SlideShare a Scribd company logo
1 of 13
SOFTWARE DEFINED NETWORKING:
FROM CAMPUS TO CARRIER
TO CLOUD
Shehzad T. Merchant

                      © 2012 Extreme Networks, Inc. All rights reserved.
Two Major Themes: Convergence and Mobility

                                         Ethernet
     3G / 4G      WLAN                          LAN                              Data Center         The Cloud

                          Seamless User Experience


                                                                      WIRED
                                                                                               Information
                                                                   WIRELESS                      Content
                                                                                               Applications
                                                                      3G / 4G




                 Businesses Are Being Mobilized
               SDN Can Deliver High Value & Make This a Reality


2                           © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Campus
                                                          Role                   Internet   Intranet   Mail   CRM/Database   VLAN

                                                          Unauthenticated           Yes       No       No          No        Default
                                                          Contractor                Yes       Yes      No          No        Default
                                                          Employee                  Yes       Yes      Yes        Yes        Default
User: John
Role: Employee
Resource Access = Permit All




User: Alice
Role: Contractor
Resource Access = Deny Mail and CRM




User: Bob
Role: Unauthenticated
Resource Access = Internet Only


 Page 3                               © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Data Center
                                                                VM
                                                                Role                      Finance Accounting
                                                                                       Internet Intranet Mail         Engineering
                                                                                                                       CRM/Database VLAN
                                                                                                                                     VLAN

                     VM                                         Payroll
                                                                Unauthenticated           Yes Yes   No    No    No        NoNo     Default
                                                                                                                                    Default
                                                                Employee
                                                                ContractorDatabase Yes No           Yes   Yes   No        NoNo      Default
                                                                                                                                     Default
                                      Hypervisor                Outlook
                                                                Employee                  Yes Yes   Yes   Yes   Yes       No
                                                                                                                           Yes      Default
                                                                                                                                     Default
User: John
VM: Payroll
Role: Employee
Access = Finance
Resource Access = Permit All




                     VM

User: Alice
VM: Employee Database
Role: Contractor
Access = HR
Resource Access = Deny Mail and CRM
                                      Hypervisor




                     VM
VM: Outlook
User: Bob Employees
Access = All
Role: Unauthenticated
Resource Access = Internet Only


 Page 4                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Demarcation of the Access Edge no longer in the Wiring Closet
    • Access edge border now extends within the Enterprise Data Center …
      the “virtual wiring closet”
      • That’s where Virtual Desktop Machines are located
      • User sessions are now initiated within the Enterprise Data Center




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


5                                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Controls needs to be applied at Access Edge and within the Data
      Center ToR
    • Identity, Roles and Mobility pervasive across Campus and DC
      • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine
      • Dynamic roles, policies, and identity need to be consistent




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


6                                                     © 2012 Extreme Networks, Inc. All rights reserved.
Enter Software Defined Networking
    • De-Couple Forwarding and Policy Decisions From Network Connectivity
      and Topology
    • Centralized, Consistent Policy and Management Model
     • Campus edge to DC server edge and into the mobile carrier edge


                                                   Ethernet
               3G / 4G        WLAN                      LAN                   Data Center      The Cloud

                                    Software DefinedExperience
                                     Seamless User Networking


                                                                        WIRED
                                                                                        Information
                                                                     WIRELESS               Content
                                                                                        Applications
                                                                       3G / 4G



                            Businesses Are Being Mobilized
                         SDN Can Deliver High Value & Make This a Reality


7                                  © 2012 Extreme Networks, Inc. All rights reserved.
Where Are The Deployments?


    • Mostly Early Trials
     • Universities, Enterprise Campus, DC and Cloud
    • Building Knowledge, Expertise and Comfort
    • But, With Growing Interest…




8                            © 2012 Extreme Networks, Inc. All rights reserved.
Challenges
    • Lack of Maturity
    • Standards Changing/Evolving Quickly
    • Limited Silicon Support
    • Vendor Commitment
    • Lack Of Vendor Interoperability
     • Controller, Switch, Security, Policy
    • The Proverbial Departmental Divide
    • Misplaced Expectations
    • Demonstrable ROI v/s Existing Vendor Approach




9                               © 2012 Extreme Networks, Inc. All rights reserved.
Technology Adoption Cycle



                OpenFlow




     Interest




                                                  Time


10                         © 2012 Extreme Networks, Inc. All rights reserved.
Looking To the Future – OpenFlow App Store?


 • OpenFlow becomes the Android of networking
 • OpenFlow and related specifications all available as
   Open Source
 • Apps for every need – From QoS, to PBR, to Identity and
   mobility, to multi-tenancy
 • ONF becomes the Marketplace for OpenFlow Apps?
 • Controller vendors eventually become application developers




11                      © 2012 Extreme Networks, Inc. All rights reserved.
Thank you



© 2012 Extreme Networks, Inc. All rights reserved.
Mobility Drives the Cloud

                                           Ethernet
     3G / 4G        WLAN                          LAN                              Data Center         The Cloud

                            Seamless User Experience


                                                                        WIRED
                                                                                                 Information
                                                                     WIRELESS                      Content
                                                                                                 Applications
                                                                        3G / 4G




                   Businesses Are Being Mobilized
               Extreme Can Deliver High Value & Make This a Reality


13                            © 2012 Extreme Networks, Inc. All rights reserved.

