SlideShare a Scribd company logo
1 of 205
By Jeff Green
(772) 925-2345
8/7/2019
The O.G. “Original Gangsters”
Wired and Wireless.
The O.G. Original Gangsters Wired and Wireless.
1) Extreme - the O.G. of Layer 3 Gigabit Ethernet.
2) Enterasys - the O.G. of One Fabric Policy.
3) Symbol – the O.G. of the wireless controller.
4) Nortel - the O.G. of Metro Fabrics.
5) Brocade – the O.G. of Internet Routers.
6) Aerohive – the O.G. of Mesh and Cloud WiFi.
7) Open Compute – the new O.G. of Open Technology.
One goal to deliver next-generation networks.
https://prezi.com/view/avGmnVQCt6jS3MynQUY9/
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.1
Re-thinking - The Next Generation network.
The problem with most gangsters is that there are only so many themes to explore, only so many
submachine guns to fire. Ice-T won respect as a street rap and made a living being the most
disruptive gangster rapper on the West Coast. His hard-hitting music was about escaping the
ghetto minefield of gangs, guns, and drugs during a cookie-cutter age of Music. His beats are
funky and unremittingly hard, including the whooping. According to Urban Dictionary’s most
popular definition, OG is a simple abbreviation that “used to mean Original Gangster.” It has
since been further co-opted to mean utterly “original.” 1
The original competitors in the Ethernet market remind me of gang members who each had their
unique advantages to win over their turf. Over the past few years, Extreme assembled seven
gangers from a variety of backgrounds with their strengths to perform a mission and deliver a
new level of value to our customers. Extreme has adopted a gangster strategy going against the
grain of the market leader. So far, the gangster strategy has been a winning strategy.
When market leaders are proposing proprietary solutions, Extreme went open Linux with
“superspec.” When they pushed DNA and its additional complexity, Extreme responded by re-
thinking the way networks are designed, deployed, and managed without vendor lock-in.
Finally, when they tied to service and to licensing together with Cisco One, Extreme responded
with added flexibility in both licensing, services, and Extreme-as-a-service.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.2
Extreme is the “Original Gangster” of Layer 3 Gigabit Switching.
Extreme, with over 20 years’ experience, was a pioneer in Ethernet networking. In the
beginning, it was about speeds, feeds, and protocols. The Summit One delivered the first Gig
Ethernet switch and then the first 10 Gig Ethernet switch. Summits provide deterministic
performance independent of load or what features are enabled. However, we were a box
company based on the internal development of our merchant silicon. We quickly recognized that
this approach would not sustain us into the future and deliver our customer the value they want
out of their networks. As a result, we made a problematic shift to merchant silicon, which gave
us the ability to deliver our customers both the feature function of Cisco and the value of HP.
We changed our approach to focus on providing the best NoS from Broadcom silicon.
Today, Extreme has adopted a cross-platform strategy designed to meet our changing times with
no vendor lock-in. Today no single technology can drive the networking market forward.
However, today’s complex network environments can delay the deployment of new technology
while inflicting more support cost each year. Deploying a Cisco network is anything but simple;
the most prominent thing customers should demand with technology convergence should be
simplicity. Cisco is responding to this issue with Cisco DNA yet another expensive vendor lock-
in. Today, there is a sense that there hasn't been a credible alternative to Cisco. More customers
are looking at multi-vendor solutions and demanding seamless integration, which will threaten
proprietary vendors. Extreme looks forward to offering differentiated solutions for everything
from data centers to the Internet, easing "Cisco fatigue.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.3
“Purple Metal”, Extreme’s pivot towards value.
Extreme is a better mousetrap which delivers new features, advanced function, and wire-speed
performance. Our switches provide deterministic performance independent of load or what
features are enabled. All Summit Switches are based on the XOS modular operating system.
Purpose-built for Broadcom Merchant silicon, XoS delivers higher availability and better value.
By isolating each critical process in its own protected memory space, a single failed process will
not take the entire switch down. Extreme products are purposefully built to be faster while
delivering higher value to customers.
When building routers and switches, only a few components are custom designed as most
components are ‘off the shelf’ – for example, the management boards use industry-standard
CPU such Intel x86 or i960 network processors and use off the shelf memory and flash. The
custom silicon performs specific functions such as the frame switching, the backplane
forwarding, or another specialized packet handling. Merchant Silicon will dominate, and over
time, physical networking products will become commodities that are differentiated by software
features and advanced services.2
Ask yourself this simple question:
“Is your network faster today, then it was three years ago,”3
In many cases, the change will represent a risk. Thus, the reason for the change needs to be
more compelling than the risk.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.4
Enterasys is the “Original Gangster” of the One Fabric Policy.
Many people look at Ethernet Switching as just a critical sustaining technology. Enterasys
technology helped organizations to make measurable improvements.4 Simplicity was the
essential factor for driving customers to deploy Enterasys technology. The Enterasys vision was
to treat your network as a strategic asset while streamlining the process, the expertise of
learning, managing, and integrating the various tools that manage your system. The key was to
control the network as needed by the user, device, location, application to reduce the time
necessary to implement its network-wide policy and control.
“Gangster” Differentiators (Ethernet Everywhere).
Save the cost of additional visibility, policy, and load balancing tools – its already in the switch.
Enterasys believe that tomorrow’s network won’t look like today’s network. Until you address
increasing network complexity growing Wi-Fi demand and decreasing network visibility, you
won’t be able to confront the challenges of the future without impacting your business
performance. When you choose Enterasys, you will have a unified and adaptable architecture
wireless scale and density and end-to-end device and application analytics. T
Today, Extreme delivers on this vision with the additional performance and value brought by
XoS. It’s not good enough to provide connectivity: it’s also essential that the network delivers
connectivity in a controlled and manageable way. Customers need to be able to control access to
services on a granular level, rather than block entire segments of the user community wholesale.
With Extreme, services can easily be defined and provisioned on-the-fly without disruption –
and without time-consuming and expensive weekend and evening change windows.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.5
Symbol Technologies is the “Original Gangster” of the wireless controller.
Symbol Technologies was co-founded in 1973 by Jerome Swartz and physicist Shelley A.
Harrison. Under Swartz's leadership, the company became a leader in bar code scanning
devices. The company focused heavily on the retail industry5. At that time, the mobility market
was dominated by Symbol Technologies and Telxon. Most notably, these two companies
serviced significant retailers such as Wal-Mart, Kroger, Safeway, Federated, and others.
A notable turning point occurred in 1994 during a competition for business at Kroger between
Symbol and Telxon. Symbol positioned frequency hopping as the most robust, while Telxon
selected linear sequence technology. Kroger ordered a head-to-head comparison test. Ultimately
and not decisively, Kroger chose Telxon over Symbol. At about the same time, the IEEE decided
to adopt the direct sequence approach in its IEEE 802.11b standard.6 As a result, the direct
sequence wireless approach was taken, and later, Symbol went on to purchase Telxon.
Symbol One DNAApproach from Access Point to Controller.
Symbol temporarily dominated the resulting 802.11b market.
 Cisco purchased Telxon's Aironet division (moved the WiFi market to the mainstream).
 In 2007, Symbol was acquired by Motorola for $3.9 billion.
 October 2014 Zebra Technologies acquired Motorola Solutions' Enterprise business.7
Today, Extreme still has the Kroger wireless business. After combining Zebra’s WLAN with our
wired and wireless, we have created the industry’s number three WLAN powerhouse. As a
result, in 2018, we were recognized as a top-three leader in the Gartner Magic Quadrant.
Extreme’s heritage of delivering innovative and pioneering technology is reinforced with the
integration of Extreme’s high-density wireless and distributed wireless from the Zebra
acquisition. The resulting new disruptive technology is today’s Wing 7 solution featuring
unified visibility and control across a complete wired and wireless solution.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.6
Nortel is the “Original Gangster” of Fabric.
In 1995, Cabletron came up with the idea of Secure, fast Vlans, which uses OSPF at layer 2,
providing 'cut-thru' inter-VLAN switching and ultimately replacing STP. One of the architects
(John Roese) of Securefast became the CTO of Nortel and introduced this idea to Nortel's R&D,
and Provider Link State Bridging was born. This protocol pretty much became SPB (IEEE
802.1aq). Flooding and MAC address learning is restricted to the SPB edge and encapsulated
within the MAC addresses of the source SPB switch and the destination SPB switch.8
Extreme’s strategy for Campus Automation begins with re-thinking the way networks are
designed, deployed, and managed. Extreme’s Fabric-based systems enable faster configuration
and troubleshooting; As a result, there is less opportunity for misconfiguration. Several
automation solutions designed to enhance security often force network managers to accept
complexity.9 A single Ethernet switch provides ‘Flat – any port to any port’ connectivity. A true
Network Fabric requires that in addition to being ‘Flat,’ it also operates and is managed as a
single device, with all ports sharing a common state so that any packet only needs to be
processed once to be able to reach a destination (single hop).
Forget about bottlenecks that slow the deployment of applications and services. With your 7-
10-year horizon, elasticity is critical to maintaining agility within your network. Fabric networks
simplify operations, reduce cost, and create more efficient team productivity. Cutting intricate
protocol overlays eliminate complexity, allows for faster recovery times, simplifies
management, and support easier troubleshooting. Fabric Connect supports a dynamic
environment where new or changed services can be implemented on the fly—taking only
minutes instead of days, weeks, or months.10
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.7
Foundry is the “Original Gangster” of routers.
Is it routing fast follower? In addition to an unparalleled cost/feature ratio, Foundry offered
products that rivaled the performance of any hardware on the market. In March of 2006, a team
from the University of Tokyo set a record for Internet2 Land Speed in both the IPv6 and IPv4
single and multi-stream categories. This record represents the fastest rate at which data can be
transferred, multiplied by the distance traveled — three key Foundry Router Advantages.11
Brocade IP fabrics deliver scalable performance with ease, leveraging the simplified IP Clos
architecture with Equal Cost Multi-Path (ECMP) routing. VDX switches in a spine-leaf
deployment serve as the building blocks of an Extreme IP fabric, providing a non-blocking and
scalable framework. Based on open standards and a cloud-proven BGP architecture, IP fabrics
offer flexibility for maximum interoperability. Data Center administrators can easily add spine
and leaf devices as needed to increase path diversity and bandwidth for east-west traffic,
enabling higher application performance and resilience.12
The primary business drivers for routing are to provide ubiquitous, secure, and ready application
availability and web access for employees. When properly used as part of a network foundation,
routers can help optimize application availability, improve employee productivity, boost
customer responsiveness and loyalty, and spur company competitiveness and time to market.
Routers also can help overcome the limitations of geography between small-medium businesses
and their customers, partners, and suppliers. They can mitigate business conduct restraints that
are tied to physical office locations.13
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.8
Aerohive is the “Original Gangster” of Cloud WiFi.
Extreme and Aerohive have entered into a definitive agreement under which Extreme will
acquire Aerohive for approximately $272 million. The acquisition of Aerohive will add critical
cloud management and edge capabilities to Extreme’s portfolio of end-to-end, edge to cloud
networking solutions. It will provide a reliable subscription revenue stream and strengthen
Extreme’s position in wireless LAN at a critical technology transition to Wi-Fi 6. The
acquisition of Aerohive establishes our leadership in cloud, AI, and ML, adding a proven and
mature cloud services platform and subscription service model for Extreme’s customers and
partners.14
In 2007, Aerohive introduced the HiveAP 20 ag CC-AP and HiveManager Network
Management. With these releases, Aerohive is the first vendor to enable both Layer 2 and Layer
3 roaming in a wireless network without the need for a dedicated controller. Later in 2009,
Aerohive released a ground-breaking option for wireless management as (SaaS) cloud
management platform. This acquisition by Extreme is a significant milestone for Aerohive. The
role that cloud-managed technology plays in modern enterprises is impossible to overstate – it is
where digital transformation is won and lost. Aerohive’s expertise and excellence in cloud
management and edge technology, combined with Extreme’s extensive solutions portfolio and
continued investment in software and AI for automation, gives our customers the most advanced
digital experiences in the market. Together we will push networking into a new era – making
infrastructure smarter, more autonomous, and the driver of business value.15
Aerohive has a global footprint of 30,000 cloud wireless LAN customers in verticals including
education, healthcare, state and local government, and retail. This acquisition will bring new
automation and intelligence capabilities to Extreme’s Elements portfolio. It will expand
Extreme’s technology leadership in Wi-Fi and NAC, adding cloud-managed Wi-Fi and NAC
solutions to complement its on-premises Wi-Fi and NAC technology, driving Extreme deeper
into crucial verticals and presenting numerous opportunities for cross-selling and up-sell within
the combined portfolios.16
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.9
The new Gangster is delivering Hyperscale value for the rest of us!
“Purple Metal” isn't just about saving money. It's up to you--not some vendor--to decide when
it's time to upgrade. React to marketplace demands quickly. Open source provides this to
developers and businesses alike by speeding up the pace of software development. Free
themselves from severe vendor lock-in — the worldwide community of developers and users at
their disposal for help. Whether a company is big or small, it'll stop developing code if it's no
longer commercially viable, and you no longer have access to the source code and
repositories.17
In the late 1990s, our ASICs had some significant benefits, mainly in the amount of buffering
they could provide compared to merchant silicon. By 2005, those ASICs had turned into a
disadvantage, because the next generation was late and expensive. By late 2009, We were using
mostly merchant silicon. Routers will route, switches will switch, and processing will occur the
same way. The future will be based on CLOS designs using clusters of chips instead of intricate
models. Companies focused on making ASICs are starting to innovate and progress faster than a
company with several business units; all are fighting for resources. Now merchant suppliers
have the advantage by keeping complete fabrication in house. They don’t outsource parts of
their ASIC fabrication for scale.
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.10
EXTREME TABLE ON CONTENTS
Chapter 1 - “The O.G. Original Gangsters Wired and Wireless”
https://prezi.com/view/avGmnVQCt6jS3MynQUY9/
Extreme (Original Gangster of Layer 3 Gigabit Switching…………………………….1.3
Enterasys (Original Gangster of One Fabric Policy-based Switching)..…………….....1.4
Symbol (Original Gangster of the wireless controller)..……………...………………...1.5
Nortel/Avaya (Original Gangster of Fabric)..…………………...……………………...1.6
Foundry/Brocade (Original Gangster of Routers)..………………...…………………..1.7
Aerohive (Original Gangster of Cloud WiFi)..………..………………………………..1.8
“Purple Metal” (Hyperscale value for the rest of us)......................................................1.9
Chapter 2 - You might ask yourself who is breaking the law?
https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk
Extreme Law (Connected controlled devices create more value)………………...……2.1
Moore's Law (Transistors doubling every two years)………………….……………....2.5
Metcalf's Law (Connected users create more value)………………...………………..2.11
Reed's Law (Decline in the cost and the internet exponential growth)……………….2.12
Wirth's Law (Software gets slower faster than hardware gets faster)…………………2.13
The Evil twin of Technology (Technology can have a negative value)……………….2.16
Chapter 3 - Connecting the Smart Classroom
https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk
70% of schools are moving to digital textbooks.……………………………………….3.1
43% of schools do not control each student’s access….……...………………………..3.4
20% of kindergartners have Internet-connected phones………………………………..3.5
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.11
Chapter 4 – “The iron triangle of switches.” Fast, Good, or Cheap. Pick three.
https://prezi.com/view/TUev1OQRff4sIzFVjvxQ/
XoS is what Design Equity is all about………………………………………………...4.4
Extreme's Insight Architecture…………………………………………………………4.7
Kubernetes, Microservices……………………………………………………………..4.8
Bare to Grey to Purple Metal…………………………………………………………..4.9
XoS Stacking (Vertical and Horizontal) …………………………..………………….4.11
Controlling Bridge Options…………………………………………..……………….4.12
What? – Watt! – Next Generation PoE………………………………………………..4.13
Chapter 5 - Symbol Invented the Wifi Controller.
https://prezi.com/view/P2l5BX36QTNYxDdUAEUW/
Simple Virtual Control (One Software Track)………………………………………....5.3
Distributed Stateful Firewall (Session Persistence)…………………………………....5.4
Extreme Location………………………………………………………………………5.7
Security built-in with Air Defense…………………………………………………….5.17
Unified Wired and Wireless Fabric……………………………………………………5.20
Chapter 6 - Become the QB1 of your Wireless Network.
American Football
https://prezi.com/view/fU2tTGdBvs6jBCiVjGGj
Rest of the World Football
https://prezi.com/view/vWJ3A0677YIQvXRBEhem/
Purpose-Built Networking Solutions…………………………………………………..6.3
Great Wifi has in common with an NFL Quarterback?.................................................6.10
Modulation based on football metaphor………………………………………………6.12
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.12
Chapter 7 - Maslow Hierarchy of Needs, if he did his study today.
https://prezi.com/view/2MF4lw0eReIAihT8YICN/
Where would you put Wi-fi in your hierarchy of needs?................................................7.1
Pros and cons of cloud-managed deployments……………………………………...…7.4
Exceptional Quality of Experience…………………………………………………….7.5
Cloud Managed Networks can be more secure…………………..……………………7.7
No controller hardware limitations………………….…………………………………7.8
Thinking Beyond Hardware…………………………………..………………………7.12
Chapter 8 - Build-up (North-South) hierarchical vs. Built-out (East-West) Fabrics
https://prezi.com/view/wvdVOB1lkj11jLLc8ER6
Ethernet “Old Boots” has a lot more to offer…………………………………………8.1
IoT is the “New Dirt" coming from everywhere…………………….………………..8.2
Spine Leaf designs are like the “Old Boots”………………………………………….8.4
Hyper Compute is like the “New Dirt”.………………………………………………8.5
Underlay Use Case……………………………...................…..……………………..8.10
Overlay Control Plane (BGP-EVPN) ……………………………..…………………8.11
Chapter 9 - Great Networks are built like “a great candy bar.”
https://prezi.com/view/Qb1V9pp91lMCrJ36hof7/
Multiservice networking without multiple protocols…………………………………..9.2
Decoupled Control Planes……………………………………………………………...9.3
Topology freedom………………………….…………………………………………...9.4
Service Provider Experience…………………………………………………………....9.6
SPB IP Multicast (no PIM required).………………………….………………………..9.8
Network Segmentation - Reduce the Attack Vectors………………..………………….9.9
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.13
Chapter 10 - The "Honey Badger" of the Campus Network"
https://prezi.com/p/f5wrfvb8jkrx/automated-campus/
Scale by eliminating protocols…….………………………………………………….10.3
Honey Badger – no more Flood and Learn……………..…………………………….10.4
Loops - Extreme Fabric don't care…………………………………………………….10.6
Invisible Core: 11x Better with Edge-Only Provisioning…..…………………………10.7
PIM-Free IP Multicast……….………………………………………………………..10.8
Faster time to Service with Simple Edge Provisioning…………………………..….10.10
Chapter 11 - The Changing Network Perimeter.
https://prezi.com/view/vWJ3A0677YIQvXRBEhem
Changing Network Perimeter, BYOD is a new normal………………………………11.1
The secret mission to steal a Romulan cloaking device………………………………11.2
Security includes all people, processes, and technology………..…………………….11.4
The concept of ‘attack trees,’………………...………………………………………..11.5
The Changing Network Perimeter………………………….…………………………11.7
Why your SOC and NOC should run together but separately……...…………………11.8
Chapter 12 - Don’t play the Kevin Bacon game with your network.
https://prezi.com/view/SN14ABZCYWBb3dPi7QJT/
How to hide your IP address from Kevin Bacon…………………………………….12.0
Satisfy all aspects of the multi-tenant requirement…………………………..………12.4
