predominant IP address protocol is IPv4(10Gig)10Gig is today’s common uplink capacity from edge to Core(Device based virtualization)Virtualization is done at the device level through mechanisms such as VLANs (Virtual Local Area Network - Layer 2), VRF’s (Virtual Routing and Forwarding – Layer 3), VPLS (Virtaul Private LAN Service - L2), MPLS (Multiprotocol Layer Switching - L3), etc….regardless it is complex to deploy and time to service is very slow due to the number of devices that need to be reconfigured. It also augments business risk due to potential loops created via “human errors” while performing configuration.
The days of speeds and feeds are over; our industry has met these requirements for the most part. As we look at servicing real-time applications, it is as much about simplicity and efficiency as it is about speeds and feeds. (Consistent Resiliency Model)Avaya is the only vendor delivering a consistent resiliency model (Active/Active) from Server Edge (Data Center) to the Desktop edge (Campus). At all layers (core, distribution, edge) Avaya delivers the same model while being able to adapt it to small, mid-tier, large and VERY large deployments. This is a unique offering. (Hardware-based resiliency)Avaya’s has been the innovator of “Active/Active” resiliency model with generally available solutions since 2001, it is clearly now the defacto and preferred model all vendors are trying to replicate. Avaya didn’t stop there, we have implemented the same capabilities but this time embedded into hardware. As an example, the VSP9000 can now deliver 20ms recovery compared to 400ms-800ms with a software solution. While this may not appear to be critical, when running at 40GIG/100GIG the difference in packets dropped between the two models will be substantially different, hence when evolving to multi-hop lossless architecture for converged storage solutions, this will be a mandatory requirement. Avaya provides the fastest core recovery solution in market today.(Bandwidth scalability)Avaya’s VSP9000 provides a future proof platform scaling from GIG to 100GIG, and supports virtualization through Shortest Path Bridging while also supporting lossless Ethernet.(VENA enabled core)All of Avaya’s Modular core switches (ERS8600, ERS8800, VSP9000) support VENA in some ways through clustering, WLAN embedded forwarding and/or SPB virtualization. Operational simplicity and faster time to service is finally a reality with Avaya’s core architecture.(IPv4 to IPv6)As per VENA enabled core, all modular switches support both IPv4 and IPv6.As shown, Avaya offers a comprehensive core solution set from very small to very large with the same architecture and resiliency model.
Nothing seems to be getting more attention from the press than the data center. Today’s data center is in many ways monolithic…(Device-centric architecture)Today’s configuration in the data center is done at the device level requiring all devices to be reconfigured when extending these domains (L2 or L3). This doesn’t enable IT fast Time to service and substantially increases business risk due to mis-configuration causing downtime.(Proprietary-Based Virtualization)There is no inter-operability with proposed Data center virtualization such as TRILL, FabriPath, Q-Fabric from competitors…all of these fabrics are proprietary with no inter-operability provided. As Virtualization extends beyond the data center, this will greatly reduce if not prevent the ability to quickly deploy new services across the Enterprise.(End of Row aggregation)EoR (End of Rack) aggregation is the typical Server connectivity model due to lack of scalability for ToR (Top of Rack) solutions.(North-South server and storage)Unless all devices are connected to the same EoR aggregation switch, server to storage traffic must flow through the Core switches in the DC. This increases latency and is highly inefficient. In addition, spanning tree active/Standby links are typically used due to lack of Active/Active resiliency in competitor’s products(Virtualization contained in data center)Regardless of the virtualization model being used today, virtualization is typically limited to the Data Center.