More Related Content

What's hot

Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!Jeff Danielson
 
Cmg app migration ppt
Cmg app migration pptCmg app migration ppt
Cmg app migration pptRaja Ahmed
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Shelf Companies Aust
 
WebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOAWebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOAJason Faszholz
 
Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011Perfecto Mobile
 
Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5Angel Ortíz Pérez
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Applicationbgalusha
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weathertodd.lewis
 
Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]Erik Schmude
 
Bell Total Connect Voice Webinar
Bell Total Connect Voice   WebinarBell Total Connect Voice   Webinar
Bell Total Connect Voice WebinarVani Edwardson
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customerddeschenes99
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solutionbackfire_88
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatureseSignLive by VASCO
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 

What's hot (19)

Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
 
Cmg app migration ppt
Cmg app migration pptCmg app migration ppt
Cmg app migration ppt
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
 
WebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOAWebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOA
 
Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011
 
Dms introduction
Dms introductionDms introduction
Dms introduction
 
Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
E dms
E dmsE dms
E dms
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weather
 
Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]
 
Bell Total Connect Voice Webinar
Bell Total Connect Voice   WebinarBell Total Connect Voice   Webinar
Bell Total Connect Voice Webinar
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customer
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 

Similar to OpenFlow, the Android of Networking?

Identity management
Identity managementIdentity management
Identity managementkamalikamj
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Riverbed Technology
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionCloudOps Summit
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentAntenna Software
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netRaman K. Attri
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexicoGeneXus
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexicoGeneXus
 
雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會併力科技 JFT
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future StateBruce MacVarish
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...Peter de Haas
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Dropbox
 

Similar to OpenFlow, the Android of Networking? (20)

Identity management
Identity managementIdentity management
Identity management
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
 
雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
S series presentation
S series presentationS series presentation
S series presentation
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

OpenFlow, the Android of Networking?

  • 1. SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER TO CLOUD Shehzad T. Merchant © 2012 Extreme Networks, Inc. All rights reserved.
  • 2. Two Major Themes: Convergence and Mobility Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 2 © 2012 Extreme Networks, Inc. All rights reserved.
  • 3. Mobility and Tenancy In the Campus Role Internet Intranet Mail CRM/Database VLAN Unauthenticated Yes No No No Default Contractor Yes Yes No No Default Employee Yes Yes Yes Yes Default User: John Role: Employee Resource Access = Permit All User: Alice Role: Contractor Resource Access = Deny Mail and CRM User: Bob Role: Unauthenticated Resource Access = Internet Only Page 3 © 2012 Extreme Networks, Inc. All rights reserved.
  • 4. Mobility and Tenancy In the Data Center VM Role Finance Accounting Internet Intranet Mail Engineering CRM/Database VLAN VLAN VM Payroll Unauthenticated Yes Yes No No No NoNo Default Default Employee ContractorDatabase Yes No Yes Yes No NoNo Default Default Hypervisor Outlook Employee Yes Yes Yes Yes Yes No Yes Default Default User: John VM: Payroll Role: Employee Access = Finance Resource Access = Permit All VM User: Alice VM: Employee Database Role: Contractor Access = HR Resource Access = Deny Mail and CRM Hypervisor VM VM: Outlook User: Bob Employees Access = All Role: Unauthenticated Resource Access = Internet Only Page 4 © 2012 Extreme Networks, Inc. All rights reserved.
  • 5. VDI Provisioning: The Lines Are Blurring • Demarcation of the Access Edge no longer in the Wiring Closet • Access edge border now extends within the Enterprise Data Center … the “virtual wiring closet” • That’s where Virtual Desktop Machines are located • User sessions are now initiated within the Enterprise Data Center Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 5 © 2012 Extreme Networks, Inc. All rights reserved.
  • 6. VDI Provisioning: The Lines Are Blurring • Controls needs to be applied at Access Edge and within the Data Center ToR • Identity, Roles and Mobility pervasive across Campus and DC • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine • Dynamic roles, policies, and identity need to be consistent Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 6 © 2012 Extreme Networks, Inc. All rights reserved.
  • 7. Enter Software Defined Networking • De-Couple Forwarding and Policy Decisions From Network Connectivity and Topology • Centralized, Consistent Policy and Management Model • Campus edge to DC server edge and into the mobile carrier edge Ethernet 3G / 4G WLAN LAN Data Center The Cloud Software DefinedExperience Seamless User Networking WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 7 © 2012 Extreme Networks, Inc. All rights reserved.
  • 8. Where Are The Deployments? • Mostly Early Trials • Universities, Enterprise Campus, DC and Cloud • Building Knowledge, Expertise and Comfort • But, With Growing Interest… 8 © 2012 Extreme Networks, Inc. All rights reserved.
  • 9. Challenges • Lack of Maturity • Standards Changing/Evolving Quickly • Limited Silicon Support • Vendor Commitment • Lack Of Vendor Interoperability • Controller, Switch, Security, Policy • The Proverbial Departmental Divide • Misplaced Expectations • Demonstrable ROI v/s Existing Vendor Approach 9 © 2012 Extreme Networks, Inc. All rights reserved.
  • 10. Technology Adoption Cycle OpenFlow Interest Time 10 © 2012 Extreme Networks, Inc. All rights reserved.
  • 11. Looking To the Future – OpenFlow App Store? • OpenFlow becomes the Android of networking • OpenFlow and related specifications all available as Open Source • Apps for every need – From QoS, to PBR, to Identity and mobility, to multi-tenancy • ONF becomes the Marketplace for OpenFlow Apps? • Controller vendors eventually become application developers 11 © 2012 Extreme Networks, Inc. All rights reserved.
  • 12. Thank you © 2012 Extreme Networks, Inc. All rights reserved.
  • 13. Mobility Drives the Cloud Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized Extreme Can Deliver High Value & Make This a Reality 13 © 2012 Extreme Networks, Inc. All rights reserved.