SlideShare a Scribd company logo
SOFTWARE DEFINED NETWORKING:
FROM CAMPUS TO CARRIER
TO CLOUD
Shehzad T. Merchant

                      © 2012 Extreme Networks, Inc. All rights reserved.
Two Major Themes: Convergence and Mobility

                                         Ethernet
     3G / 4G      WLAN                          LAN                              Data Center         The Cloud

                          Seamless User Experience


                                                                      WIRED
                                                                                               Information
                                                                   WIRELESS                      Content
                                                                                               Applications
                                                                      3G / 4G




                 Businesses Are Being Mobilized
               SDN Can Deliver High Value & Make This a Reality


2                           © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Campus
                                                          Role                   Internet   Intranet   Mail   CRM/Database   VLAN

                                                          Unauthenticated           Yes       No       No          No        Default
                                                          Contractor                Yes       Yes      No          No        Default
                                                          Employee                  Yes       Yes      Yes        Yes        Default
User: John
Role: Employee
Resource Access = Permit All




User: Alice
Role: Contractor
Resource Access = Deny Mail and CRM




User: Bob
Role: Unauthenticated
Resource Access = Internet Only


 Page 3                               © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Data Center
                                                                VM
                                                                Role                      Finance Accounting
                                                                                       Internet Intranet Mail         Engineering
                                                                                                                       CRM/Database VLAN
                                                                                                                                     VLAN

                     VM                                         Payroll
                                                                Unauthenticated           Yes Yes   No    No    No        NoNo     Default
                                                                                                                                    Default
                                                                Employee
                                                                ContractorDatabase Yes No           Yes   Yes   No        NoNo      Default
                                                                                                                                     Default
                                      Hypervisor                Outlook
                                                                Employee                  Yes Yes   Yes   Yes   Yes       No
                                                                                                                           Yes      Default
                                                                                                                                     Default
User: John
VM: Payroll
Role: Employee
Access = Finance
Resource Access = Permit All




                     VM

User: Alice
VM: Employee Database
Role: Contractor
Access = HR
Resource Access = Deny Mail and CRM
                                      Hypervisor




                     VM
VM: Outlook
User: Bob Employees
Access = All
Role: Unauthenticated
Resource Access = Internet Only


 Page 4                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Demarcation of the Access Edge no longer in the Wiring Closet
    • Access edge border now extends within the Enterprise Data Center …
      the “virtual wiring closet”
      • That’s where Virtual Desktop Machines are located
      • User sessions are now initiated within the Enterprise Data Center




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


5                                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Controls needs to be applied at Access Edge and within the Data
      Center ToR
    • Identity, Roles and Mobility pervasive across Campus and DC
      • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine
      • Dynamic roles, policies, and identity need to be consistent




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


6                                                     © 2012 Extreme Networks, Inc. All rights reserved.
Enter Software Defined Networking
    • De-Couple Forwarding and Policy Decisions From Network Connectivity
      and Topology
    • Centralized, Consistent Policy and Management Model
     • Campus edge to DC server edge and into the mobile carrier edge


                                                   Ethernet
               3G / 4G        WLAN                      LAN                   Data Center      The Cloud

                                    Software DefinedExperience
                                     Seamless User Networking


                                                                        WIRED
                                                                                        Information
                                                                     WIRELESS               Content
                                                                                        Applications
                                                                       3G / 4G



                            Businesses Are Being Mobilized
                         SDN Can Deliver High Value & Make This a Reality


7                                  © 2012 Extreme Networks, Inc. All rights reserved.
Where Are The Deployments?


    • Mostly Early Trials
     • Universities, Enterprise Campus, DC and Cloud
    • Building Knowledge, Expertise and Comfort
    • But, With Growing Interest…




8                            © 2012 Extreme Networks, Inc. All rights reserved.
Challenges
    • Lack of Maturity
    • Standards Changing/Evolving Quickly
    • Limited Silicon Support
    • Vendor Commitment
    • Lack Of Vendor Interoperability
     • Controller, Switch, Security, Policy
    • The Proverbial Departmental Divide
    • Misplaced Expectations
    • Demonstrable ROI v/s Existing Vendor Approach




9                               © 2012 Extreme Networks, Inc. All rights reserved.
Technology Adoption Cycle



                OpenFlow




     Interest




                                                  Time


10                         © 2012 Extreme Networks, Inc. All rights reserved.
Looking To the Future – OpenFlow App Store?


 • OpenFlow becomes the Android of networking
 • OpenFlow and related specifications all available as
   Open Source
 • Apps for every need – From QoS, to PBR, to Identity and
   mobility, to multi-tenancy
 • ONF becomes the Marketplace for OpenFlow Apps?
 • Controller vendors eventually become application developers




11                      © 2012 Extreme Networks, Inc. All rights reserved.
Thank you



© 2012 Extreme Networks, Inc. All rights reserved.
Mobility Drives the Cloud

                                           Ethernet
     3G / 4G        WLAN                          LAN                              Data Center         The Cloud

                            Seamless User Experience


                                                                        WIRED
                                                                                                 Information
                                                                     WIRELESS                      Content
                                                                                                 Applications
                                                                        3G / 4G




                   Businesses Are Being Mobilized
               Extreme Can Deliver High Value & Make This a Reality


13                            © 2012 Extreme Networks, Inc. All rights reserved.