Fabric Connect Stealth Networking Services………………………………………..12.6
Minimize the XYZ Account ’s attack surface………………………………….…….12.8
Dark network topology enabled through stealth networking………..……………….12.9
Stealth Networks are private ‘dark’ networks………………...……………………..12.10
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.14
Chapter 13 - Classroom Transformation 2020.
https://prezi.com/view/yQQqKuu8lDcbepYqIr58/
Access Control to the 2020 Classrooms…………………………….……………….13.1
Because XYZ Account Teachers don’t know what a MAC address is………………13.2
Teachers neither know or care to understand how the technology operates…………13.4
A solution that Learns (Smart URL based detection)…………..……………………13.6
Guest access makes use of built-in web portals included…..………………………..13.8
Eliminate XYZ Account manual audits with automated assessments……………….13.9
Chapter 14 - Extreme Policy (One-click – One thousand actions)
https://prezi.com/view/cRGzaknwAJBMgRJbjhbj
Stop playing whack-a-mole with your network access control……………………….14.1
Digital Transformation requires a visibility…………………………………………...14.3
What XYZ Account the cost to chaos ratio is?..............................................................14.6
You can prevent escalation of disruptive behavior…………………………………..14.10
Govern the moles to their holes………………………………..……….……………14.12
Containing several moles with the fewest clicks…………………………….………14.16
Chapter 15 - Improve both operator experience and user experience!
https://prezi.com/view/d75y9C05PqsounspCt4f/
Law of Accelerating Returns………………………….………………………………15.1
What is Artificial Intelligence?......................................................................................15.2
Enablers for digital transformation……………………………………………………15.4
Its kind-of like Lip Reading with excellent memory…….……………………………15.6
Conventional View of the Analytics Space…………………………………………....15.8
Root Cause Determination and Machine Learned results………….…………………15.9
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.15
Chapter 16 – XOS Summit Switches deliver hop-by-hop encryption.
https://prezi.com/view/5q7t9bhF7mJYJ8Uk07tD
Enhanced Edge Security with X465 and Insight Guest VM.......................................16.1
The LRM/MACsec Adapter…………………………………………………………16.4
Localization of network communication………………………………………..…...16.5
Why is a layered approach better with MACsec?.......................................................16.7
Combine MACSec with IPsec………….…………………………………………....16.8
MicroVSP (MicroVSP for small branches or sites).…………….……………….....16.12
Chapter 17 - What’s the first rule of IoT? Nobody talks about IoT.
https://prezi.com/view/EBGga5FVgtAdKnx2Y6Rz
Simple - Automated Onboarding…………………………………………………….17.1
Understand - The traffic to the with Auto Policy Generator…………………………17.4
Know - You must understand the threat vector………………………………………17.6
Complimentary to existing security infrastructure……..……………………………17.7
Securing Medical and other Connected Devices with Ease…………………...……..17.8
Secure and straightforward Device Mobility - help you punch up……….………….17.9
Chapter 18 - PhySec Surveillance, Security.
https://prezi.com/view/AIzbmqiEbfii9yTEMnOv
Think of the smart building as another application…………………………………...18.1
Over 70% of surveillance issues can be attributed to the network……………………18.3
PhySec Design Concerns from DoDEA………………………………………………18.5
Transformational Changes to PhySec solutions………………………………………18.6
Fabric Connect is a new more straightforward way to build networks……………....18.9
To configure your type “Enable Multicast” on end-points…………………………..18.10
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.16
Chapter 19 - "The Times - They Are a-Changin.'”
https://prezi.com/view/OGNFfY7R8k2V0tMz9mAs
What if, you asked the Network?...………………………………..………………….19.1
Visibility and control…………………………………………………………….……19.2
Flow-based architecture……………………………………………………………….19.3
Why do this in the network?..........................................................................................19.5
The risk versus time…………………………………………………………………...19.6
A system built for excellent user experience, devices, and things…………………….19.9
Chapter 20 – Extreme Workflow Manager is like the United Nations of scripting.
https://prezi.com/view/V50qVnolQfibB9mCWET9
Improved Management XYZ Account Staff Productivity…………………………….20.1
Automating Is Not Enough (handoffs create delays)………………………………….20.2
Workflow-centric, cross-domain (2000+ integrations).……………………………….20.3
Automating Silos is Not Enough (handoffs create delays)……………………………20.4
Operational agility (DevOps-inspired) ………….……………………………………20.5
Troubleshooting (automation that responds) ……………..................………………..20.6
Chapter 21 -The Underlay and the Overlay, enter your Matrix?
https://prezi.com/view/vwHzNP1qfXoKuwmq8pN0/
Plugged into the Matrix (“Like a VM in an SSDC”)………...……………………….21.1
Future networks must demonstrate that they can protect privacy…………………….21.2
Location Independence, VMs need mobility………………………………………….21.3
Physical infrastructure-independent, use existing deployments………………………21.4
Application Consumption – Anywhere, Anytime, Any Device………………………21.5
Agent Smith- Put an End to the Zombie Apocalypse...................................................21.6
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.17
Chapter 22 - ExtremeOrchestrator - We're selling holes, not drills!
https://prezi.com/view/7FZo2o1a3MDiTHB5XSfJ/
ExtremeOrchestrator delivers rack collapse……………….………………………….22.1
Temporally-aware Micro-segmentation………………………………………………22.2
Assignment based on time of day/day of the week…………………………….……..22.3
What can a captive portal do?.......................................................................................22.4
Integrated Content Filtering - Block entire domains………………………...………..22.5
Shared infrastructure? No VLANs? No problem…………………...……….………..22.6
Chapter 23 - Extreme Control XMC "Extreme Networks can keepyour Network 100".
https://prezi.com/view/C9aaM51gUNEdcIk0g2VS/
Your organization is changing fast, so is your network……………………………….23.1
Make real-time decisions 100 based on actionable data………………………………23.2
Deliver your users a great user experience………………..…………………………..23.4
Know the where - so you can also “keep it 100”……………..……….………………23.5
Know the What - “keeping it 100”……………………………………………………23.6
Know the when - “keeping it 100”……………………………………………………23.7
Chapter 24 – When is "More Cowbell" required for Internet-scale border routing?
https://prezi.com/view/PTq302mzx61uGIX0kr0G/
More cow-bell for cloud-scale routing………………………………………………..24.1
Agility - Let Your Routers Route……………….…………………………………….24.3
Elastic - Examine current trends and constraints……………………………………..24.5
Enables simple IoT at scale………...…………………………………………………24.6
Need for Integrated Switch Buffers………………...…………………………………24.8
Buffer bloat (is buffer always better?) …………………….………………………….24.9
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.18
Chapter 25 - Extreme Elements - The Extreme Solutions Framework.
https://prezi.com/view/DZmrqdDOtaxPjyLkkfci/
The central nervous system of an Autonomous Enterprise…………………………...25.1
Connects humans, machines, and devices to technology……………………………..25.2
Autonomous Network Endless combinations of outcomes………………...…………25.3
A Smarter Network Begins at the Edge……………………………………………….25.4
Reducing Time-to-Solution………….………………………………………………..25.5
A port is what it is because?..........................................................................................25.6
Chapter 26 - Complexity versus Chaos (Extreme Capital Solution).
https://prezi.com/view/GUji2UurN3oD8HTEjsmh/
Find the right payment plan……………………………...……………………………26.1
Offers OpEx, as-a-service……………………………………………………………..26.2
Extreme, as-a-service…………………………………………….……………………26.3
On-demand upgradability………………………….………………………………….26.4
Predictable payments……………………...………………………….……………….26.5
Purchasing contract………………………………...………………………………….26.6
Chapter 27 - Is Layer-8 a thing? (The Political Layer)
https://prezi.com/view/cjLvRipjCh390XFXIpsj/
This layer can be the most difficult to navigate………………………………………27.1
Smartnet Fatigue (Cisco ONE Software)……………………………………………..27.2
Vendor Lock-in (Lack of software agility)……………………………………………27.3
High Cost (“Lumpy” spending patterns)……………………………………………...27.4
Arrogance (Oh you want to leave, OK).………………………………………………27.5
Would you switch vendors (What if Extreme was free)?..............................................27.6
Thursday, August 8, 2019 “Original Gangster”
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.19
Chapter 28 - The Goldilocks of the Network Industry
https://prezi.com/view/TUev1OQRff4sIzFVjvxQ/
Has Extreme entered the Goldilocks Zone of Networking?.........................................28.1
The feature function of Cisco and Value of HP………………………………………28.2
Adjusts quickly to business and technical challenges…………….…………………..28.3
Easily adapts to new workloads and innovations……………………………………..28.4
Enables simple - reliable communications...………………………………………….28.5
“I want it all, and I want it now” ……...……...………………………………………28.6
Chapter 29 – Can you enjoy a Jetsons user experience on a Flintstones Network?
https://prezi.com/view/JA61P1bjDadT6aVjy7Nc/
The Extreme Networks Business Case……….…………….........................................29.1
Complex Protocol Stack vs Ethernet Fabric Simplicity………………………………29.2
Design - Networking is still complex!..………………...………….………………….29.3
Simple and field-proven Campus Fabric……………………………………………...29.4
Strategy………………………………….....………………………………………….29.5
Delivery………………………...……...……...………………………………………29.6
Chapter 29 – Extreme Open Platform – v - DNA Closed networks
https://prezi.com/view/ksi7J4Ab9HkMDzhVHJ7A/
The upside-down...........................................................................................................30.1
Psychology……………………………………………………………………………30.2
The Deal……………………………………….…………….………………………..30.3
So, What?……………………………………………………………………………..30.4
History...………………………………………………………………………………30.5
Transform……...……...………………………………………………………………30.7
8/7/2019
You might ask yourself who is breaking the law?
 Moore's Law - the number of transistors will increase
exponentially doubling every two years (the iPhone is 100
times faster and almost 500 times smaller).
 Metcalf's Law looks at the value created by networks,
Metcalfe’s law states that V = an * n2, where V stands for
value and n stands for the number of users.
 Reed’s Law - an opportunity created by networks. The rapid
decline in the cost of communication and the exponential
growth of the internet.
 Bell’s Law- The more extensive your network, the higher is
the difficulties for competitors to challenge your leadership.
 Wirth’s law - “Software gets slower faster than hardware gets
faster” The hope is that the progress in hardware will cure all
(also known as Gate's Law and Page's Law).
 Gödel's Theorem - mathematical ideas should not have
contradictions.
 User Experience rules - Great technology today looks very
different from legacy technology in size, speed, and power.
One goal to deliver next-generation networks.
https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk/
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.1
Extreme Law (Simple, secure, connectivity is the critical creator of value).
Today, customers expect digital ubiquity; they expect everything to relate to excellent user
experience and security. Customers expect to connect, communicate, and collaborate anywhere
with anything. Connecting technology in a simple way is the fastest way to increase the value of
the technology. Successful networks need to rapidly onboard BYOD users and devices. Extreme
gives you the ability to quickly deploy the new digital technology at every entry point while
delivering a consistent and personalized user experience.
https://prezi.com/view/PdQw28WNszYEDnPYLmSy/
Five Extreme Truths about connected things.
1) Connected things create sustainable value (ubiquity).
2) Connected things enable OpEx compression (repeatability).
3) Connected things are smarter CapEx compression (embedded intelligence).
4) Connected things are safe and secure (Software-Driven Control).
5) Connected made visible (Reduce Complexity and improve scale).
It’s time to begin thinking about a world where connectivity reigns supreme. The network edge
is the new battlefront for competitive differentiation. The confluence of technology, users,
devices, and applications is creating an unprecedented opportunity and challenge. Extreme
Smart OmniEdge represents a breakthrough in helping enterprises accomplish their business
goals. It provides operational efficiency via AI/ML and automation, new customer experiences
via pervasive intelligence, diversified business models with adaptive on-premise / cloud
solutions, and robust network security that protects your network and reputation.18
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.2
Moore's Law (50 years of earning respect from geeks to executives).
Our world—from the phone in your pocket to the car that you drive, the allure of social media to
the strategy of the Pentagon—has been shaped irrevocably by the technology of silicon
transistors. Year after year, for half a century, these tiny switches have enabled ever-more
startling capabilities. Their incredible proliferation has altered the course of human history as
dramatically as any political or social revolution. A young chemist turned electronics
entrepreneur—had the defining insight: silicon transistors, and microchips made of them, could
make electronics profoundly cheap and immensely powerful. Chips could double in power, then
redouble again in clockwork fashion.19
“What people don’t understand is that the smaller things get
faster and cheaper and better they always work.” Gordon Moore.
Today, Intel executives have turned ‘Moore's Law’ into a ‘mantra.’ Intel has hammered Moore’s
Law into its corporate culture. It gives engineers ever-moving, objective standard to reach with
each new model. Since the last one year or so, computing power has not increased
exponentially. Perhaps because transistors (and chips) have reached their limit of
miniaturization. The next big step is likely to be Graphene made of carbon a single atom thick.
We used to talk about three states of connectivity:
 1st Loosely connected.
 2nd Closely related.
 3rd Embedded.
A new state of connectivity is emerging. When connectivity becomes ubiquitous, and things,
people, places are entangled. The more ideas, people, places, become connected the better
things work..., the safer items become. With digital transformation and the move to smart
schools, the need for hyper-reliable, easily-managed network infrastructure has never been
greater. Extreme Networks builds open, software-driven educational networking solutions that
are intelligent, adaptive, and secure to enable the digital transformation of education and
improve learning outcomes.20
Moore’s Law as
conversations between
Gordon Moore a' Carver
Mead as an article in
electronics magazine 1965
as marketing to promote
future use of chips in
consumer products.
This was the foundation of
today’s digital everything
enabling an influence that
extends far beyond
technology.
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.3
Networking has not kept up with Moore’s Law.
Moore, a co-founder of Intel, observed that the number of transistors that can be placed
inexpensively on an integrated circuit double roughly every two years. Moore’s Law applies to
Transistors, but network performance has not increased like compute performance. More
Internet traffic is originating with non-PC devices. Projections show PC-based traffic expanding
at a compound annual growth rate of 33%, while machine-based module traffic is forecast to
grow at an incredible 258%.21
 Transistor count is doubling every two years (2x in 2years/ and 64x/12years).
 Bandwidth per chip (Switches approx. 10x in 12 years, Routers approx. 4x in 12 years).
 Ethernet speed (1G to 10G to 40G to 100G to 400G).
 Fewer Chips per function (Increased reliability, less power, reduced complexity, and cost).
Metcalfe “, the Father of Ethernet,” stated that the value of a network increases proportionally
with the square of the number of compatible communicating devices. Not all connections are
created equal. A networked Access Point probably adds a bit more value to the network than an
IoT sensor while some tools decrease a network’s amount, like those that spew out data that has
no purpose.22
Metcalfe’s Law shows us that expanding the system increases its value. Moore’s Law tells us
that while capability steadily increases, the cost of those capabilities continually drops.
Together, they mean that the continued network expansion network is inevitable. The day is
coming, and it isn’t far off when it will be technologically feasible and economically worthwhile
to network-enabled even the simplest of things, right down to the light bulb. More sophisticated
industrial devices are already network-enabled, and that’s just the start.23
0
200
400
600
800
1000
1200
1400
1980 1990 2000 2010 2020
MooreLaw v Storagev Networking
Switch (Gigabit) Compute (Transistors) Storage (NanoTubes)
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.4
Transistors are shrinking, but atoms are not.
The industry might love its talk of exponential growth, but there are physical limits to the ability
to continually shrink the size of components on a chip. Already the billions of transistors on the
latest chips are invisible to the human eye. If Moore’s Law were to continue through 2050,
engineers would have to build electronics from components that are smaller than a single atom
of hydrogen. Many people predict Moore’s Law will slow down sometime in the early 2020s
when chips feature elements that are only around 5 nanometers apart.24
Moore’s Law is ending; a silicon atom is 0.2nm wide; as a result, 3nm is very close to the end
on that basis alone. In the future, squeezing more software performance out of the same
hardware will be the top priority. It will mean more elegant software with an exceptional level
of focus on user experience, look-and-feel, and quality. Processors will be taken for granted so
much by users that we will forget the fact that even the digital watch that we are wearing on our
wrists has a miniature embedded processor.
Roadmaps from Intel and Applied Materials both hinting that 5nm is being researched, we
remain hopeful. Perhaps the better question to ask, though, is whether it’s worth scaling to such
tiny geometries.25 With each step-down, the process becomes ever more complex, and thus more
expensive and more likely to be plagued by low yields. There may be better gains to be had
from moving sideways, to materials and architectures that can operate at faster frequencies and
with more parallelism, rather than brute-forcing the continuation of Moore’s law.26
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.5
Metcalf's Law looks at the value created by networks.
Network grows in proportion to the number of nodes in the system (n squared). Dr. Bob
Metcalfe, the inventor of Ethernet, once said that the network’s power grows exponentially by
the number of computers linked to it. According to him, every machine added to the system not
only utilizes the system as a resource but also adds more choice and value. For example, if an
order has ten nodes, its inherent value is 100 (10 * 10). Over time Metcalfe’s Law was linked
with the Internet's substantial growth and how it works.27
It’s evident that if you’re the only person with a telephone, then that network would have no
value, when one additional person gets a phone the system has achieved a tiny bit of value, and
if virtually everyone has a phone, then the system becomes extremely valuable. This
relationship has been observed in many industries where increased adoption boosts the
network’s overall usefulness. If you’re the only holder of Bitcoin it’s not very valuable because
there is no one to exchange it with for goods and services, however, if many people hold
Bitcoin, then it should be much more valuable since there are now many people to potentially
exchange Bitcoin.28
Looking backward, we can see how technology drove the shift from hunter to the farmer, from
farmer to factory worker, and from factory worker to knowledge worker. It’s become clear that
the convergence of Metcalfe’s Law, Moore’s Law, and the Internet of Things will produce
another of these pivotal societal changes in just the next few decades.29 The Internet of Things
( IoT) is having a profound impact on every industry. According to survey data, 63% of IT
organizations have witnessed a 50% increase in the number of endpoints is that they are
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.6
connecting to the network. By 2020, Gartner estimates that 20.4 billion connected things will be
in use worldwide.
Reed's law "The Law of the Pack."
Reed E. Hundt, then the chairman of the U.S. Federal Communications Commission, declared
that Metcalfe’s Law and Moore’s Law “give us the best foundation for understanding the
Internet.” Reed's Law is often mentioned when explaining the competitive dynamics of internet
platforms. As the law states that a network becomes more valuable when people can quickly
form subgroups to collaborate, while this value increases exponentially with the number of
connections, a business platform that reaches enough members can generate network effects that
dominate the overall economics of the system.30
Networks are made greater by the sum of their connections.31
The number of possible sub-groups of network participants is -
2n(x)-n-1
- where n is the number of participants.
Reed's law is the assertion of David P. Reed that the utility of large networks, particularly social
networks, can scale exponentially with the size of the system. The reason for this is that the
number of possible sub-groups of network participants is 2N − N − 1, where N is the number of
participants. Even Metcalfe's law understates the value created by a group-forming network as it
grows. The utility of groups available to be joined is tiny on a per-group basis; eventually, the
network effect of potential group membership can dominate the overall economics of the
system. Reed's Law and Metcalfe's Law overstate network value because they fail to account
for the restrictive impact of human cognitive limits on network formation.32
Imagine a network of 100 000 members that we know brings in $1 million. We must see this
starting point in advance—none of the laws can help here, as they tell us only about growth. So,
if the network doubles its membership to 200 000, Metcalfe’s Law says its value grows by (200