As the life-blood of your business and the home to business-critical applications, the agility of data center is critical. We believe a dynamic data center must employ the following:(Standards-based Ethernet Fabric)Avaya’s VENA architecture, leveraging Shortest Path Bridging technology, allows a standards-based implementation of an Ethernet fabric, this provides the agility required to easily extend Layer 2 domains within and across the Data Centers(Top of Rack Aggregation [ToR])Rather than using End or Row aggregation, customers are looking for a more cost effective model. Avaya’s unique and highly scalable “stacking” architecture provides customers with a highly effective solution for east-west traffic flow (Server to storage) than can scale up to 5.1Terabits. By enabling the virtual fabric (extending VENA architecture) customers can now easily extend L2 domains from Data Center to Data Center without configuring Core switches again. All this can be achieved while eliminating single points of failure in a spanning Tree free environment.(VM [Virtual Machine] Orchestration)Avaya delivers the ability to integrate with VCenter from VMWare, providing full server mobility within and across Data Centers with auto-provisioning based on templates fully customizable to deliver QoS (Quality of service), VLAN membership, etc…regardless of which server the VM is being moved to.(Convergence-ready Architecture)Avaya delivered a Multi-hop Lossless solution on its Core VSP9000 switches. As we move towards single tier control plane architecture, delivering lossless solution is key for customers planning on evolving towards FCoE (Fiber Channel over Ethernet). (Open partner ecosystem)Avaya continues to expand its VENA architecture open ecosystem, we already have partnerships with CORAID, SilverPeak, VMWAre and Qlogic. We recently announced a Belden partnership for Industrial Ethernet, while other partners such as F5 and PaloAlto will be publically announced soon. The solution set includes the right hardware, software and Ethernet fabric to truly make the data center dynamic.
This is a truly interesting statistic…40% of employees spend more than a fifth of their day well away from their desk. As this number grows, let’s look at a solution to make employees feel a little closer to home.
When users are away from their desk conducting business, the last thing they want to think about is how to connect to the network, or worse, if they can connect. Let’s talk about how to simplify this. (Automated Secure Access)Avaya will be embedding native VPN capabilities into its strategic applications such as Flare, One-X communicator, Contact Center agent, etc… (Future). This solution will eliminate the need for end users to figure out what VPN or secure access to establish(Simplified user experience)End users will no longer need to launch various clients, Avaya’s integrated secure access will improve the end user experience and reduce the level of complexity normally required to establish remote access(True Mobility security)This means that the network user experiences true mobility security independent of device or connection, all while meeting the corporate IT security requirements.(Secure VPN-Less access)For customers that only require secure encrypted voice/uc communications without the need for other application access, Avaya’s innovative Session Border Control solution provides transparent VPN-Less fully encrypted remote access. No VPN client required for a fully encrypted session even when using a consumer devices such as an iPAD running Flare for iPad.
As the trend to consolidate and virtualize the data center advances, corporate applications and data have been centralized by most enterprises. As a result, 90% of users now get their applications over the wide-area network (WAN), primarily in branch offices, according to Nemertes Research. This means that branch users, more than ever, are required to remotely access centralized voice, video and data applications to perform their daily business roles. And enterprise IT departments are under considerable pressure to deliver reliable and rich branch communications, while keeping branch IT costs under control.
Avaya addresses this trend with an integrated and powerful set of capabilities…(Extended user Services)With the Avaya solution, end users have a consistent experience using advanced collaboration services regardless of where they are or how they access Avaya applications such as Web.Alive, UC, CC, etc.(SIP Survivability)Avaya has embedded SIP gateway survivability for customers that support a Centralized feature dissemination model with our AURA architecture. The solution is adaptable to a SIP gateway only, or with network services such as WAN connectivity, Firewall, IDS, etc….delivering a fully converged branch solution across 3 Secure Router platforms.(Fast reliable branch connectivity)Our converged branch solutions provide all necessary resiliency protocols and connectivity to deliver a fully redundant and high availability branch solutions.(All in One routing device)Avaya’s converged branch portfolio provides the necessary flexibility for WAN connectivity, Fast Ethernet & Gibabit Ethernet, Power over Ethernet, integrated switching blades, Layer 3 switching, MPLS (Multiprotocol Layer Switching), Ethernet WAN services, network services such as firewall, intrusion detection, access control lists, etc…. This, combined with the ability to integrate SIP gateway survivability provides customers full customization to meet their specific needs.(Single simplified architecture)Avaya will be extending its VENA architecture through the support of Shortest Path Bridging (or SPB) on a VSP4000 and at a later time bring SPB support on the traditional Converged branch portfolio. Therefore customers will be able to fully benefit from the provisioning flexibility outlined earlier in the data center and campus. At that point, Avaya will have a unique simplified architecture from Data Center to Campus and now to the branch!The full Avaya solution set offers all-in-one routers, such as: AG2330, SR2330, SR4134. It includes Ethernet switching, dedicated gateways, Avaya Aura, and branch communications systems of the B5800 and IP Office. As you see from the solution set, we have tremendous flexibility to deliver full services from campus to branch.