0002/100 0002) times, quadrupling to $4 million, whereas the n log( n ) law says its value
increases by 200 000 logs(200 000)/100 000 logs (100 000) times to only $2.1 million. In both
cases, the network’s growth in value more than doubles, still outpacing the growth in members,
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.7
but the one is a much more modest growth than the other. The Internet can be explained by the
difference between the Metcalfe-fueled optimism of n2 and the more sober reality of n log(n).
Wirth's Law (Software Bloat).
Niklaus Wirth, who discussed it in 1995 (also known as Gate's Law and Page's Law). For
example, the latest version of Microsoft Office running on a new computer seems to run about
the same speed as an older version of Office running on an older machine. Bloated software
applications do not entirely cause problems. An advanced operating system run on less powerful
hardware will move slowly. For example, running Windows 7 on a computer meant for running
Windows XP will slow the system. Similarly, the user invoking many applications
simultaneously will experience slow software performance.33
The main statement made within Wirth’s law is: "Software expands to fill memory and software
is getting slower more rapidly than hardware is getting faster." Even though the hardware has
evolved over the previous decades, the software has not necessarily become faster. Some
software still runs much slower than previous versions or similar earlier software. For example,
a word processor in 1970s took only 10kb of memory, while the same application takes over
100MB today. The advantage is that the processing speed has increased considerably compared
to the previous forms. The increasing complexity of software over the years has been termed as
software bloat.34
The most common cause of feature creep is the desire to provide the consumer with a more
useful or desirable product, to increase sales or distribution. However, once the product reaches
the point at which it does everything that it is designed to do, the manufacturer is left with the
choice of adding unneeded functions, sometimes at the cost of efficiency or sticking with the old
version, at the expense of a perceived lack of improvement.35 There is a real opportunity to
simplify this static model and disaggregate feature sets from working software and disaggregate
operating software from hardware. It is fundamentally about architectures that can deliver long-
Excitement Implementation
Performance Function
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.8
term value. We believe that excellent infrastructure needs solutions that can step up to the
toughest challenges by providing insight and control about what is going on in the network.36
Bell's law of computer classes.
Gordon Bell described how types of computing systems (referred to as computer classes) form,
evolve and may eventually die out. New courses of computers create new applications resulting
in new markets and new industries. Bell considers the law to be partially a corollary to Moore's
law which states "the number of transistors per chip doubles every 24 months". Unlike Moore's
law, a new computer class is usually based on lower-cost components that have fewer transistors
or fewer bits on a magnetic surface, etc. A new class forms about every decade. It also takes up
to a decade to understand how the class formed, evolved, and is likely to continue. Once
established, a lower-priced level may develop in performance to take over and disrupt an
existing class.
Added experience to the curve, user experience is often overlooked with the introduction of new
technology design. How many times have you felt compelled to push a door only to find you
need to pull it instead? While fire codes might dictate such design, it’s an example of user
experience at work. While taking a moment to figure out whether a door is a push or pull sounds
like a small thing, those types of irritants can add up.
There must be a seamless merging of the services of multiple disciplines, including engineering,
marketing, graphical and industrial design, and interface design. The center point of a solutions’
s features should be the user. The person using the solution is the single most crucial ingredient
in this entire equation. Coming is a close second is a person operating the solution. Of course,
you should design your network for the user with the assurance that this user will want to use
the system. You should also plan your network with the operator in mind. In the field of
1960
1970
1980
1990
2000
2010
2020
2030
2040
Mainframes Mini
Computers
Personal
Computers
Ethernet Browser Cloud Sensors Crypto Experience
Bell's Law
Time
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.9
architecture, there is a common saying that "Form follows function." The American architect
Louis Sullivan coined the phrase in 1896.
What is next in hardware? Quantum Computing, 3-D Transistors, and Graphene Carbon.
All this complicated technology is geared towards one direction – making faster devices for our
users beyond Moore’s Law. AMD is starting to use 2.5D Chiplets to make smaller 7nm chips
that are then integrated into a more massive 14nm die with a through-silicon, Chiplets allow
different functions (e.g., CPU, GPU) and different processes (e.g., 7nm, 14nm) on the same die.
There are tons of alternative approaches being considered, including silicon photonics, carbon
nanotubes, phase change memory, etc. All of these are worthy of exploration and productization.
History indicates that promise is insufficient: they must be able to compete with the economics
of the technologies that they will displace.37
The rise of graphene - Bend it, charge it, dunk it.
Technology drivers that keep changing the way we live.
Graphene is the strongest, thinnest material known to exist. A form of carbon it can conduct
electricity and heat better than anything else. And get ready for this: It is not only the hardest
material in the world. At only a single atom thick, it has been called the wonder material.
Graphene could change the electronics industry. It is ushering in flexible devices. It has
supercharged quantum computers. Electronic clothing and networks that can interface with the
cells in your body.38
Graphene Circuit Advantages.
 Graphene processor is >400 times faster than current processors.
 Density Million times greater than copper and the most durable material ever discovered.
 Optical with the most considerable absorption and broadest spectrum.
What will we possibly do with all the new Compute and Bandwidth? That sounds like a
legitimate question; if immediate needs were technology's guiding lights, we would all still be in
the Stone Ages. Sometimes necessity is indeed the mother of invention, but inventions can
create newer essentials and propel needs to newer heights. Metcalfe's dream for Ethernet was
driven by the belief that if you build it, they will come. And that includes the requirements
themselves.39 Metcalfe said last year he wants to "help shape a road map" to Terabit Ethernet,
because "we're going to get there anyway." As we move further into the paradigm of cloud
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.10
computing, where computing power and storage will gradually move to the center of the
network, it becomes necessary that the system be fast enough to meet the needs of this new,
highly distributed model.40
What is next in Software? Blockchain - public transaction ledger.
Satoshi Nakamoto is the name used by the pseudonymous person or persons who developed
bitcoin, authored the bitcoin white paper, and created and deployed bitcoin's original reference
implementation. As part of the application, Nakamoto also devised the first blockchain database.
In the process, Nakamoto was the first to solve the double-spending problem for digital currency
using a peer-to-peer network. Nakamoto was active in the development of bitcoin up until
December 2010. Speculation about the identity of Nakamoto has mostly focused on several
cryptographies and computer science experts of non-Japanese descent, living in the United
States and various European countries.
The invention of the blockchain for bitcoin made it the first digital currency to solve the double-
spending problem without the need for a trusted authority or central server. The bitcoin design
has inspired other applications, and blockchains that are readable by the public are widely used
by cryptocurrencies. Blockchain is considered a type of payment rail. Private blockchains have
been proposed for business use. Sources such as Computerworld called the marketing of such
blockchains without a proper security model "snake oil."
A blockchain is a decentralized, distributed and public digital ledger that is used to record
transactions across many computers so that any involved record cannot be altered retroactively,
without the alteration of all subsequent blocks. A blockchain database is managed autonomously
using a peer-to-peer network and a distributed timestamping server. They are authenticated by
mass collaboration powered by collective self-interests. Such a design facilitates robust
workflow where participants' uncertainty regarding data security is marginal. It confirms that
each unit of value was transferred only once, solving the long-standing problem of double-
spending. A blockchain has been described as a value-exchange protocol.
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.11
January 2017, the bitcoin blockchain grew from 50 GB to 100 GB in size.
The Extreme Networks Business Case.
Extreme Networks is not just about merely saving money. It’s more about doing new things you
can’t do today. Of course, the result may save money through automation or from avoiding a
data breach, as examples. But that’s secondary. It’s really about speed, agility, and security.
Investing in Extreme can accelerate business velocity. A recent study reported the number one
priority of CIOs and IT Directors in improving data and analytics to deliver business insights
and improve business outcomes. However, according to Gartner, 67% of IT budgets are spent
keeping the lights on, leaving fewer resources to invest in meeting these more strategic goals.
https://prezi.com/view/50OA3XTfqu8UYgv6giN0/
IT is facing three key challenges.
 The first is the risk of data breaches.
 The second is the push for IT to deliver applications and services faster.
 The third is the constant pressure for IT to do more with less.
Extreme Networks can give you the high performance, low latency network to address the
digital onslaught of today, the unified management and analytics of your wired and wireless
networks, and the flexibility to adapt to whatever the future might bring. As a result, you can
free up resources, and have the confidence in your infrastructure to be able to focus on driving
business value. Finally, you need visibility into the full context of your network traffic to inform
both tactical and strategic decisions with real-time data and application analytics without
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.12
degrading network performance. Rather than ripping and replacing your current infrastructure
every couple of years, you need to be able to adapt, automate, and strategically add to your
network to make the most of the investments.
Great networks today are simpler.
Great technology today looks very different from legacy technology in size, speed, and power
from the ones you may have purchased over the past 10-20 years. It’s not about a switch or a
box anymore; it’s about a platform and a solution set that drives value well into the future. Ask
yourselves this simple question: “Is your network faster today than it was three years ago?” The
explosive growth in the number of devices accessing the network leads to traffic overrun. It’s
not good enough anymore to provide connectivity: it’s also essential the network deliver
connectivity in a controlled and manageable way.
https://prezi.com/view/dlWvLdmHJbEewCy4Qa9C/
Extreme Networks has been on an acquisition spree this year, capturing critical networking
assets from the likes of Extreme Communications and Extreme. After the consolidation of these
companies, Extreme’s position will only be strengthened. We're seeing HP becoming more
commodity-like which opens doors for us to become more specialized for enterprise customers.
Extreme has a cross-platform strategy designed to meet our changing times.41 As demand for
network connectivity increases, network managers are being asked to deliver more services, and
make changes at an increasing pace, with fewer errors, and at a lower cost.
 Simple Platform Approach - Enhances Agility by leveraging the broader IP community.
Building value through merchant Silicon means increased value and faster and faster chips.
 Reduces Operations Costs - complete separation of control and services planes (A new
simplified way to design, build, and manage networks, with services invisible to each other).
 Improved Stability and Security - One Control Plane from Identify to Security (Know who,
what, where, when across all ports).
In an infrastructure that connects the world, no one should expect radical shifts in the
fundamental methods of moving data across Ethernet and IP networks. However, components,
Thursday, August 8, 2019 You might ask yourself, what laws are we breaking?
Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.13
protocols, architectures, and management methods are always changing. Networking
professionals shouldn’t get wrapped up in how specific vendor-centric solutions should work
but should look instead at how functional open, heterogeneous networks operate.
8/7/2019
Connecting the Smart Classroom, get ready for your XYZ
Account learning journey with Extreme Networks.
• 70% of schools are moving to digital textbooks.
• 43% of schools do not control each student’s access.
• 20% of kindergartners have Internet-connected phones.
https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk
Approximately, 20% of the Florida School districts
have chosen to partner with Extreme.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.1
Extreme is a leading provider of technology services to educational institutions.
Think of the smart school as another app on the network, enabling and optimizing the flow of a
new type of traffic. In so doing, though, it’s fair to ask what new requirements will be placed on
the network. While many people think of smart-building operations as presenting only minimal
traffic and duty-cycle demands, the opposite can, in fact, be the case – video surveillance comes
to mind here, of course, but the myriad of sensors along with new applications and their servers,
many just emerging today, will likely necessitate an audit of current network resources and
operations. Smart Schools drive new planning activities, network enhancements and upgrades,
and even modifications to operational strategies, policies, and procedures as appropriate.
https://prezi.com/view/WfVvCHNEV4Ex5IqYjiIq/
Management Center provides XYZ Account centralized visibility, and granular control of
enterprise network resources end to end. Management Center is distinctive for granularity that
reaches beyond ports and VLANs down to individual users, applications, and protocols. No
matter how many moves, adds, or changes occur in your environment, the Management Center
keeps everything in view and under control through role-based access controls.42
With digital transformation and the massive shift to smart schools, the need for hyper-reliable,
easily-managed network infrastructure has never been more significant in K-12 education.
Extreme Networks builds open, software-driven educational networking solutions for K-12
schools that are agile, adaptive, and secure to enable the digital transformation of education and
improve learning outcomes. Our networks are deployed at more than 17,000 schools and 4,500
campuses worldwide, enabling emerging styles of technology-driven teaching, including online
testing, virtual and augmented reality, robotics, and flipped classroom.43
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.2
A Smarter Network Begins at the Edge
One-click can equal a thousand actions when you manage the XYZ Account wired and wireless
network with Extreme Smart Omni Edge. Management Center can even manage beyond
Extreme Networks switching, routing, and wireless hardware to deliver standards-based control
of other vendors’ network equipment. Extreme is one of the most popular solutions for school
districts since their management solution provides the ideal integration solution between wired
and wireless infrastructure. No other manufacture’s management platform provides the
simplicity and ease of use to manage both wired and wireless solutions as a cohesive solution.44
Extreme is only 1 of 3 companies in the Gartner 2018 LAN/WLAN Leader Quadrant.
Extreme also continues to provide the most reliable customer service in the industry through a
100% insourced service and support team. Extreme is committed to assuring your district is
delighted with their decision for years to come. All equipment proposed meets or surpasses the
specs you requested.
https://prezi.com/view/50OA3XTfqu8UYgv6giN0/
Extreme Networks has been chosen by many of your fellow Florida school districts, including
the school districts of Palm Beach, Okaloosa, Washington, Walton, Bay, Martin, Okaloosa, and
Gadsden. Many of the largest Universities in the state have also chosen Extreme, including the
University of Central Florida, the University of Miami, and Florida Gulf Coast University.
Currently, there are over 1,400 districts and 17,000 schools deploying Extreme Networks
solutions in North America.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.3
Monitor digital citizenship with XMC? XYZ Account gets for $4,995.
While -not- E-Rate is eligible, Network Monitoring and Security is more critical than ever as
E-Rate boosts schools’ digital connectivity. XYZ Account can take advantage of this pricing to
help reduce E-rate ineligible costs. Extreme Control Center (formerly NetSight) is a single pane
of the glass management system that provides visibility and control into your wired and
wireless network, from the data center to the mobile edge.45
https://prezi.com/view/yQQqKuu8lDcbepYqIr58/
Deliveractionable data to instructors, parents, school boards, and the community.
Sixty-three percent of districts have implemented flipped learning in at least some classrooms.
Mobility, outsourcing, governance and compliance, legacy systems, and the adaption of new
technologies make it truly difficult for CIOs and their organizations to tackle these issues while
serving the needs of the business. More money for better networks means more devices and
information to protect. Sixty percent report using a blended model, where students split time
between online and face-to-face instruction. Ensure Common Core state standards testing and
bandwidth during online assessments. Relate technology use to student performance and
engagement?
 Compare actual application use with expected use? Measure network performance response
time and spot bottlenecks?
 Analyze performance needs of digital textbooks, video, collaborative software? Monitor for
rogue and shadow IT devices?
 Compare actual use with expected use?
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.4
Enable new styles of learning, including the flipped classroom.
Networking technology today plays a vital role in personalizing education, improving learning,
and creating better outcomes. Extreme Networks wireless and wired infrastructure effortlessly
manage which users, devices, locations, and applications have access to all network resources.
The networks enable new styles of learning, including more substantial use of digital content,
flipped classroom, and extensive use of online testing. As a teacher or administrator, you need to
know that the network can be tuned to control which users at specific locations have access to
resources and applications. This information can then be tracked and displayed.46
Digital Citizenship
K-12 school districts are making a strong push to deliver digital citizenship courses online.
These courses educate faculty and students on the proper use of technology, including how to
identify credible sources of information, the fair use of social media, and online bullying
awareness. Districts are then allowing specific devices and application access based on the
student’s successful completion of the digital citizenship course. Having access to network
traffic utilization data helps verify that district content filters are performing as expected, and
students are good stewards of the technology. The Extreme Networks network forensics can
check proper or improper use of the resources for granting or removing expanded access
rights.47
Online Testing
With the flexible network control offered by Extreme Networks, classroom networking can be
set up to allow secure student access to the test servers for online exams but disallow universal
Internet access. In the same classroom, the teacher’s device can be granted access to all district
resources as well as the Internet. Our Purview software can monitor the network during on-line
testing to understand the performance being delivered both onsite and off-site from remote
testing servers. Extreme Networks can help you prepare your district for Common Core and
other online assessments. Our network experts can make sure you are ready for all online
initiatives, including PARCC, Smarter Balanced, and specialized state programs now and in the
future.48
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.5
Personalized Learning XYZ Account Schools.
The network edge is where the delivery of personalized learning is won or lost. It’s where XYZ
Account organization engages students and teachers, where mobile transactions occur, where
IoT devices connect, and where you make the first stand against cyber threats.49 With the rapid
adoption of 1:1, BYOD, Flipped Classrooms, Digital Textbooks, and Personalized Learning,
districts must leverage the power of their network infrastructure to improve the learning
environment of their students and support the instructional needs of faculty, staff, and students.50
What personal learning tools is XYZ Account using or planning to use? Extreme’s Smart
OmniEdge network solution delivers a unified wired/wireless infrastructure for cloud or
premise deployment, augmented with AI-powered applications and managed through a single
pane of glass. The result? A network that delivers a consistent Education-driven experience
contains costs and enables a competitive advantage to provide personalized learning.
The explosive growth in the number of wireless devices accessing the network leads to the
wireless network being overrun with traffic. It’s not good enough to provide connectivity: it’s
also essential that the system deliver that connectivity in a controlled and manageable way.
Customers need to be able to control access to services on a granular level, rather than block
entire segments of the user community wholesale. They need to be able to manage the number
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.6
of devices accessing the network and how much bandwidth they occupy. They need to control
the flow of data, fix problems as they arise, and plan for the future of the network.51
One-to-One XYZ Account Computing.
K-12 school districts are faced with extraordinary challenges, as well as opportunities to reshape
how students are best prepared for college and 21st-century careers. Schools can take advantage
of emerging educational technology to meet the teaching needs while adhering to modest
budgets. Delivering personalized learning to students requires rich, digital content, including
video and adaptive learning textbooks. One-to-one computing programs are a way to make sure
all students enjoy the benefits of digital learning content. These are the critical technology issues
facing school districts as they implement one-to-one computing. Addressing these issues will
help school districts achieve their objective of learning success for all students.52
The solution described below provides XYZ Account school districts with Wi-Fi connectivity,
including an efficient means to onboard and manage both district-owned and guest devices. The
system offers a single window for administering the network and setting a policy to determine
which resources each device can access, both within the school and across the Internet. The
system manages a range of parameters that assess device access rights, based on user, device
type, location, time of day, and 40 more attributes.
 Deliver Content - textbooks and video present high-quality XYZ Account learning content
at a lower cost than traditional books, but require high speed, ubiquitous Wi-Fi to connect
every mobile device. Edge switches provide backhaul from the Wi-Fi access points and
connect wired infrastructure to the network. High availability or fault tolerance is essential to
ensure uninterrupted teaching.
 Protect Privacy - The network must selectively connect authorized devices and block
unauthorized devices. Schools require comprehensive policy enforcement that is based on
device type, user, location, time of day, and many more attributes. Network integration with
web filters and firewalls is also essential. The network must be capable of both controlling
and monitoring all devices and network activity.53
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.7
 Grant Guest Access - In addition to easy onboarding of XYZ Account district-owned
devices, a simple method for onboarding guest devices and instilling them with the
appropriate access to Internet resources must be provided.
Today’s new styles of learning require new technology.
Digital technologies will change the way learning takes place. People ask how you can improve
the learning environment in the classroom. Extreme can enable teachers to bring knowledge to
life for students beyond the walls of their class or school. Extreme’s Digital Strategy for Schools
is the result of extensive research and consultation and reflects the views of our education
stakeholders. Learning today needs to entail more than knowledge acquisition; there needs to be
an equally strong emphasis on skill development. Learners need open-ended learning
experiences that develop the learners’ higher-order thinking, creativity, independence,
collaborating, and ownership of learning.54
Enabling a technology-rich XYZ Account curriculum.
Smart Classrooms can deliver a personalized learning experience.
Ask yourself? Have you ever walked into a school and plugged into the Ethernet port and the
network asked you what VLAN do I want to connect too? Of course not. Systems never give
you that option when your plugin. So why do you have a wireless architecture that provides the
user with a choice? Manufacturers have been using SIDS as Security Boundaries. With Extreme,
XYZ Account can offer a single SSID, so now they don’t worry about what SSID to connect
because there is one. When a teacher, admin, or guest walk in they relate to the same SSID and
authenticate as a guest. Letting the network think.
Given the pressures of district growth and continuing technology innovation initiatives, ensuring
high-speed wireless connectivity, ease of network management, and improved bandwidth are
critical. Technology is an integral part of the curriculum throughout all grade levels. A crucial
component of a school wireless network must have centralized management of control. Doesn’t
matter who owns it. Many schools today if a student/admin/faculty walks in with a non-district-
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.8
owned machine, we let them get on as a guest…. the problem is that a student isn’t a guest…a
student is a student. We filter with CIPA Compliance differently btw student/guest…rate limit...
You are an ISP to the instructional environment. Not to the guest…. I’m a guest.
Digital Signature within the WLAN 50+ Factors.
When you log in, the solution fingerprints the device with over 50 points of identification. These
factors help us individualize curricular delivery, making it easy and curricular-based for the
student. XYZ Account staff needs full visibility into all devices on your network and the ability
to control application access based on user, device, location, and time of day. With Extreme
Networks NetSight Network Management Tool, you can create network access policies down to
the individual level without resorting to multiple SSIDs. For example, XYZ Account can grant
STEM classes more network resources as needed, restrict Netflix to learning uses, and allow
gaming devices when educationally-appropriate.55
Best of breed networks allow XYZ Account flexibility to use the best tools that enhance and
simplify the management process. Our solutions provide deep integration with iBoss and
LightSpeed web filtering applications so that you can control application access down to the
individual level. Policies can be applied to Google Chromebooks automatically at bootup to
control which services they can have. Our switching guarantees QoS for Lync applications on
both the wired and wireless network. We provide deep integration with Palo Alto Networks and
Fortinet firewall solutions to better manage your overall network. Our NetSight NMS and
Mobile view NAC products also integrate into the existing system regardless of current
switching and wireless vendor.56
1) Automated Device Registration - Today’s students are tech-savvy. They’ve grown up using
wireless. The IT department doesn’t need to touch each device anymore. Network access
control can allow users to register themselves.
2) Control - Most schools have a directory database of users, and if you don’t have one, you
should. It’s a central place where you create user names and passwords for each student.
3) Visibility - Wireless can be invisible to a student or teacher. That’s a big problem for the IT
staff who must figure out why a student’s iPad isn’t working. You must have the ability to
see the user, what type of device they are using, what kind of coverage.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.9
4) Prioritization - Quality of service means that you should be able to determine what uses are
most important to you. Make sure learning tools take priority over a student or teacher
streaming Netflix or YouTube.
5) Time - How is this all done with a limited staff, that is typically getting smaller, not larger.
Schools of the future need an easy button to deliver personalized learning.
Full Turnkey XYZ Account Smart School Solution.
Our proposal includes comprehensive, turnkey installation services. Our full-time staff performs
all proposed installation services. Unlike most firms, we do not have to rely on sub-contractors
to perform the required installation. Extreme retains highly skilled certified professional team
including Systems Engineers, Wireless Engineers, (Wireless, voice, data) and Certified Network
Experts. Our in-house engineers have certifications from a wide range of manufactures.
The trend here is clear – every school is going to be a smart school.
And the key to smart-building success is in leveraging network infrastructure with the coverage
and management to make this outcome a reality. Smart buildings, again, can indeed be viewed
as just another application on the organizational network, and properly implemented, intelligent
buildings represent new traffic that can be accommodated via additions to current systems,
along with the appropriate upgrades and improvements always in the plans at any given facility.
Digital textbooks require high-speed and high-density data and video streaming. With Extreme
Networks, you can configure the network to provide digital books in the classroom with the
bandwidth they need, while still limiting or preventing fast streaming of music or games to
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.10
students in the cafeteria. In the same class, the teacher’s device can be granted access to all
district resources as well as the Internet. Our software can monitor the network during on-line
testing to understand the performance being delivered both onsite and off-site from remote
testing servers. Extreme Networks can help you prepare your district for Common Core and
other online assessments. Our network experts can make sure you are ready for all online
initiatives, including PARCC, Smarter Balanced, and specialized state programs.57
XYZ Account Education Challenges.
K-12 education leaders are striving for better learning outcomes. At the K-12 level, the goal is
learning success and preparing students for college and careers. Schools must demonstrate that
they can protect student privacy (FERPA) and safety (CIPA), as well as comply with HIPAA
and PCI standards. Underlying these goals is the challenge of operating in a controlled IT
resource environment. This added control applies to budgets, staffs, and technical expertise. To
better meet the goals of education subject to resource limitations, schools are using new styles
of teaching, including personalized learning, flipped classrooms, augmented, and virtual
reality.58
Smaller school systems, such as charter and private schools require an easy-to-manage, cloud-
based network system, often delivered as a managed service. Extreme Networks offers these,
with the full features and benefits of on-prem solutions. In addition to being severely
constrained by limited technical resources, many K-12 school districts have environments with
dynamic RF characteristics that are difficult to manage. For example, the gymnasium or
cafeteria may be empty most of the time but crowded during events. Wi-Fi connectivity must be
flawless in all cases. ExtremeAI adaptively tunes the access point parameters, reducing the need
for resource-intensive hands-on network management by technically expert staff.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.11
Our Smart OmniEdge solution provides a single pane of glass for unified wired/wireless
management, including remote facilities where a cloud-managed approach is optimal. With
limited technical resources, networks must be agile to adapt to changing needs, while leveraging
existing investments without retraining. Smart OmniEdge uses a standard user interface and
workflow with both cloud and on-premise solutions, making it easy to adapt to changing needs
quickly. The same access points are used, whether managed on-prem or from the dust and
regardless of the business model: either subscription or perpetual licensing.59
Extreme Wireless Solution Supports 1:1 Google Chromebook Initiative.
The Washington County School District (WCSD) is in beautiful, rural Northwest Florida.
Approximately 3,400 K-12 students are enrolled in two elementary, two middle and two high
schools. The district also serves around 600 post-secondary students in one technical center. To
take their mission of providing appropriate, high-quality, and rigorous educational programs in a
safe learning environment into the 21st Century, the WCSD needed to upgrade their network.
The upgrades would support classroom collaboration with a Bring Your Device (BYOD) policy,
as well as enable the school district to meet state online testing requirements.
Florida has had the FCAT (Florida Comprehensive Assessment Test) for some time, and they are
pushing for more standardized online testing with End of Course (EOC) tests. A big part of
justifying the network upgrade was to prepare the school district to handle this online testing.
And treat it, it did. “As soon as we put all the testing laptops on the Extreme network
performance and ease of maintenance both improved by a factor of two. The State of Florida
Department of Education has selected the American Institutes for Research (AIR) online testing
platform as a replacement for Florida’s Comprehensive Assessment Test (FCAT), and thanks to
the new high-bandwidth Wi-Fi, WCSD can say with confidence that they can handle online
testing network requirements.
Chromebook Complaints –
There are over 30 different
Chromebook models with
different NICs/drivers for
Chromebooks.
 Intermittent connectivity.
 Slow to connect, won’t
connect with 11n rates.
 Samsung Chromebooks slow
when unplugged.
 Falls off network then
connects back.
 Loss connectivity/slow ping
when on battery
 Streaming issues.
 2.4GHz only end devices
connect, performance fails
over time.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.12
Has your XYZ Account faced those sorts of problems with Chromebooks?
Google’s student devices now own the leading share of the school market, but they come with
their own set of quirks. On the positive side, Chromebooks are inexpensive, durable, secure,
easy to manage centrally, and have long battery life. Chromebooks assume a100% reliable Wi-
Fi connection. If you are not careful, that Wi-Fi connection can run into interference from
adjacent channels, co-channel or non-Wi-Fi devices like Bluetooth and microwave ovens.60
The potent combination of affordable devices, productivity tools via G-Suite [formerly Google
Apps for Education], easy integration with third-party tools, task management via Google
Classroom and easy device management remains extremely popular with teachers. The rise of
Chromebooks has also set new industry benchmarks with regards to average device pricing,
with prices reaching as low as $120 on specific projects. Chromebooks for education now
account for the leading share of the school device market at 58%. But Chromebooks require Wi-
Fi connection and come with their network behavioral quirks. They are known to unpredictably
falling off the network and often act differently when on battery power.
The good news is that with the proper Wi-Fi hardware and software, implemented with robust
system design, Chromebooks will perform flawlessly in your classrooms. Your system design
will need to be based on capacity considerations, like the number of devices, individual and total
device bandwidth required, and physical constraints like walls, doors, and windows. From an IT
perspective, each Chromebook takes just 5-10 minutes to prep, and are automatically updated
behind the scenes while the students are working. Chromebooks even allow for the development
of group policies so that IT can push out apps and different Wi-Fi connectivity per user group.
A Chromebook must-have - Chrome Connectivity Diagnostics is the kind of app that few think
to install when the full force of the internet is flowing freely. But plan; install this app now
instead of those inevitable future network failures. Your blood pressure will thank you! It’s
included in Chrome OS Dev by default.61
Don't hide the SSID for Chromebooks.
 Need for 5GHz increases - Channel width
gets narrow (20MHz).
 Inefficiencies exposed under load.
 Co-channel interference (CCI) increases.
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.13
 For general web browsing and editing Google Drive documents, 0.2-0.5 Mbps per concurrent
session at a minimum should provide satisfactory performance.
 If your employees or students will be streaming video or using Google+ Hangouts, at least 1
Mbps per concurrent user session is needed and >4 Mbps is required for HD video streaming.
 Latency may be a more significant indicator of user perception of performance than
bandwidth for interactive web-based applications. Generally, <100 ms ping is needed for a
pleasant experience.62
Analyze XYZ Account Student Attitude, Learning.
Purview capabilities can be critical before and during online assessments for understanding and
addressing performance issues that could interfere with testing. Purview can determine if a
responsiveness issue is caused by a school network issue, an Internet issue, or a remote server
issue. Competence includes over 13,000 application fingerprints over 7000 applications,
including the critical applications for education users. Application categories include teaching,
analysis, social networking, restricted content, search engines, sports, streaming, web content
sources, web file sharing, web collaboration, and healthcare.
https://prezi.com/view/kXhe50IZkAhDey8i6xEe/
Extreme Analytics can monitor the school’s network performance to achieve an optimal design.
It can help make sure that the most critical apps get the network performance they need. It
determines where performance delays are located; on-site or off-site. As noted above, this is
especially important in preparing for online assessments.63
Survey how classroom technology is being assimilated and used.
 Are instructors using the technology? Monitor apps like Blackboard to analyze ROI.
 Are they using their devices in the classrooms? Is more coaching needed to help teachers
make better use of new technology?
 What students and faculty are accessing software, applications, and web sites?
Thursday, August 8, 2019 Enabling new styles of learning.
Jeff Green Enable Personalized Learning Section 3.14
Whether it’s a public school, private or charter school, the other significant trend that will only
grow over time is the goal of putting a device in the hands of every student. These “1 to 1
program” make it mandatory that you have high-performance networks in your classrooms.
What’s driving the need for robust and reliable systems in classes? Everything from web-based
learning tools, online instructional resources, and collaboration to the increasing use of eBooks.
Beyond the day-to-day education activities, student assessments and online tests such as
PARCC® and Measures of Academic Progress® (MAP®) are also driving the need for faster
and more reliable network infrastructure in the classroom.64
Classroom of
2020
How XYZ Account Does it Better?
Deliverpersonalized
learning to student devices
to improve your
educational outcomes
Personalized learning takes advantage of digital content, adaptive techniques, 1:1 computing,
smart displays, and the latest developments in EdTech. Your XYZ Account network must be
able to easily integrate with your student directory and provide bandwidth where and when it
is needed. Extreme wireless access points and wired switches are easily managed with
Extreme Management. Access to student and teacher devices, whether they are 1:1 or
BYOD, is controlled with Extreme Controland monitored with Extreme Analytics.
Connectivity can be assured throughout thecampus.65
Online Testing Online testing involves large numbers of students simultaneously taking a remotely-served
test on a local wireless device. There are numerous war stories of remote servers going down
leaving administrators to guess at theproblem, or even unaware that there is a problem, force
the test to be either re-administered or thrown out entirely.66
Chromebook deployment Optimizeand Manage Chromebook Wi-Fi Experience, and learn the ins and outs of the
Chromebook Wi-Fi experience from our expert, Gavin Bertsch. He’ll describe how to plan
and implement your Chromebook deployment, and how to track down problems quickly
should something go wrong.
Device Onboarding Consistent device policy based on over 40 attributes centrally implemented, enforced end-to-
end. Simple device onboarding, 100% fidelity of all IP assets Internet filter and firewall
integration, MDM integration.
Digital Citizenship Flawlessly execute high stakes, technology-based testing - Whether for k-12 standards
compliance or higher education mid-terms and finals, online testing requires high speed, low
latency networking, device management, and network analytics to ensure the best possible
testing experience. Our Extreme Analytics helps locate any issues that come up relative to
the remotely-served test. Extreme Control makes sure that only theright devices and students
are connected.67
Government Compliance Comply with all safety and privacy standards and requirements. Schools must demonstrate
that they can protect student privacy and security. In theUS, that means meeting FERPA,
CIPA, HIPAA, and PCI, among other regulations. Underlying these requirements is the
challenge of operating in a controlled IT resource environment and still achieving the best
educational outcomes.68
Simple Management -
Solving Those Annoying
Connectivity Quirks
Consistent network management interface, on-prem or through the cloud - how to use
network policy to protect student safety and network resources; and network analytics to
monitor application usage and data flow (provide rapid onboarding).
SimplifiedInfrastructure Extreme Management Center helps shapetraffic within the network to ensure bandwidth and
performance where it is needed for high digital loads, like AR headsets. Extreme Control
makes sure only the authorized IoT devices get access to the network. Extreme Switching
provides both theconnections and the PoE power to IoT devices in theclassroom.
Stem & Robotics Robots labs, drones, and STEM learning are important for preparing students to the jobs that
will be available when they graduate. AR/VR/MR play a growing role at all levels of
education, not just increasing student engagement, but reducing costs as students can travel
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)