I want to talk about two “wrappers” that are designed to complement your mission critical operations. First, is network management. Avaya Networking has a unified management suite designed to put you in a proactive position with respect to your network. The suite shares a common database and sign-on. Workflows from one suite, such as Event & Performance, are shared with other suites, say Configuration & Provisioning. It is designed to eliminate the swivel chair management process. But we are taking that further. Our vision for the future is to integrate the management systems across all of Avaya into one unified management platform…from networking to unified communications to call center. We are excited about this and we are in a unique position to deliver it.
Second, offered either directly through Avaya or through a partner, professional services offer turnkey solutions or standalone service elements to deliver a complete Data Center or Campus solution. Either way, customers have access to:The deepest level of expertise availableFinancial and technical modelingBest practices that are being deployed industries such as financial services, healthcare, state and local governmentSo, let’s wrap all this together.
This visual summarizes the Avaya value proposition. Everything in the stack is designed to support two things: the applications and the devices that access them.Speeds and features are important, but if we are truly serious about supporting users in their world, then networking, management, communications infrastructure, and professional services must all work together to produce an applications-first network. Because at the end of the day it is about people being productive with people. That is our vision… That is the Power of We.
Introduction to AvayaNetworkingClifford Knookhttp://www.linkedin.com/in/cliffordknook
This Is The Market We Are In… Consumerization Collaboration Driving The Age of the of IT / BYOD Growth Cloud Over 918M tablets by 2016 40% PCs in 2014 to be VDI Cloud computing market is a $74 billion industry 72% permitting employee Video soft clients increase devices for business 340% from 2010–12 "digital universe" will grow to 2.7ZB in 2012, up 48% ¾ mobile apps 2012 will be from 2011 Mobile device spending will integrated with enterprise exceed PC 4x services Over 80% of new apps will be deployed/distributed on clouds Tech Data Confidential
At the End of the Day,Network Users Care About Two Things:Applications…and How They Access ThemTech Data Confidential
Competition’s View of the Enterprise Tech Data Confidential
Avaya Has Led Through Major Industry TransitionsBusiness Value Voice UC Business Collaboration Tech Data Confidential
The Network Edge is Not Intelligent Current Situation Separate device configuration Modular chassis and pile-ables Of IT budgets go toward PoE for IP phone & AP’sjust keeping the lights on The Yankee Group End device security control Applications afterthoughtTech Data Confidential
Auto provisioning Up to 100x performance Network-based control Virtualization to the edge Real-time app monitoringTech Data Confidential
Wireless Networks are Overlay Current Situation Corporate devices only Wi-Fi overlay infrastructureOf newly installed wireless Primarily PC end pointsnetworks will be obsoletebecause of lack of proper NAC based authentication planning Gartner Best effort Wi-Fi for all apps October 2011Tech Data Confidential
Optimized UC/CC/HD Enabling BYOD Next gen unified WLAN Identity aware Emergency servicesTech Data Confidential
The Campus Core is Complex Current Situation Pervasive spanning tree Software based resiliency IPv4 10Gig Device based virtualizationTech Data Confidential
Consistent resiliency model Hardware-based resiliency Bandwidth scalability VENA enabled core IPv4 to IPv6Tech Data Confidential
The Data Center is Monolithic Current Situation Device-centric architecture Proprietary-based virtualization Of all network outages are End of row aggregation caused from human error North-south server and The Yankee Group storage Virtualization contained in data centerTech Data Confidential
Standards-based Ethernet fabric Top of rack aggregation VM orchestration Storage Convergence-ready architecture Open partner ecosystemTech Data Confidential
Up to 40% of employees spend 20%+ of their time far from desk GartnerTech Data Confidential
Automated secure access Simplified user experience True mobile security Secure VPN-less accessTech Data Confidential
Of new employees work in branch/remote location Robin Gareiss NemertesTech Data Confidential
Extended user services SIP survivability Fast reliable branch connectivity All in One routing device Single simplified architectureTech Data Confidential
Avaya Networking Management & Vision Access & Policy Event & Proactive Performance Change Common Database & Workflow Data Center Configuration Virtualizatio & Provisioning n Partner IntegrationTech Data Confidential
Avaya or Business Partner Professional Services Suite of Services Designed for Avaya Networking Extensive Data Center & Campus experience Fixed Price, Fixed scope services Financial models for ROI/TCO Full turnkey and standalone servicesTech Data Confidential
Application-First NetworkingTech Data Confidential