More Related Content

What's hot

Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Cisco Russia
 
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkim
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkimThree mustketeers-swcs-2014-autoidlab-kaist-daeyoungkim
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkimDaeyoung Kim
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Clay Melugin
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid Rajesh Sawale
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsNFC Forum
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill offIT Tech
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computingSyam Madanapalli
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingRamneek Kalra
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Les Interconnectés
 
The state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaThe state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaAndri Yadi
 
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Thierry Lestable
 
IoT digest. June 2018
IoT digest. June 2018IoT digest. June 2018
IoT digest. June 2018ElifTech
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveFelipe Lamus
 
Defining Future 5G Networks (Summary)
Defining Future 5G Networks (Summary)Defining Future 5G Networks (Summary)
Defining Future 5G Networks (Summary)Digital Catapult
 
Li fi presentation
Li fi presentationLi fi presentation
Li fi presentationVivek Jha
 

What's hot (20)

Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
 
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkim
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkimThree mustketeers-swcs-2014-autoidlab-kaist-daeyoungkim
Three mustketeers-swcs-2014-autoidlab-kaist-daeyoungkim
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
 
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
Jean-François Balcon - Cisco - Objets connectés quels usages ? Quels enjeux ...
 
The state of NB-IoT in Indonesia
The state of NB-IoT in IndonesiaThe state of NB-IoT in Indonesia
The state of NB-IoT in Indonesia
 
Internet of energy
Internet of energyInternet of energy
Internet of energy
 
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)Supelec   m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
Supelec m2 m - iot - course 1 - update 2015 - part 1 - warming - v(0.4)
 
IoT digest. June 2018
IoT digest. June 2018IoT digest. June 2018
IoT digest. June 2018
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Defining Future 5G Networks (Summary)
Defining Future 5G Networks (Summary)Defining Future 5G Networks (Summary)
Defining Future 5G Networks (Summary)
 
Li fi presentation
Li fi presentationLi fi presentation
Li fi presentation
 
What are
What areWhat are
What are
 

Similar to The next generation ethernet gangster (part 1)

2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USACJ Boguszewski
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadDigitalNational
 
The Evolution of Edge computing
The Evolution of Edge computingThe Evolution of Edge computing
The Evolution of Edge computingDESMOND YUEN
 
GPON vs. Gigabit Ethernet - Just the Facts
GPON vs. Gigabit Ethernet - Just the Facts GPON vs. Gigabit Ethernet - Just the Facts
GPON vs. Gigabit Ethernet - Just the Facts Mestizo Enterprises
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015Hank Lydick
 
Network Topologies And The Network
Network Topologies And The NetworkNetwork Topologies And The Network
Network Topologies And The NetworkKim Moore
 
AT&T Presentation to E&T Committee on Wireless Innovation
AT&T Presentation to E&T Committee on Wireless InnovationAT&T Presentation to E&T Committee on Wireless Innovation
AT&T Presentation to E&T Committee on Wireless InnovationJohn R. Emra
 
List Other Types Of Attacks
List Other Types Of AttacksList Other Types Of Attacks
List Other Types Of AttacksKimberly Brooks
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT SecurityNUS-ISS
 
Is 5g ready for the IoT - C&T RF Antennas Inc
Is 5g ready for the IoT - C&T RF Antennas IncIs 5g ready for the IoT - C&T RF Antennas Inc
Is 5g ready for the IoT - C&T RF Antennas IncAntenna Manufacturer Coco
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurity Gen
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Vishal Sharma, Ph.D.
 
5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust SecurityRebekah Rodriguez
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
 

Similar to The next generation ethernet gangster (part 1) (20)

2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
 
5G Network
5G Network5G Network
5G Network
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
The Evolution of Edge computing
The Evolution of Edge computingThe Evolution of Edge computing
The Evolution of Edge computing
 
GPON vs. Gigabit Ethernet - Just the Facts
GPON vs. Gigabit Ethernet - Just the Facts GPON vs. Gigabit Ethernet - Just the Facts
GPON vs. Gigabit Ethernet - Just the Facts
 
NI Trend Watch 2015
NI Trend Watch 2015NI Trend Watch 2015
NI Trend Watch 2015
 
Network Topologies And The Network
Network Topologies And The NetworkNetwork Topologies And The Network
Network Topologies And The Network
 
AT&T Presentation to E&T Committee on Wireless Innovation
AT&T Presentation to E&T Committee on Wireless InnovationAT&T Presentation to E&T Committee on Wireless Innovation
AT&T Presentation to E&T Committee on Wireless Innovation
 
List Other Types Of Attacks
List Other Types Of AttacksList Other Types Of Attacks
List Other Types Of Attacks
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
Is 5g ready for the IoT - C&T RF Antennas Inc
Is 5g ready for the IoT - C&T RF Antennas IncIs 5g ready for the IoT - C&T RF Antennas Inc
Is 5g ready for the IoT - C&T RF Antennas Inc
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Madge Perspective
Madge PerspectiveMadge Perspective
Madge Perspective
 
5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 

More from Jeff Green

Where is the beef with 6 e
Where is the beef with 6 eWhere is the beef with 6 e
Where is the beef with 6 eJeff Green
 
Where is the beef
Where is the beefWhere is the beef
Where is the beefJeff Green
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?Jeff Green
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)Jeff Green
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)Jeff Green
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)Jeff Green
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)Jeff Green
 
Elephant &amp; mice flows
Elephant &amp; mice flowsElephant &amp; mice flows
Elephant &amp; mice flowsJeff Green
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policyJeff Green
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Jeff Green
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3Jeff Green
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Jeff Green
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2Jeff Green
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricJeff Green
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)Jeff Green
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)Jeff Green
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)Jeff Green
 

More from Jeff Green (20)

Where is the beef with 6 e
Where is the beef with 6 eWhere is the beef with 6 e
Where is the beef with 6 e
 
Where is the beef
Where is the beefWhere is the beef
Where is the beef
 
6 e security
6 e security6 e security
6 e security
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
 
Elephant &amp; mice flows
Elephant &amp; mice flowsElephant &amp; mice flows
Elephant &amp; mice flows
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policy
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabric
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
 
10.) vxlan
10.) vxlan10.) vxlan
10.) vxlan
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
 

Recently uploaded

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

The next generation ethernet gangster (part 1)

  • 2. 8/7/2019 The O.G. “Original Gangsters” Wired and Wireless. The O.G. Original Gangsters Wired and Wireless. 1) Extreme - the O.G. of Layer 3 Gigabit Ethernet. 2) Enterasys - the O.G. of One Fabric Policy. 3) Symbol – the O.G. of the wireless controller. 4) Nortel - the O.G. of Metro Fabrics. 5) Brocade – the O.G. of Internet Routers. 6) Aerohive – the O.G. of Mesh and Cloud WiFi. 7) Open Compute – the new O.G. of Open Technology. One goal to deliver next-generation networks. https://prezi.com/view/avGmnVQCt6jS3MynQUY9/
  • 3. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.1 Re-thinking - The Next Generation network. The problem with most gangsters is that there are only so many themes to explore, only so many submachine guns to fire. Ice-T won respect as a street rap and made a living being the most disruptive gangster rapper on the West Coast. His hard-hitting music was about escaping the ghetto minefield of gangs, guns, and drugs during a cookie-cutter age of Music. His beats are funky and unremittingly hard, including the whooping. According to Urban Dictionary’s most popular definition, OG is a simple abbreviation that “used to mean Original Gangster.” It has since been further co-opted to mean utterly “original.” 1 The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with “superspec.” When they pushed DNA and its additional complexity, Extreme responded by re- thinking the way networks are designed, deployed, and managed without vendor lock-in. Finally, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service.
  • 4. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.2 Extreme is the “Original Gangster” of Layer 3 Gigabit Switching. Extreme, with over 20 years’ experience, was a pioneer in Ethernet networking. In the beginning, it was about speeds, feeds, and protocols. The Summit One delivered the first Gig Ethernet switch and then the first 10 Gig Ethernet switch. Summits provide deterministic performance independent of load or what features are enabled. However, we were a box company based on the internal development of our merchant silicon. We quickly recognized that this approach would not sustain us into the future and deliver our customer the value they want out of their networks. As a result, we made a problematic shift to merchant silicon, which gave us the ability to deliver our customers both the feature function of Cisco and the value of HP. We changed our approach to focus on providing the best NoS from Broadcom silicon. Today, Extreme has adopted a cross-platform strategy designed to meet our changing times with no vendor lock-in. Today no single technology can drive the networking market forward. However, today’s complex network environments can delay the deployment of new technology while inflicting more support cost each year. Deploying a Cisco network is anything but simple; the most prominent thing customers should demand with technology convergence should be simplicity. Cisco is responding to this issue with Cisco DNA yet another expensive vendor lock- in. Today, there is a sense that there hasn't been a credible alternative to Cisco. More customers are looking at multi-vendor solutions and demanding seamless integration, which will threaten proprietary vendors. Extreme looks forward to offering differentiated solutions for everything from data centers to the Internet, easing "Cisco fatigue.
  • 5. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.3 “Purple Metal”, Extreme’s pivot towards value. Extreme is a better mousetrap which delivers new features, advanced function, and wire-speed performance. Our switches provide deterministic performance independent of load or what features are enabled. All Summit Switches are based on the XOS modular operating system. Purpose-built for Broadcom Merchant silicon, XoS delivers higher availability and better value. By isolating each critical process in its own protected memory space, a single failed process will not take the entire switch down. Extreme products are purposefully built to be faster while delivering higher value to customers. When building routers and switches, only a few components are custom designed as most components are ‘off the shelf’ – for example, the management boards use industry-standard CPU such Intel x86 or i960 network processors and use off the shelf memory and flash. The custom silicon performs specific functions such as the frame switching, the backplane forwarding, or another specialized packet handling. Merchant Silicon will dominate, and over time, physical networking products will become commodities that are differentiated by software features and advanced services.2 Ask yourself this simple question: “Is your network faster today, then it was three years ago,”3 In many cases, the change will represent a risk. Thus, the reason for the change needs to be more compelling than the risk.
  • 6. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.4 Enterasys is the “Original Gangster” of the One Fabric Policy. Many people look at Ethernet Switching as just a critical sustaining technology. Enterasys technology helped organizations to make measurable improvements.4 Simplicity was the essential factor for driving customers to deploy Enterasys technology. The Enterasys vision was to treat your network as a strategic asset while streamlining the process, the expertise of learning, managing, and integrating the various tools that manage your system. The key was to control the network as needed by the user, device, location, application to reduce the time necessary to implement its network-wide policy and control. “Gangster” Differentiators (Ethernet Everywhere). Save the cost of additional visibility, policy, and load balancing tools – its already in the switch. Enterasys believe that tomorrow’s network won’t look like today’s network. Until you address increasing network complexity growing Wi-Fi demand and decreasing network visibility, you won’t be able to confront the challenges of the future without impacting your business performance. When you choose Enterasys, you will have a unified and adaptable architecture wireless scale and density and end-to-end device and application analytics. T Today, Extreme delivers on this vision with the additional performance and value brought by XoS. It’s not good enough to provide connectivity: it’s also essential that the network delivers connectivity in a controlled and manageable way. Customers need to be able to control access to services on a granular level, rather than block entire segments of the user community wholesale. With Extreme, services can easily be defined and provisioned on-the-fly without disruption – and without time-consuming and expensive weekend and evening change windows.
  • 7. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.5 Symbol Technologies is the “Original Gangster” of the wireless controller. Symbol Technologies was co-founded in 1973 by Jerome Swartz and physicist Shelley A. Harrison. Under Swartz's leadership, the company became a leader in bar code scanning devices. The company focused heavily on the retail industry5. At that time, the mobility market was dominated by Symbol Technologies and Telxon. Most notably, these two companies serviced significant retailers such as Wal-Mart, Kroger, Safeway, Federated, and others. A notable turning point occurred in 1994 during a competition for business at Kroger between Symbol and Telxon. Symbol positioned frequency hopping as the most robust, while Telxon selected linear sequence technology. Kroger ordered a head-to-head comparison test. Ultimately and not decisively, Kroger chose Telxon over Symbol. At about the same time, the IEEE decided to adopt the direct sequence approach in its IEEE 802.11b standard.6 As a result, the direct sequence wireless approach was taken, and later, Symbol went on to purchase Telxon. Symbol One DNAApproach from Access Point to Controller. Symbol temporarily dominated the resulting 802.11b market.  Cisco purchased Telxon's Aironet division (moved the WiFi market to the mainstream).  In 2007, Symbol was acquired by Motorola for $3.9 billion.  October 2014 Zebra Technologies acquired Motorola Solutions' Enterprise business.7 Today, Extreme still has the Kroger wireless business. After combining Zebra’s WLAN with our wired and wireless, we have created the industry’s number three WLAN powerhouse. As a result, in 2018, we were recognized as a top-three leader in the Gartner Magic Quadrant. Extreme’s heritage of delivering innovative and pioneering technology is reinforced with the integration of Extreme’s high-density wireless and distributed wireless from the Zebra acquisition. The resulting new disruptive technology is today’s Wing 7 solution featuring unified visibility and control across a complete wired and wireless solution.
  • 8. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.6 Nortel is the “Original Gangster” of Fabric. In 1995, Cabletron came up with the idea of Secure, fast Vlans, which uses OSPF at layer 2, providing 'cut-thru' inter-VLAN switching and ultimately replacing STP. One of the architects (John Roese) of Securefast became the CTO of Nortel and introduced this idea to Nortel's R&D, and Provider Link State Bridging was born. This protocol pretty much became SPB (IEEE 802.1aq). Flooding and MAC address learning is restricted to the SPB edge and encapsulated within the MAC addresses of the source SPB switch and the destination SPB switch.8 Extreme’s strategy for Campus Automation begins with re-thinking the way networks are designed, deployed, and managed. Extreme’s Fabric-based systems enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity.9 A single Ethernet switch provides ‘Flat – any port to any port’ connectivity. A true Network Fabric requires that in addition to being ‘Flat,’ it also operates and is managed as a single device, with all ports sharing a common state so that any packet only needs to be processed once to be able to reach a destination (single hop). Forget about bottlenecks that slow the deployment of applications and services. With your 7- 10-year horizon, elasticity is critical to maintaining agility within your network. Fabric networks simplify operations, reduce cost, and create more efficient team productivity. Cutting intricate protocol overlays eliminate complexity, allows for faster recovery times, simplifies management, and support easier troubleshooting. Fabric Connect supports a dynamic environment where new or changed services can be implemented on the fly—taking only minutes instead of days, weeks, or months.10
  • 9. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.7 Foundry is the “Original Gangster” of routers. Is it routing fast follower? In addition to an unparalleled cost/feature ratio, Foundry offered products that rivaled the performance of any hardware on the market. In March of 2006, a team from the University of Tokyo set a record for Internet2 Land Speed in both the IPv6 and IPv4 single and multi-stream categories. This record represents the fastest rate at which data can be transferred, multiplied by the distance traveled — three key Foundry Router Advantages.11 Brocade IP fabrics deliver scalable performance with ease, leveraging the simplified IP Clos architecture with Equal Cost Multi-Path (ECMP) routing. VDX switches in a spine-leaf deployment serve as the building blocks of an Extreme IP fabric, providing a non-blocking and scalable framework. Based on open standards and a cloud-proven BGP architecture, IP fabrics offer flexibility for maximum interoperability. Data Center administrators can easily add spine and leaf devices as needed to increase path diversity and bandwidth for east-west traffic, enabling higher application performance and resilience.12 The primary business drivers for routing are to provide ubiquitous, secure, and ready application availability and web access for employees. When properly used as part of a network foundation, routers can help optimize application availability, improve employee productivity, boost customer responsiveness and loyalty, and spur company competitiveness and time to market. Routers also can help overcome the limitations of geography between small-medium businesses and their customers, partners, and suppliers. They can mitigate business conduct restraints that are tied to physical office locations.13
  • 10. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.8 Aerohive is the “Original Gangster” of Cloud WiFi. Extreme and Aerohive have entered into a definitive agreement under which Extreme will acquire Aerohive for approximately $272 million. The acquisition of Aerohive will add critical cloud management and edge capabilities to Extreme’s portfolio of end-to-end, edge to cloud networking solutions. It will provide a reliable subscription revenue stream and strengthen Extreme’s position in wireless LAN at a critical technology transition to Wi-Fi 6. The acquisition of Aerohive establishes our leadership in cloud, AI, and ML, adding a proven and mature cloud services platform and subscription service model for Extreme’s customers and partners.14 In 2007, Aerohive introduced the HiveAP 20 ag CC-AP and HiveManager Network Management. With these releases, Aerohive is the first vendor to enable both Layer 2 and Layer 3 roaming in a wireless network without the need for a dedicated controller. Later in 2009, Aerohive released a ground-breaking option for wireless management as (SaaS) cloud management platform. This acquisition by Extreme is a significant milestone for Aerohive. The role that cloud-managed technology plays in modern enterprises is impossible to overstate – it is where digital transformation is won and lost. Aerohive’s expertise and excellence in cloud management and edge technology, combined with Extreme’s extensive solutions portfolio and continued investment in software and AI for automation, gives our customers the most advanced digital experiences in the market. Together we will push networking into a new era – making infrastructure smarter, more autonomous, and the driver of business value.15 Aerohive has a global footprint of 30,000 cloud wireless LAN customers in verticals including education, healthcare, state and local government, and retail. This acquisition will bring new automation and intelligence capabilities to Extreme’s Elements portfolio. It will expand Extreme’s technology leadership in Wi-Fi and NAC, adding cloud-managed Wi-Fi and NAC solutions to complement its on-premises Wi-Fi and NAC technology, driving Extreme deeper into crucial verticals and presenting numerous opportunities for cross-selling and up-sell within the combined portfolios.16
  • 11. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.9 The new Gangster is delivering Hyperscale value for the rest of us! “Purple Metal” isn't just about saving money. It's up to you--not some vendor--to decide when it's time to upgrade. React to marketplace demands quickly. Open source provides this to developers and businesses alike by speeding up the pace of software development. Free themselves from severe vendor lock-in — the worldwide community of developers and users at their disposal for help. Whether a company is big or small, it'll stop developing code if it's no longer commercially viable, and you no longer have access to the source code and repositories.17 In the late 1990s, our ASICs had some significant benefits, mainly in the amount of buffering they could provide compared to merchant silicon. By 2005, those ASICs had turned into a disadvantage, because the next generation was late and expensive. By late 2009, We were using mostly merchant silicon. Routers will route, switches will switch, and processing will occur the same way. The future will be based on CLOS designs using clusters of chips instead of intricate models. Companies focused on making ASICs are starting to innovate and progress faster than a company with several business units; all are fighting for resources. Now merchant suppliers have the advantage by keeping complete fabrication in house. They don’t outsource parts of their ASIC fabrication for scale.
  • 12. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.10 EXTREME TABLE ON CONTENTS Chapter 1 - “The O.G. Original Gangsters Wired and Wireless” https://prezi.com/view/avGmnVQCt6jS3MynQUY9/ Extreme (Original Gangster of Layer 3 Gigabit Switching…………………………….1.3 Enterasys (Original Gangster of One Fabric Policy-based Switching)..…………….....1.4 Symbol (Original Gangster of the wireless controller)..……………...………………...1.5 Nortel/Avaya (Original Gangster of Fabric)..…………………...……………………...1.6 Foundry/Brocade (Original Gangster of Routers)..………………...…………………..1.7 Aerohive (Original Gangster of Cloud WiFi)..………..………………………………..1.8 “Purple Metal” (Hyperscale value for the rest of us)......................................................1.9 Chapter 2 - You might ask yourself who is breaking the law? https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk Extreme Law (Connected controlled devices create more value)………………...……2.1 Moore's Law (Transistors doubling every two years)………………….……………....2.5 Metcalf's Law (Connected users create more value)………………...………………..2.11 Reed's Law (Decline in the cost and the internet exponential growth)……………….2.12 Wirth's Law (Software gets slower faster than hardware gets faster)…………………2.13 The Evil twin of Technology (Technology can have a negative value)……………….2.16 Chapter 3 - Connecting the Smart Classroom https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk 70% of schools are moving to digital textbooks.……………………………………….3.1 43% of schools do not control each student’s access….……...………………………..3.4 20% of kindergartners have Internet-connected phones………………………………..3.5
  • 13. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.11 Chapter 4 – “The iron triangle of switches.” Fast, Good, or Cheap. Pick three. https://prezi.com/view/TUev1OQRff4sIzFVjvxQ/ XoS is what Design Equity is all about………………………………………………...4.4 Extreme's Insight Architecture…………………………………………………………4.7 Kubernetes, Microservices……………………………………………………………..4.8 Bare to Grey to Purple Metal…………………………………………………………..4.9 XoS Stacking (Vertical and Horizontal) …………………………..………………….4.11 Controlling Bridge Options…………………………………………..……………….4.12 What? – Watt! – Next Generation PoE………………………………………………..4.13 Chapter 5 - Symbol Invented the Wifi Controller. https://prezi.com/view/P2l5BX36QTNYxDdUAEUW/ Simple Virtual Control (One Software Track)………………………………………....5.3 Distributed Stateful Firewall (Session Persistence)…………………………………....5.4 Extreme Location………………………………………………………………………5.7 Security built-in with Air Defense…………………………………………………….5.17 Unified Wired and Wireless Fabric……………………………………………………5.20 Chapter 6 - Become the QB1 of your Wireless Network. American Football https://prezi.com/view/fU2tTGdBvs6jBCiVjGGj Rest of the World Football https://prezi.com/view/vWJ3A0677YIQvXRBEhem/ Purpose-Built Networking Solutions…………………………………………………..6.3 Great Wifi has in common with an NFL Quarterback?.................................................6.10 Modulation based on football metaphor………………………………………………6.12
  • 14. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.12 Chapter 7 - Maslow Hierarchy of Needs, if he did his study today. https://prezi.com/view/2MF4lw0eReIAihT8YICN/ Where would you put Wi-fi in your hierarchy of needs?................................................7.1 Pros and cons of cloud-managed deployments……………………………………...…7.4 Exceptional Quality of Experience…………………………………………………….7.5 Cloud Managed Networks can be more secure…………………..……………………7.7 No controller hardware limitations………………….…………………………………7.8 Thinking Beyond Hardware…………………………………..………………………7.12 Chapter 8 - Build-up (North-South) hierarchical vs. Built-out (East-West) Fabrics https://prezi.com/view/wvdVOB1lkj11jLLc8ER6 Ethernet “Old Boots” has a lot more to offer…………………………………………8.1 IoT is the “New Dirt" coming from everywhere…………………….………………..8.2 Spine Leaf designs are like the “Old Boots”………………………………………….8.4 Hyper Compute is like the “New Dirt”.………………………………………………8.5 Underlay Use Case……………………………...................…..……………………..8.10 Overlay Control Plane (BGP-EVPN) ……………………………..…………………8.11 Chapter 9 - Great Networks are built like “a great candy bar.” https://prezi.com/view/Qb1V9pp91lMCrJ36hof7/ Multiservice networking without multiple protocols…………………………………..9.2 Decoupled Control Planes……………………………………………………………...9.3 Topology freedom………………………….…………………………………………...9.4 Service Provider Experience…………………………………………………………....9.6 SPB IP Multicast (no PIM required).………………………….………………………..9.8 Network Segmentation - Reduce the Attack Vectors………………..………………….9.9
  • 15. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.13 Chapter 10 - The "Honey Badger" of the Campus Network" https://prezi.com/p/f5wrfvb8jkrx/automated-campus/ Scale by eliminating protocols…….………………………………………………….10.3 Honey Badger – no more Flood and Learn……………..…………………………….10.4 Loops - Extreme Fabric don't care…………………………………………………….10.6 Invisible Core: 11x Better with Edge-Only Provisioning…..…………………………10.7 PIM-Free IP Multicast……….………………………………………………………..10.8 Faster time to Service with Simple Edge Provisioning…………………………..….10.10 Chapter 11 - The Changing Network Perimeter. https://prezi.com/view/vWJ3A0677YIQvXRBEhem Changing Network Perimeter, BYOD is a new normal………………………………11.1 The secret mission to steal a Romulan cloaking device………………………………11.2 Security includes all people, processes, and technology………..…………………….11.4 The concept of ‘attack trees,’………………...………………………………………..11.5 The Changing Network Perimeter………………………….…………………………11.7 Why your SOC and NOC should run together but separately……...…………………11.8 Chapter 12 - Don’t play the Kevin Bacon game with your network. https://prezi.com/view/SN14ABZCYWBb3dPi7QJT/ How to hide your IP address from Kevin Bacon…………………………………….12.0 Satisfy all aspects of the multi-tenant requirement…………………………..………12.4 Fabric Connect Stealth Networking Services………………………………………..12.6 Minimize the XYZ Account ’s attack surface………………………………….…….12.8 Dark network topology enabled through stealth networking………..……………….12.9 Stealth Networks are private ‘dark’ networks………………...……………………..12.10
  • 16. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.14 Chapter 13 - Classroom Transformation 2020. https://prezi.com/view/yQQqKuu8lDcbepYqIr58/ Access Control to the 2020 Classrooms…………………………….……………….13.1 Because XYZ Account Teachers don’t know what a MAC address is………………13.2 Teachers neither know or care to understand how the technology operates…………13.4 A solution that Learns (Smart URL based detection)…………..……………………13.6 Guest access makes use of built-in web portals included…..………………………..13.8 Eliminate XYZ Account manual audits with automated assessments……………….13.9 Chapter 14 - Extreme Policy (One-click – One thousand actions) https://prezi.com/view/cRGzaknwAJBMgRJbjhbj Stop playing whack-a-mole with your network access control……………………….14.1 Digital Transformation requires a visibility…………………………………………...14.3 What XYZ Account the cost to chaos ratio is?..............................................................14.6 You can prevent escalation of disruptive behavior…………………………………..14.10 Govern the moles to their holes………………………………..……….……………14.12 Containing several moles with the fewest clicks…………………………….………14.16 Chapter 15 - Improve both operator experience and user experience! https://prezi.com/view/d75y9C05PqsounspCt4f/ Law of Accelerating Returns………………………….………………………………15.1 What is Artificial Intelligence?......................................................................................15.2 Enablers for digital transformation……………………………………………………15.4 Its kind-of like Lip Reading with excellent memory…….……………………………15.6 Conventional View of the Analytics Space…………………………………………....15.8 Root Cause Determination and Machine Learned results………….…………………15.9
  • 17. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.15 Chapter 16 – XOS Summit Switches deliver hop-by-hop encryption. https://prezi.com/view/5q7t9bhF7mJYJ8Uk07tD Enhanced Edge Security with X465 and Insight Guest VM.......................................16.1 The LRM/MACsec Adapter…………………………………………………………16.4 Localization of network communication………………………………………..…...16.5 Why is a layered approach better with MACsec?.......................................................16.7 Combine MACSec with IPsec………….…………………………………………....16.8 MicroVSP (MicroVSP for small branches or sites).…………….……………….....16.12 Chapter 17 - What’s the first rule of IoT? Nobody talks about IoT. https://prezi.com/view/EBGga5FVgtAdKnx2Y6Rz Simple - Automated Onboarding…………………………………………………….17.1 Understand - The traffic to the with Auto Policy Generator…………………………17.4 Know - You must understand the threat vector………………………………………17.6 Complimentary to existing security infrastructure……..……………………………17.7 Securing Medical and other Connected Devices with Ease…………………...……..17.8 Secure and straightforward Device Mobility - help you punch up……….………….17.9 Chapter 18 - PhySec Surveillance, Security. https://prezi.com/view/AIzbmqiEbfii9yTEMnOv Think of the smart building as another application…………………………………...18.1 Over 70% of surveillance issues can be attributed to the network……………………18.3 PhySec Design Concerns from DoDEA………………………………………………18.5 Transformational Changes to PhySec solutions………………………………………18.6 Fabric Connect is a new more straightforward way to build networks……………....18.9 To configure your type “Enable Multicast” on end-points…………………………..18.10
  • 18. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.16 Chapter 19 - "The Times - They Are a-Changin.'” https://prezi.com/view/OGNFfY7R8k2V0tMz9mAs What if, you asked the Network?...………………………………..………………….19.1 Visibility and control…………………………………………………………….……19.2 Flow-based architecture……………………………………………………………….19.3 Why do this in the network?..........................................................................................19.5 The risk versus time…………………………………………………………………...19.6 A system built for excellent user experience, devices, and things…………………….19.9 Chapter 20 – Extreme Workflow Manager is like the United Nations of scripting. https://prezi.com/view/V50qVnolQfibB9mCWET9 Improved Management XYZ Account Staff Productivity…………………………….20.1 Automating Is Not Enough (handoffs create delays)………………………………….20.2 Workflow-centric, cross-domain (2000+ integrations).……………………………….20.3 Automating Silos is Not Enough (handoffs create delays)……………………………20.4 Operational agility (DevOps-inspired) ………….……………………………………20.5 Troubleshooting (automation that responds) ……………..................………………..20.6 Chapter 21 -The Underlay and the Overlay, enter your Matrix? https://prezi.com/view/vwHzNP1qfXoKuwmq8pN0/ Plugged into the Matrix (“Like a VM in an SSDC”)………...……………………….21.1 Future networks must demonstrate that they can protect privacy…………………….21.2 Location Independence, VMs need mobility………………………………………….21.3 Physical infrastructure-independent, use existing deployments………………………21.4 Application Consumption – Anywhere, Anytime, Any Device………………………21.5 Agent Smith- Put an End to the Zombie Apocalypse...................................................21.6
  • 19. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.17 Chapter 22 - ExtremeOrchestrator - We're selling holes, not drills! https://prezi.com/view/7FZo2o1a3MDiTHB5XSfJ/ ExtremeOrchestrator delivers rack collapse……………….………………………….22.1 Temporally-aware Micro-segmentation………………………………………………22.2 Assignment based on time of day/day of the week…………………………….……..22.3 What can a captive portal do?.......................................................................................22.4 Integrated Content Filtering - Block entire domains………………………...………..22.5 Shared infrastructure? No VLANs? No problem…………………...……….………..22.6 Chapter 23 - Extreme Control XMC "Extreme Networks can keepyour Network 100". https://prezi.com/view/C9aaM51gUNEdcIk0g2VS/ Your organization is changing fast, so is your network……………………………….23.1 Make real-time decisions 100 based on actionable data………………………………23.2 Deliver your users a great user experience………………..…………………………..23.4 Know the where - so you can also “keep it 100”……………..……….………………23.5 Know the What - “keeping it 100”……………………………………………………23.6 Know the when - “keeping it 100”……………………………………………………23.7 Chapter 24 – When is "More Cowbell" required for Internet-scale border routing? https://prezi.com/view/PTq302mzx61uGIX0kr0G/ More cow-bell for cloud-scale routing………………………………………………..24.1 Agility - Let Your Routers Route……………….…………………………………….24.3 Elastic - Examine current trends and constraints……………………………………..24.5 Enables simple IoT at scale………...…………………………………………………24.6 Need for Integrated Switch Buffers………………...…………………………………24.8 Buffer bloat (is buffer always better?) …………………….………………………….24.9
  • 20. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.18 Chapter 25 - Extreme Elements - The Extreme Solutions Framework. https://prezi.com/view/DZmrqdDOtaxPjyLkkfci/ The central nervous system of an Autonomous Enterprise…………………………...25.1 Connects humans, machines, and devices to technology……………………………..25.2 Autonomous Network Endless combinations of outcomes………………...…………25.3 A Smarter Network Begins at the Edge……………………………………………….25.4 Reducing Time-to-Solution………….………………………………………………..25.5 A port is what it is because?..........................................................................................25.6 Chapter 26 - Complexity versus Chaos (Extreme Capital Solution). https://prezi.com/view/GUji2UurN3oD8HTEjsmh/ Find the right payment plan……………………………...……………………………26.1 Offers OpEx, as-a-service……………………………………………………………..26.2 Extreme, as-a-service…………………………………………….……………………26.3 On-demand upgradability………………………….………………………………….26.4 Predictable payments……………………...………………………….……………….26.5 Purchasing contract………………………………...………………………………….26.6 Chapter 27 - Is Layer-8 a thing? (The Political Layer) https://prezi.com/view/cjLvRipjCh390XFXIpsj/ This layer can be the most difficult to navigate………………………………………27.1 Smartnet Fatigue (Cisco ONE Software)……………………………………………..27.2 Vendor Lock-in (Lack of software agility)……………………………………………27.3 High Cost (“Lumpy” spending patterns)……………………………………………...27.4 Arrogance (Oh you want to leave, OK).………………………………………………27.5 Would you switch vendors (What if Extreme was free)?..............................................27.6
  • 21. Thursday, August 8, 2019 “Original Gangster” Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 1.19 Chapter 28 - The Goldilocks of the Network Industry https://prezi.com/view/TUev1OQRff4sIzFVjvxQ/ Has Extreme entered the Goldilocks Zone of Networking?.........................................28.1 The feature function of Cisco and Value of HP………………………………………28.2 Adjusts quickly to business and technical challenges…………….…………………..28.3 Easily adapts to new workloads and innovations……………………………………..28.4 Enables simple - reliable communications...………………………………………….28.5 “I want it all, and I want it now” ……...……...………………………………………28.6 Chapter 29 – Can you enjoy a Jetsons user experience on a Flintstones Network? https://prezi.com/view/JA61P1bjDadT6aVjy7Nc/ The Extreme Networks Business Case……….…………….........................................29.1 Complex Protocol Stack vs Ethernet Fabric Simplicity………………………………29.2 Design - Networking is still complex!..………………...………….………………….29.3 Simple and field-proven Campus Fabric……………………………………………...29.4 Strategy………………………………….....………………………………………….29.5 Delivery………………………...……...……...………………………………………29.6 Chapter 29 – Extreme Open Platform – v - DNA Closed networks https://prezi.com/view/ksi7J4Ab9HkMDzhVHJ7A/ The upside-down...........................................................................................................30.1 Psychology……………………………………………………………………………30.2 The Deal……………………………………….…………….………………………..30.3 So, What?……………………………………………………………………………..30.4 History...………………………………………………………………………………30.5 Transform……...……...………………………………………………………………30.7
  • 22. 8/7/2019 You might ask yourself who is breaking the law?  Moore's Law - the number of transistors will increase exponentially doubling every two years (the iPhone is 100 times faster and almost 500 times smaller).  Metcalf's Law looks at the value created by networks, Metcalfe’s law states that V = an * n2, where V stands for value and n stands for the number of users.  Reed’s Law - an opportunity created by networks. The rapid decline in the cost of communication and the exponential growth of the internet.  Bell’s Law- The more extensive your network, the higher is the difficulties for competitors to challenge your leadership.  Wirth’s law - “Software gets slower faster than hardware gets faster” The hope is that the progress in hardware will cure all (also known as Gate's Law and Page's Law).  Gödel's Theorem - mathematical ideas should not have contradictions.  User Experience rules - Great technology today looks very different from legacy technology in size, speed, and power. One goal to deliver next-generation networks. https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk/
  • 23. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.1 Extreme Law (Simple, secure, connectivity is the critical creator of value). Today, customers expect digital ubiquity; they expect everything to relate to excellent user experience and security. Customers expect to connect, communicate, and collaborate anywhere with anything. Connecting technology in a simple way is the fastest way to increase the value of the technology. Successful networks need to rapidly onboard BYOD users and devices. Extreme gives you the ability to quickly deploy the new digital technology at every entry point while delivering a consistent and personalized user experience. https://prezi.com/view/PdQw28WNszYEDnPYLmSy/ Five Extreme Truths about connected things. 1) Connected things create sustainable value (ubiquity). 2) Connected things enable OpEx compression (repeatability). 3) Connected things are smarter CapEx compression (embedded intelligence). 4) Connected things are safe and secure (Software-Driven Control). 5) Connected made visible (Reduce Complexity and improve scale). It’s time to begin thinking about a world where connectivity reigns supreme. The network edge is the new battlefront for competitive differentiation. The confluence of technology, users, devices, and applications is creating an unprecedented opportunity and challenge. Extreme Smart OmniEdge represents a breakthrough in helping enterprises accomplish their business goals. It provides operational efficiency via AI/ML and automation, new customer experiences via pervasive intelligence, diversified business models with adaptive on-premise / cloud solutions, and robust network security that protects your network and reputation.18
  • 24. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.2 Moore's Law (50 years of earning respect from geeks to executives). Our world—from the phone in your pocket to the car that you drive, the allure of social media to the strategy of the Pentagon—has been shaped irrevocably by the technology of silicon transistors. Year after year, for half a century, these tiny switches have enabled ever-more startling capabilities. Their incredible proliferation has altered the course of human history as dramatically as any political or social revolution. A young chemist turned electronics entrepreneur—had the defining insight: silicon transistors, and microchips made of them, could make electronics profoundly cheap and immensely powerful. Chips could double in power, then redouble again in clockwork fashion.19 “What people don’t understand is that the smaller things get faster and cheaper and better they always work.” Gordon Moore. Today, Intel executives have turned ‘Moore's Law’ into a ‘mantra.’ Intel has hammered Moore’s Law into its corporate culture. It gives engineers ever-moving, objective standard to reach with each new model. Since the last one year or so, computing power has not increased exponentially. Perhaps because transistors (and chips) have reached their limit of miniaturization. The next big step is likely to be Graphene made of carbon a single atom thick. We used to talk about three states of connectivity:  1st Loosely connected.  2nd Closely related.  3rd Embedded. A new state of connectivity is emerging. When connectivity becomes ubiquitous, and things, people, places are entangled. The more ideas, people, places, become connected the better things work..., the safer items become. With digital transformation and the move to smart schools, the need for hyper-reliable, easily-managed network infrastructure has never been greater. Extreme Networks builds open, software-driven educational networking solutions that are intelligent, adaptive, and secure to enable the digital transformation of education and improve learning outcomes.20 Moore’s Law as conversations between Gordon Moore a' Carver Mead as an article in electronics magazine 1965 as marketing to promote future use of chips in consumer products. This was the foundation of today’s digital everything enabling an influence that extends far beyond technology.
  • 25. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.3 Networking has not kept up with Moore’s Law. Moore, a co-founder of Intel, observed that the number of transistors that can be placed inexpensively on an integrated circuit double roughly every two years. Moore’s Law applies to Transistors, but network performance has not increased like compute performance. More Internet traffic is originating with non-PC devices. Projections show PC-based traffic expanding at a compound annual growth rate of 33%, while machine-based module traffic is forecast to grow at an incredible 258%.21  Transistor count is doubling every two years (2x in 2years/ and 64x/12years).  Bandwidth per chip (Switches approx. 10x in 12 years, Routers approx. 4x in 12 years).  Ethernet speed (1G to 10G to 40G to 100G to 400G).  Fewer Chips per function (Increased reliability, less power, reduced complexity, and cost). Metcalfe “, the Father of Ethernet,” stated that the value of a network increases proportionally with the square of the number of compatible communicating devices. Not all connections are created equal. A networked Access Point probably adds a bit more value to the network than an IoT sensor while some tools decrease a network’s amount, like those that spew out data that has no purpose.22 Metcalfe’s Law shows us that expanding the system increases its value. Moore’s Law tells us that while capability steadily increases, the cost of those capabilities continually drops. Together, they mean that the continued network expansion network is inevitable. The day is coming, and it isn’t far off when it will be technologically feasible and economically worthwhile to network-enabled even the simplest of things, right down to the light bulb. More sophisticated industrial devices are already network-enabled, and that’s just the start.23 0 200 400 600 800 1000 1200 1400 1980 1990 2000 2010 2020 MooreLaw v Storagev Networking Switch (Gigabit) Compute (Transistors) Storage (NanoTubes)
  • 26. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.4 Transistors are shrinking, but atoms are not. The industry might love its talk of exponential growth, but there are physical limits to the ability to continually shrink the size of components on a chip. Already the billions of transistors on the latest chips are invisible to the human eye. If Moore’s Law were to continue through 2050, engineers would have to build electronics from components that are smaller than a single atom of hydrogen. Many people predict Moore’s Law will slow down sometime in the early 2020s when chips feature elements that are only around 5 nanometers apart.24 Moore’s Law is ending; a silicon atom is 0.2nm wide; as a result, 3nm is very close to the end on that basis alone. In the future, squeezing more software performance out of the same hardware will be the top priority. It will mean more elegant software with an exceptional level of focus on user experience, look-and-feel, and quality. Processors will be taken for granted so much by users that we will forget the fact that even the digital watch that we are wearing on our wrists has a miniature embedded processor. Roadmaps from Intel and Applied Materials both hinting that 5nm is being researched, we remain hopeful. Perhaps the better question to ask, though, is whether it’s worth scaling to such tiny geometries.25 With each step-down, the process becomes ever more complex, and thus more expensive and more likely to be plagued by low yields. There may be better gains to be had from moving sideways, to materials and architectures that can operate at faster frequencies and with more parallelism, rather than brute-forcing the continuation of Moore’s law.26
  • 27. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.5 Metcalf's Law looks at the value created by networks. Network grows in proportion to the number of nodes in the system (n squared). Dr. Bob Metcalfe, the inventor of Ethernet, once said that the network’s power grows exponentially by the number of computers linked to it. According to him, every machine added to the system not only utilizes the system as a resource but also adds more choice and value. For example, if an order has ten nodes, its inherent value is 100 (10 * 10). Over time Metcalfe’s Law was linked with the Internet's substantial growth and how it works.27 It’s evident that if you’re the only person with a telephone, then that network would have no value, when one additional person gets a phone the system has achieved a tiny bit of value, and if virtually everyone has a phone, then the system becomes extremely valuable. This relationship has been observed in many industries where increased adoption boosts the network’s overall usefulness. If you’re the only holder of Bitcoin it’s not very valuable because there is no one to exchange it with for goods and services, however, if many people hold Bitcoin, then it should be much more valuable since there are now many people to potentially exchange Bitcoin.28 Looking backward, we can see how technology drove the shift from hunter to the farmer, from farmer to factory worker, and from factory worker to knowledge worker. It’s become clear that the convergence of Metcalfe’s Law, Moore’s Law, and the Internet of Things will produce another of these pivotal societal changes in just the next few decades.29 The Internet of Things ( IoT) is having a profound impact on every industry. According to survey data, 63% of IT organizations have witnessed a 50% increase in the number of endpoints is that they are
  • 28. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.6 connecting to the network. By 2020, Gartner estimates that 20.4 billion connected things will be in use worldwide. Reed's law "The Law of the Pack." Reed E. Hundt, then the chairman of the U.S. Federal Communications Commission, declared that Metcalfe’s Law and Moore’s Law “give us the best foundation for understanding the Internet.” Reed's Law is often mentioned when explaining the competitive dynamics of internet platforms. As the law states that a network becomes more valuable when people can quickly form subgroups to collaborate, while this value increases exponentially with the number of connections, a business platform that reaches enough members can generate network effects that dominate the overall economics of the system.30 Networks are made greater by the sum of their connections.31 The number of possible sub-groups of network participants is - 2n(x)-n-1 - where n is the number of participants. Reed's law is the assertion of David P. Reed that the utility of large networks, particularly social networks, can scale exponentially with the size of the system. The reason for this is that the number of possible sub-groups of network participants is 2N − N − 1, where N is the number of participants. Even Metcalfe's law understates the value created by a group-forming network as it grows. The utility of groups available to be joined is tiny on a per-group basis; eventually, the network effect of potential group membership can dominate the overall economics of the system. Reed's Law and Metcalfe's Law overstate network value because they fail to account for the restrictive impact of human cognitive limits on network formation.32 Imagine a network of 100 000 members that we know brings in $1 million. We must see this starting point in advance—none of the laws can help here, as they tell us only about growth. So, if the network doubles its membership to 200 000, Metcalfe’s Law says its value grows by (200 0002/100 0002) times, quadrupling to $4 million, whereas the n log( n ) law says its value increases by 200 000 logs(200 000)/100 000 logs (100 000) times to only $2.1 million. In both cases, the network’s growth in value more than doubles, still outpacing the growth in members,
  • 29. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.7 but the one is a much more modest growth than the other. The Internet can be explained by the difference between the Metcalfe-fueled optimism of n2 and the more sober reality of n log(n). Wirth's Law (Software Bloat). Niklaus Wirth, who discussed it in 1995 (also known as Gate's Law and Page's Law). For example, the latest version of Microsoft Office running on a new computer seems to run about the same speed as an older version of Office running on an older machine. Bloated software applications do not entirely cause problems. An advanced operating system run on less powerful hardware will move slowly. For example, running Windows 7 on a computer meant for running Windows XP will slow the system. Similarly, the user invoking many applications simultaneously will experience slow software performance.33 The main statement made within Wirth’s law is: "Software expands to fill memory and software is getting slower more rapidly than hardware is getting faster." Even though the hardware has evolved over the previous decades, the software has not necessarily become faster. Some software still runs much slower than previous versions or similar earlier software. For example, a word processor in 1970s took only 10kb of memory, while the same application takes over 100MB today. The advantage is that the processing speed has increased considerably compared to the previous forms. The increasing complexity of software over the years has been termed as software bloat.34 The most common cause of feature creep is the desire to provide the consumer with a more useful or desirable product, to increase sales or distribution. However, once the product reaches the point at which it does everything that it is designed to do, the manufacturer is left with the choice of adding unneeded functions, sometimes at the cost of efficiency or sticking with the old version, at the expense of a perceived lack of improvement.35 There is a real opportunity to simplify this static model and disaggregate feature sets from working software and disaggregate operating software from hardware. It is fundamentally about architectures that can deliver long- Excitement Implementation Performance Function
  • 30. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.8 term value. We believe that excellent infrastructure needs solutions that can step up to the toughest challenges by providing insight and control about what is going on in the network.36 Bell's law of computer classes. Gordon Bell described how types of computing systems (referred to as computer classes) form, evolve and may eventually die out. New courses of computers create new applications resulting in new markets and new industries. Bell considers the law to be partially a corollary to Moore's law which states "the number of transistors per chip doubles every 24 months". Unlike Moore's law, a new computer class is usually based on lower-cost components that have fewer transistors or fewer bits on a magnetic surface, etc. A new class forms about every decade. It also takes up to a decade to understand how the class formed, evolved, and is likely to continue. Once established, a lower-priced level may develop in performance to take over and disrupt an existing class. Added experience to the curve, user experience is often overlooked with the introduction of new technology design. How many times have you felt compelled to push a door only to find you need to pull it instead? While fire codes might dictate such design, it’s an example of user experience at work. While taking a moment to figure out whether a door is a push or pull sounds like a small thing, those types of irritants can add up. There must be a seamless merging of the services of multiple disciplines, including engineering, marketing, graphical and industrial design, and interface design. The center point of a solutions’ s features should be the user. The person using the solution is the single most crucial ingredient in this entire equation. Coming is a close second is a person operating the solution. Of course, you should design your network for the user with the assurance that this user will want to use the system. You should also plan your network with the operator in mind. In the field of 1960 1970 1980 1990 2000 2010 2020 2030 2040 Mainframes Mini Computers Personal Computers Ethernet Browser Cloud Sensors Crypto Experience Bell's Law Time
  • 31. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.9 architecture, there is a common saying that "Form follows function." The American architect Louis Sullivan coined the phrase in 1896. What is next in hardware? Quantum Computing, 3-D Transistors, and Graphene Carbon. All this complicated technology is geared towards one direction – making faster devices for our users beyond Moore’s Law. AMD is starting to use 2.5D Chiplets to make smaller 7nm chips that are then integrated into a more massive 14nm die with a through-silicon, Chiplets allow different functions (e.g., CPU, GPU) and different processes (e.g., 7nm, 14nm) on the same die. There are tons of alternative approaches being considered, including silicon photonics, carbon nanotubes, phase change memory, etc. All of these are worthy of exploration and productization. History indicates that promise is insufficient: they must be able to compete with the economics of the technologies that they will displace.37 The rise of graphene - Bend it, charge it, dunk it. Technology drivers that keep changing the way we live. Graphene is the strongest, thinnest material known to exist. A form of carbon it can conduct electricity and heat better than anything else. And get ready for this: It is not only the hardest material in the world. At only a single atom thick, it has been called the wonder material. Graphene could change the electronics industry. It is ushering in flexible devices. It has supercharged quantum computers. Electronic clothing and networks that can interface with the cells in your body.38 Graphene Circuit Advantages.  Graphene processor is >400 times faster than current processors.  Density Million times greater than copper and the most durable material ever discovered.  Optical with the most considerable absorption and broadest spectrum. What will we possibly do with all the new Compute and Bandwidth? That sounds like a legitimate question; if immediate needs were technology's guiding lights, we would all still be in the Stone Ages. Sometimes necessity is indeed the mother of invention, but inventions can create newer essentials and propel needs to newer heights. Metcalfe's dream for Ethernet was driven by the belief that if you build it, they will come. And that includes the requirements themselves.39 Metcalfe said last year he wants to "help shape a road map" to Terabit Ethernet, because "we're going to get there anyway." As we move further into the paradigm of cloud
  • 32. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.10 computing, where computing power and storage will gradually move to the center of the network, it becomes necessary that the system be fast enough to meet the needs of this new, highly distributed model.40 What is next in Software? Blockchain - public transaction ledger. Satoshi Nakamoto is the name used by the pseudonymous person or persons who developed bitcoin, authored the bitcoin white paper, and created and deployed bitcoin's original reference implementation. As part of the application, Nakamoto also devised the first blockchain database. In the process, Nakamoto was the first to solve the double-spending problem for digital currency using a peer-to-peer network. Nakamoto was active in the development of bitcoin up until December 2010. Speculation about the identity of Nakamoto has mostly focused on several cryptographies and computer science experts of non-Japanese descent, living in the United States and various European countries. The invention of the blockchain for bitcoin made it the first digital currency to solve the double- spending problem without the need for a trusted authority or central server. The bitcoin design has inspired other applications, and blockchains that are readable by the public are widely used by cryptocurrencies. Blockchain is considered a type of payment rail. Private blockchains have been proposed for business use. Sources such as Computerworld called the marketing of such blockchains without a proper security model "snake oil." A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that any involved record cannot be altered retroactively, without the alteration of all subsequent blocks. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. They are authenticated by mass collaboration powered by collective self-interests. Such a design facilitates robust workflow where participants' uncertainty regarding data security is marginal. It confirms that each unit of value was transferred only once, solving the long-standing problem of double- spending. A blockchain has been described as a value-exchange protocol.
  • 33. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.11 January 2017, the bitcoin blockchain grew from 50 GB to 100 GB in size. The Extreme Networks Business Case. Extreme Networks is not just about merely saving money. It’s more about doing new things you can’t do today. Of course, the result may save money through automation or from avoiding a data breach, as examples. But that’s secondary. It’s really about speed, agility, and security. Investing in Extreme can accelerate business velocity. A recent study reported the number one priority of CIOs and IT Directors in improving data and analytics to deliver business insights and improve business outcomes. However, according to Gartner, 67% of IT budgets are spent keeping the lights on, leaving fewer resources to invest in meeting these more strategic goals. https://prezi.com/view/50OA3XTfqu8UYgv6giN0/ IT is facing three key challenges.  The first is the risk of data breaches.  The second is the push for IT to deliver applications and services faster.  The third is the constant pressure for IT to do more with less. Extreme Networks can give you the high performance, low latency network to address the digital onslaught of today, the unified management and analytics of your wired and wireless networks, and the flexibility to adapt to whatever the future might bring. As a result, you can free up resources, and have the confidence in your infrastructure to be able to focus on driving business value. Finally, you need visibility into the full context of your network traffic to inform both tactical and strategic decisions with real-time data and application analytics without
  • 34. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.12 degrading network performance. Rather than ripping and replacing your current infrastructure every couple of years, you need to be able to adapt, automate, and strategically add to your network to make the most of the investments. Great networks today are simpler. Great technology today looks very different from legacy technology in size, speed, and power from the ones you may have purchased over the past 10-20 years. It’s not about a switch or a box anymore; it’s about a platform and a solution set that drives value well into the future. Ask yourselves this simple question: “Is your network faster today than it was three years ago?” The explosive growth in the number of devices accessing the network leads to traffic overrun. It’s not good enough anymore to provide connectivity: it’s also essential the network deliver connectivity in a controlled and manageable way. https://prezi.com/view/dlWvLdmHJbEewCy4Qa9C/ Extreme Networks has been on an acquisition spree this year, capturing critical networking assets from the likes of Extreme Communications and Extreme. After the consolidation of these companies, Extreme’s position will only be strengthened. We're seeing HP becoming more commodity-like which opens doors for us to become more specialized for enterprise customers. Extreme has a cross-platform strategy designed to meet our changing times.41 As demand for network connectivity increases, network managers are being asked to deliver more services, and make changes at an increasing pace, with fewer errors, and at a lower cost.  Simple Platform Approach - Enhances Agility by leveraging the broader IP community. Building value through merchant Silicon means increased value and faster and faster chips.  Reduces Operations Costs - complete separation of control and services planes (A new simplified way to design, build, and manage networks, with services invisible to each other).  Improved Stability and Security - One Control Plane from Identify to Security (Know who, what, where, when across all ports). In an infrastructure that connects the world, no one should expect radical shifts in the fundamental methods of moving data across Ethernet and IP networks. However, components,
  • 35. Thursday, August 8, 2019 You might ask yourself, what laws are we breaking? Jeff Green Extreme Law (Simple, Fast & Secure). Chapter 2.13 protocols, architectures, and management methods are always changing. Networking professionals shouldn’t get wrapped up in how specific vendor-centric solutions should work but should look instead at how functional open, heterogeneous networks operate.
  • 36. 8/7/2019 Connecting the Smart Classroom, get ready for your XYZ Account learning journey with Extreme Networks. • 70% of schools are moving to digital textbooks. • 43% of schools do not control each student’s access. • 20% of kindergartners have Internet-connected phones. https://prezi.com/view/z0Ecd8YYoMfS43CcrVYk Approximately, 20% of the Florida School districts have chosen to partner with Extreme.
  • 37. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.1 Extreme is a leading provider of technology services to educational institutions. Think of the smart school as another app on the network, enabling and optimizing the flow of a new type of traffic. In so doing, though, it’s fair to ask what new requirements will be placed on the network. While many people think of smart-building operations as presenting only minimal traffic and duty-cycle demands, the opposite can, in fact, be the case – video surveillance comes to mind here, of course, but the myriad of sensors along with new applications and their servers, many just emerging today, will likely necessitate an audit of current network resources and operations. Smart Schools drive new planning activities, network enhancements and upgrades, and even modifications to operational strategies, policies, and procedures as appropriate. https://prezi.com/view/WfVvCHNEV4Ex5IqYjiIq/ Management Center provides XYZ Account centralized visibility, and granular control of enterprise network resources end to end. Management Center is distinctive for granularity that reaches beyond ports and VLANs down to individual users, applications, and protocols. No matter how many moves, adds, or changes occur in your environment, the Management Center keeps everything in view and under control through role-based access controls.42 With digital transformation and the massive shift to smart schools, the need for hyper-reliable, easily-managed network infrastructure has never been more significant in K-12 education. Extreme Networks builds open, software-driven educational networking solutions for K-12 schools that are agile, adaptive, and secure to enable the digital transformation of education and improve learning outcomes. Our networks are deployed at more than 17,000 schools and 4,500 campuses worldwide, enabling emerging styles of technology-driven teaching, including online testing, virtual and augmented reality, robotics, and flipped classroom.43
  • 38. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.2 A Smarter Network Begins at the Edge One-click can equal a thousand actions when you manage the XYZ Account wired and wireless network with Extreme Smart Omni Edge. Management Center can even manage beyond Extreme Networks switching, routing, and wireless hardware to deliver standards-based control of other vendors’ network equipment. Extreme is one of the most popular solutions for school districts since their management solution provides the ideal integration solution between wired and wireless infrastructure. No other manufacture’s management platform provides the simplicity and ease of use to manage both wired and wireless solutions as a cohesive solution.44 Extreme is only 1 of 3 companies in the Gartner 2018 LAN/WLAN Leader Quadrant. Extreme also continues to provide the most reliable customer service in the industry through a 100% insourced service and support team. Extreme is committed to assuring your district is delighted with their decision for years to come. All equipment proposed meets or surpasses the specs you requested. https://prezi.com/view/50OA3XTfqu8UYgv6giN0/ Extreme Networks has been chosen by many of your fellow Florida school districts, including the school districts of Palm Beach, Okaloosa, Washington, Walton, Bay, Martin, Okaloosa, and Gadsden. Many of the largest Universities in the state have also chosen Extreme, including the University of Central Florida, the University of Miami, and Florida Gulf Coast University. Currently, there are over 1,400 districts and 17,000 schools deploying Extreme Networks solutions in North America.
  • 39. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.3 Monitor digital citizenship with XMC? XYZ Account gets for $4,995. While -not- E-Rate is eligible, Network Monitoring and Security is more critical than ever as E-Rate boosts schools’ digital connectivity. XYZ Account can take advantage of this pricing to help reduce E-rate ineligible costs. Extreme Control Center (formerly NetSight) is a single pane of the glass management system that provides visibility and control into your wired and wireless network, from the data center to the mobile edge.45 https://prezi.com/view/yQQqKuu8lDcbepYqIr58/ Deliveractionable data to instructors, parents, school boards, and the community. Sixty-three percent of districts have implemented flipped learning in at least some classrooms. Mobility, outsourcing, governance and compliance, legacy systems, and the adaption of new technologies make it truly difficult for CIOs and their organizations to tackle these issues while serving the needs of the business. More money for better networks means more devices and information to protect. Sixty percent report using a blended model, where students split time between online and face-to-face instruction. Ensure Common Core state standards testing and bandwidth during online assessments. Relate technology use to student performance and engagement?  Compare actual application use with expected use? Measure network performance response time and spot bottlenecks?  Analyze performance needs of digital textbooks, video, collaborative software? Monitor for rogue and shadow IT devices?  Compare actual use with expected use?
  • 40. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.4 Enable new styles of learning, including the flipped classroom. Networking technology today plays a vital role in personalizing education, improving learning, and creating better outcomes. Extreme Networks wireless and wired infrastructure effortlessly manage which users, devices, locations, and applications have access to all network resources. The networks enable new styles of learning, including more substantial use of digital content, flipped classroom, and extensive use of online testing. As a teacher or administrator, you need to know that the network can be tuned to control which users at specific locations have access to resources and applications. This information can then be tracked and displayed.46 Digital Citizenship K-12 school districts are making a strong push to deliver digital citizenship courses online. These courses educate faculty and students on the proper use of technology, including how to identify credible sources of information, the fair use of social media, and online bullying awareness. Districts are then allowing specific devices and application access based on the student’s successful completion of the digital citizenship course. Having access to network traffic utilization data helps verify that district content filters are performing as expected, and students are good stewards of the technology. The Extreme Networks network forensics can check proper or improper use of the resources for granting or removing expanded access rights.47 Online Testing With the flexible network control offered by Extreme Networks, classroom networking can be set up to allow secure student access to the test servers for online exams but disallow universal Internet access. In the same classroom, the teacher’s device can be granted access to all district resources as well as the Internet. Our Purview software can monitor the network during on-line testing to understand the performance being delivered both onsite and off-site from remote testing servers. Extreme Networks can help you prepare your district for Common Core and other online assessments. Our network experts can make sure you are ready for all online initiatives, including PARCC, Smarter Balanced, and specialized state programs now and in the future.48
  • 41. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.5 Personalized Learning XYZ Account Schools. The network edge is where the delivery of personalized learning is won or lost. It’s where XYZ Account organization engages students and teachers, where mobile transactions occur, where IoT devices connect, and where you make the first stand against cyber threats.49 With the rapid adoption of 1:1, BYOD, Flipped Classrooms, Digital Textbooks, and Personalized Learning, districts must leverage the power of their network infrastructure to improve the learning environment of their students and support the instructional needs of faculty, staff, and students.50 What personal learning tools is XYZ Account using or planning to use? Extreme’s Smart OmniEdge network solution delivers a unified wired/wireless infrastructure for cloud or premise deployment, augmented with AI-powered applications and managed through a single pane of glass. The result? A network that delivers a consistent Education-driven experience contains costs and enables a competitive advantage to provide personalized learning. The explosive growth in the number of wireless devices accessing the network leads to the wireless network being overrun with traffic. It’s not good enough to provide connectivity: it’s also essential that the system deliver that connectivity in a controlled and manageable way. Customers need to be able to control access to services on a granular level, rather than block entire segments of the user community wholesale. They need to be able to manage the number
  • 42. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.6 of devices accessing the network and how much bandwidth they occupy. They need to control the flow of data, fix problems as they arise, and plan for the future of the network.51 One-to-One XYZ Account Computing. K-12 school districts are faced with extraordinary challenges, as well as opportunities to reshape how students are best prepared for college and 21st-century careers. Schools can take advantage of emerging educational technology to meet the teaching needs while adhering to modest budgets. Delivering personalized learning to students requires rich, digital content, including video and adaptive learning textbooks. One-to-one computing programs are a way to make sure all students enjoy the benefits of digital learning content. These are the critical technology issues facing school districts as they implement one-to-one computing. Addressing these issues will help school districts achieve their objective of learning success for all students.52 The solution described below provides XYZ Account school districts with Wi-Fi connectivity, including an efficient means to onboard and manage both district-owned and guest devices. The system offers a single window for administering the network and setting a policy to determine which resources each device can access, both within the school and across the Internet. The system manages a range of parameters that assess device access rights, based on user, device type, location, time of day, and 40 more attributes.  Deliver Content - textbooks and video present high-quality XYZ Account learning content at a lower cost than traditional books, but require high speed, ubiquitous Wi-Fi to connect every mobile device. Edge switches provide backhaul from the Wi-Fi access points and connect wired infrastructure to the network. High availability or fault tolerance is essential to ensure uninterrupted teaching.  Protect Privacy - The network must selectively connect authorized devices and block unauthorized devices. Schools require comprehensive policy enforcement that is based on device type, user, location, time of day, and many more attributes. Network integration with web filters and firewalls is also essential. The network must be capable of both controlling and monitoring all devices and network activity.53
  • 43. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.7  Grant Guest Access - In addition to easy onboarding of XYZ Account district-owned devices, a simple method for onboarding guest devices and instilling them with the appropriate access to Internet resources must be provided. Today’s new styles of learning require new technology. Digital technologies will change the way learning takes place. People ask how you can improve the learning environment in the classroom. Extreme can enable teachers to bring knowledge to life for students beyond the walls of their class or school. Extreme’s Digital Strategy for Schools is the result of extensive research and consultation and reflects the views of our education stakeholders. Learning today needs to entail more than knowledge acquisition; there needs to be an equally strong emphasis on skill development. Learners need open-ended learning experiences that develop the learners’ higher-order thinking, creativity, independence, collaborating, and ownership of learning.54 Enabling a technology-rich XYZ Account curriculum. Smart Classrooms can deliver a personalized learning experience. Ask yourself? Have you ever walked into a school and plugged into the Ethernet port and the network asked you what VLAN do I want to connect too? Of course not. Systems never give you that option when your plugin. So why do you have a wireless architecture that provides the user with a choice? Manufacturers have been using SIDS as Security Boundaries. With Extreme, XYZ Account can offer a single SSID, so now they don’t worry about what SSID to connect because there is one. When a teacher, admin, or guest walk in they relate to the same SSID and authenticate as a guest. Letting the network think. Given the pressures of district growth and continuing technology innovation initiatives, ensuring high-speed wireless connectivity, ease of network management, and improved bandwidth are critical. Technology is an integral part of the curriculum throughout all grade levels. A crucial component of a school wireless network must have centralized management of control. Doesn’t matter who owns it. Many schools today if a student/admin/faculty walks in with a non-district-
  • 44. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.8 owned machine, we let them get on as a guest…. the problem is that a student isn’t a guest…a student is a student. We filter with CIPA Compliance differently btw student/guest…rate limit... You are an ISP to the instructional environment. Not to the guest…. I’m a guest. Digital Signature within the WLAN 50+ Factors. When you log in, the solution fingerprints the device with over 50 points of identification. These factors help us individualize curricular delivery, making it easy and curricular-based for the student. XYZ Account staff needs full visibility into all devices on your network and the ability to control application access based on user, device, location, and time of day. With Extreme Networks NetSight Network Management Tool, you can create network access policies down to the individual level without resorting to multiple SSIDs. For example, XYZ Account can grant STEM classes more network resources as needed, restrict Netflix to learning uses, and allow gaming devices when educationally-appropriate.55 Best of breed networks allow XYZ Account flexibility to use the best tools that enhance and simplify the management process. Our solutions provide deep integration with iBoss and LightSpeed web filtering applications so that you can control application access down to the individual level. Policies can be applied to Google Chromebooks automatically at bootup to control which services they can have. Our switching guarantees QoS for Lync applications on both the wired and wireless network. We provide deep integration with Palo Alto Networks and Fortinet firewall solutions to better manage your overall network. Our NetSight NMS and Mobile view NAC products also integrate into the existing system regardless of current switching and wireless vendor.56 1) Automated Device Registration - Today’s students are tech-savvy. They’ve grown up using wireless. The IT department doesn’t need to touch each device anymore. Network access control can allow users to register themselves. 2) Control - Most schools have a directory database of users, and if you don’t have one, you should. It’s a central place where you create user names and passwords for each student. 3) Visibility - Wireless can be invisible to a student or teacher. That’s a big problem for the IT staff who must figure out why a student’s iPad isn’t working. You must have the ability to see the user, what type of device they are using, what kind of coverage.
  • 45. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.9 4) Prioritization - Quality of service means that you should be able to determine what uses are most important to you. Make sure learning tools take priority over a student or teacher streaming Netflix or YouTube. 5) Time - How is this all done with a limited staff, that is typically getting smaller, not larger. Schools of the future need an easy button to deliver personalized learning. Full Turnkey XYZ Account Smart School Solution. Our proposal includes comprehensive, turnkey installation services. Our full-time staff performs all proposed installation services. Unlike most firms, we do not have to rely on sub-contractors to perform the required installation. Extreme retains highly skilled certified professional team including Systems Engineers, Wireless Engineers, (Wireless, voice, data) and Certified Network Experts. Our in-house engineers have certifications from a wide range of manufactures. The trend here is clear – every school is going to be a smart school. And the key to smart-building success is in leveraging network infrastructure with the coverage and management to make this outcome a reality. Smart buildings, again, can indeed be viewed as just another application on the organizational network, and properly implemented, intelligent buildings represent new traffic that can be accommodated via additions to current systems, along with the appropriate upgrades and improvements always in the plans at any given facility. Digital textbooks require high-speed and high-density data and video streaming. With Extreme Networks, you can configure the network to provide digital books in the classroom with the bandwidth they need, while still limiting or preventing fast streaming of music or games to
  • 46. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.10 students in the cafeteria. In the same class, the teacher’s device can be granted access to all district resources as well as the Internet. Our software can monitor the network during on-line testing to understand the performance being delivered both onsite and off-site from remote testing servers. Extreme Networks can help you prepare your district for Common Core and other online assessments. Our network experts can make sure you are ready for all online initiatives, including PARCC, Smarter Balanced, and specialized state programs.57 XYZ Account Education Challenges. K-12 education leaders are striving for better learning outcomes. At the K-12 level, the goal is learning success and preparing students for college and careers. Schools must demonstrate that they can protect student privacy (FERPA) and safety (CIPA), as well as comply with HIPAA and PCI standards. Underlying these goals is the challenge of operating in a controlled IT resource environment. This added control applies to budgets, staffs, and technical expertise. To better meet the goals of education subject to resource limitations, schools are using new styles of teaching, including personalized learning, flipped classrooms, augmented, and virtual reality.58 Smaller school systems, such as charter and private schools require an easy-to-manage, cloud- based network system, often delivered as a managed service. Extreme Networks offers these, with the full features and benefits of on-prem solutions. In addition to being severely constrained by limited technical resources, many K-12 school districts have environments with dynamic RF characteristics that are difficult to manage. For example, the gymnasium or cafeteria may be empty most of the time but crowded during events. Wi-Fi connectivity must be flawless in all cases. ExtremeAI adaptively tunes the access point parameters, reducing the need for resource-intensive hands-on network management by technically expert staff.
  • 47. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.11 Our Smart OmniEdge solution provides a single pane of glass for unified wired/wireless management, including remote facilities where a cloud-managed approach is optimal. With limited technical resources, networks must be agile to adapt to changing needs, while leveraging existing investments without retraining. Smart OmniEdge uses a standard user interface and workflow with both cloud and on-premise solutions, making it easy to adapt to changing needs quickly. The same access points are used, whether managed on-prem or from the dust and regardless of the business model: either subscription or perpetual licensing.59 Extreme Wireless Solution Supports 1:1 Google Chromebook Initiative. The Washington County School District (WCSD) is in beautiful, rural Northwest Florida. Approximately 3,400 K-12 students are enrolled in two elementary, two middle and two high schools. The district also serves around 600 post-secondary students in one technical center. To take their mission of providing appropriate, high-quality, and rigorous educational programs in a safe learning environment into the 21st Century, the WCSD needed to upgrade their network. The upgrades would support classroom collaboration with a Bring Your Device (BYOD) policy, as well as enable the school district to meet state online testing requirements. Florida has had the FCAT (Florida Comprehensive Assessment Test) for some time, and they are pushing for more standardized online testing with End of Course (EOC) tests. A big part of justifying the network upgrade was to prepare the school district to handle this online testing. And treat it, it did. “As soon as we put all the testing laptops on the Extreme network performance and ease of maintenance both improved by a factor of two. The State of Florida Department of Education has selected the American Institutes for Research (AIR) online testing platform as a replacement for Florida’s Comprehensive Assessment Test (FCAT), and thanks to the new high-bandwidth Wi-Fi, WCSD can say with confidence that they can handle online testing network requirements. Chromebook Complaints – There are over 30 different Chromebook models with different NICs/drivers for Chromebooks.  Intermittent connectivity.  Slow to connect, won’t connect with 11n rates.  Samsung Chromebooks slow when unplugged.  Falls off network then connects back.  Loss connectivity/slow ping when on battery  Streaming issues.  2.4GHz only end devices connect, performance fails over time.
  • 48. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.12 Has your XYZ Account faced those sorts of problems with Chromebooks? Google’s student devices now own the leading share of the school market, but they come with their own set of quirks. On the positive side, Chromebooks are inexpensive, durable, secure, easy to manage centrally, and have long battery life. Chromebooks assume a100% reliable Wi- Fi connection. If you are not careful, that Wi-Fi connection can run into interference from adjacent channels, co-channel or non-Wi-Fi devices like Bluetooth and microwave ovens.60 The potent combination of affordable devices, productivity tools via G-Suite [formerly Google Apps for Education], easy integration with third-party tools, task management via Google Classroom and easy device management remains extremely popular with teachers. The rise of Chromebooks has also set new industry benchmarks with regards to average device pricing, with prices reaching as low as $120 on specific projects. Chromebooks for education now account for the leading share of the school device market at 58%. But Chromebooks require Wi- Fi connection and come with their network behavioral quirks. They are known to unpredictably falling off the network and often act differently when on battery power. The good news is that with the proper Wi-Fi hardware and software, implemented with robust system design, Chromebooks will perform flawlessly in your classrooms. Your system design will need to be based on capacity considerations, like the number of devices, individual and total device bandwidth required, and physical constraints like walls, doors, and windows. From an IT perspective, each Chromebook takes just 5-10 minutes to prep, and are automatically updated behind the scenes while the students are working. Chromebooks even allow for the development of group policies so that IT can push out apps and different Wi-Fi connectivity per user group. A Chromebook must-have - Chrome Connectivity Diagnostics is the kind of app that few think to install when the full force of the internet is flowing freely. But plan; install this app now instead of those inevitable future network failures. Your blood pressure will thank you! It’s included in Chrome OS Dev by default.61 Don't hide the SSID for Chromebooks.  Need for 5GHz increases - Channel width gets narrow (20MHz).  Inefficiencies exposed under load.  Co-channel interference (CCI) increases.
  • 49. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.13  For general web browsing and editing Google Drive documents, 0.2-0.5 Mbps per concurrent session at a minimum should provide satisfactory performance.  If your employees or students will be streaming video or using Google+ Hangouts, at least 1 Mbps per concurrent user session is needed and >4 Mbps is required for HD video streaming.  Latency may be a more significant indicator of user perception of performance than bandwidth for interactive web-based applications. Generally, <100 ms ping is needed for a pleasant experience.62 Analyze XYZ Account Student Attitude, Learning. Purview capabilities can be critical before and during online assessments for understanding and addressing performance issues that could interfere with testing. Purview can determine if a responsiveness issue is caused by a school network issue, an Internet issue, or a remote server issue. Competence includes over 13,000 application fingerprints over 7000 applications, including the critical applications for education users. Application categories include teaching, analysis, social networking, restricted content, search engines, sports, streaming, web content sources, web file sharing, web collaboration, and healthcare. https://prezi.com/view/kXhe50IZkAhDey8i6xEe/ Extreme Analytics can monitor the school’s network performance to achieve an optimal design. It can help make sure that the most critical apps get the network performance they need. It determines where performance delays are located; on-site or off-site. As noted above, this is especially important in preparing for online assessments.63 Survey how classroom technology is being assimilated and used.  Are instructors using the technology? Monitor apps like Blackboard to analyze ROI.  Are they using their devices in the classrooms? Is more coaching needed to help teachers make better use of new technology?  What students and faculty are accessing software, applications, and web sites?
  • 50. Thursday, August 8, 2019 Enabling new styles of learning. Jeff Green Enable Personalized Learning Section 3.14 Whether it’s a public school, private or charter school, the other significant trend that will only grow over time is the goal of putting a device in the hands of every student. These “1 to 1 program” make it mandatory that you have high-performance networks in your classrooms. What’s driving the need for robust and reliable systems in classes? Everything from web-based learning tools, online instructional resources, and collaboration to the increasing use of eBooks. Beyond the day-to-day education activities, student assessments and online tests such as PARCC® and Measures of Academic Progress® (MAP®) are also driving the need for faster and more reliable network infrastructure in the classroom.64 Classroom of 2020 How XYZ Account Does it Better? Deliverpersonalized learning to student devices to improve your educational outcomes Personalized learning takes advantage of digital content, adaptive techniques, 1:1 computing, smart displays, and the latest developments in EdTech. Your XYZ Account network must be able to easily integrate with your student directory and provide bandwidth where and when it is needed. Extreme wireless access points and wired switches are easily managed with Extreme Management. Access to student and teacher devices, whether they are 1:1 or BYOD, is controlled with Extreme Controland monitored with Extreme Analytics. Connectivity can be assured throughout thecampus.65 Online Testing Online testing involves large numbers of students simultaneously taking a remotely-served test on a local wireless device. There are numerous war stories of remote servers going down leaving administrators to guess at theproblem, or even unaware that there is a problem, force the test to be either re-administered or thrown out entirely.66 Chromebook deployment Optimizeand Manage Chromebook Wi-Fi Experience, and learn the ins and outs of the Chromebook Wi-Fi experience from our expert, Gavin Bertsch. He’ll describe how to plan and implement your Chromebook deployment, and how to track down problems quickly should something go wrong. Device Onboarding Consistent device policy based on over 40 attributes centrally implemented, enforced end-to- end. Simple device onboarding, 100% fidelity of all IP assets Internet filter and firewall integration, MDM integration. Digital Citizenship Flawlessly execute high stakes, technology-based testing - Whether for k-12 standards compliance or higher education mid-terms and finals, online testing requires high speed, low latency networking, device management, and network analytics to ensure the best possible testing experience. Our Extreme Analytics helps locate any issues that come up relative to the remotely-served test. Extreme Control makes sure that only theright devices and students are connected.67 Government Compliance Comply with all safety and privacy standards and requirements. Schools must demonstrate that they can protect student privacy and security. In theUS, that means meeting FERPA, CIPA, HIPAA, and PCI, among other regulations. Underlying these requirements is the challenge of operating in a controlled IT resource environment and still achieving the best educational outcomes.68 Simple Management - Solving Those Annoying Connectivity Quirks Consistent network management interface, on-prem or through the cloud - how to use network policy to protect student safety and network resources; and network analytics to monitor application usage and data flow (provide rapid onboarding). SimplifiedInfrastructure Extreme Management Center helps shapetraffic within the network to ensure bandwidth and performance where it is needed for high digital loads, like AR headsets. Extreme Control makes sure only the authorized IoT devices get access to the network. Extreme Switching provides both theconnections and the PoE power to IoT devices in theclassroom. Stem & Robotics Robots labs, drones, and STEM learning are important for preparing students to the jobs that will be available when they graduate. AR/VR/MR play a growing role at all levels of education, not just increasing student engagement, but reducing costs as students can travel