More Related Content

What's hot

Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
Jeff Danielson
 
Cmg app migration ppt
Cmg app migration pptCmg app migration ppt
Cmg app migration ppt
Raja Ahmed
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
Shelf Companies Aust
 
WebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOAWebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOA
Jason Faszholz
 
Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011
Perfecto Mobile
 
Dms introduction
Dms introductionDms introduction
Dms introduction
Sankom Pribun
 
Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5
Angel Ortíz Pérez
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
HPDutchWorld
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
HPDutchWorld
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
bgalusha
 
E dms
E dmsE dms
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
SOA Symposium
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weather
todd.lewis
 
Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]
Erik Schmude
 
Bell Total Connect Voice Webinar
Bell Total Connect Voice   WebinarBell Total Connect Voice   Webinar
Bell Total Connect Voice Webinar
Vani Edwardson
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customer
ddeschenes99
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
backfire_88
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures
eSignLive by VASCO
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
Rafael Junquera
 

What's hot (19)

Operation High Roller: The need for a security ally!
Operation High Roller:  The need for a security ally!Operation High Roller:  The need for a security ally!
Operation High Roller: The need for a security ally!
 
Cmg app migration ppt
Cmg app migration pptCmg app migration ppt
Cmg app migration ppt
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
 
WebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOAWebSphere Portal | The Front End Of SOA
WebSphere Portal | The Front End Of SOA
 
Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011Gomez loadtesting salesnov2011
Gomez loadtesting salesnov2011
 
Dms introduction
Dms introductionDms introduction
Dms introduction
 
Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5Oracle Self Service Webcenter Soa Telco V 5
Oracle Self Service Webcenter Soa Telco V 5
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
E dms
E dmsE dms
E dms
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
ITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the WeatherITSM in the Cloud - A Change in the Weather
ITSM in the Cloud - A Change in the Weather
 
Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]Dell services overview_customer_presentation[1]
Dell services overview_customer_presentation[1]
 
Bell Total Connect Voice Webinar
Bell Total Connect Voice   WebinarBell Total Connect Voice   Webinar
Bell Total Connect Voice Webinar
 
It infrastructure cost reduction vision v5 customer
It infrastructure cost reduction vision v5   customerIt infrastructure cost reduction vision v5   customer
It infrastructure cost reduction vision v5 customer
 
Compuware APM Solution
Compuware APM SolutionCompuware APM Solution
Compuware APM Solution
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 

Similar to OpenFlow, the Android of Networking?

Identity management
Identity managementIdentity management
Identity management
kamalikamj
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10
Riverbed Technology
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
Infoblox
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
David Chou
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
CloudOps Summit
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
Antenna Software
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
Riverbed Technology
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
Janine Anthony Bowen, Esq.
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
Splunk
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
Raman K. Attri
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
GeneXus
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
GeneXus
 
雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會
併力科技 JFT
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
S series presentation
S series presentationS series presentation
S series presentation
Sergey Marunich
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
Bruce MacVarish
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
bjhutt
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
Peter de Haas
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Dropbox
 

Similar to OpenFlow, the Android of Networking? (20)

Identity management
Identity managementIdentity management
Identity management
 
Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10Troubleshooting Virtualization Cascade10
Troubleshooting Virtualization Cascade10
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
 
La era de los smart devices mexico
La era de los smart devices mexicoLa era de los smart devices mexico
La era de los smart devices mexico
 
雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會雲端服務對於台灣製造業IT的意義、挑戰及機會
雲端服務對於台灣製造業IT的意義、挑戰及機會
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
S series presentation
S series presentationS series presentation
S series presentation
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...DDHS 2009   Microsoft   Heads In The Cloud Feet On The Ground   Peter de Haas...
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

OpenFlow, the Android of Networking?

  • 1. SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER TO CLOUD Shehzad T. Merchant © 2012 Extreme Networks, Inc. All rights reserved.
  • 2. Two Major Themes: Convergence and Mobility Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 2 © 2012 Extreme Networks, Inc. All rights reserved.
  • 3. Mobility and Tenancy In the Campus Role Internet Intranet Mail CRM/Database VLAN Unauthenticated Yes No No No Default Contractor Yes Yes No No Default Employee Yes Yes Yes Yes Default User: John Role: Employee Resource Access = Permit All User: Alice Role: Contractor Resource Access = Deny Mail and CRM User: Bob Role: Unauthenticated Resource Access = Internet Only Page 3 © 2012 Extreme Networks, Inc. All rights reserved.
  • 4. Mobility and Tenancy In the Data Center VM Role Finance Accounting Internet Intranet Mail Engineering CRM/Database VLAN VLAN VM Payroll Unauthenticated Yes Yes No No No NoNo Default Default Employee ContractorDatabase Yes No Yes Yes No NoNo Default Default Hypervisor Outlook Employee Yes Yes Yes Yes Yes No Yes Default Default User: John VM: Payroll Role: Employee Access = Finance Resource Access = Permit All VM User: Alice VM: Employee Database Role: Contractor Access = HR Resource Access = Deny Mail and CRM Hypervisor VM VM: Outlook User: Bob Employees Access = All Role: Unauthenticated Resource Access = Internet Only Page 4 © 2012 Extreme Networks, Inc. All rights reserved.
  • 5. VDI Provisioning: The Lines Are Blurring • Demarcation of the Access Edge no longer in the Wiring Closet • Access edge border now extends within the Enterprise Data Center … the “virtual wiring closet” • That’s where Virtual Desktop Machines are located • User sessions are now initiated within the Enterprise Data Center Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 5 © 2012 Extreme Networks, Inc. All rights reserved.
  • 6. VDI Provisioning: The Lines Are Blurring • Controls needs to be applied at Access Edge and within the Data Center ToR • Identity, Roles and Mobility pervasive across Campus and DC • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine • Dynamic roles, policies, and identity need to be consistent Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 6 © 2012 Extreme Networks, Inc. All rights reserved.
  • 7. Enter Software Defined Networking • De-Couple Forwarding and Policy Decisions From Network Connectivity and Topology • Centralized, Consistent Policy and Management Model • Campus edge to DC server edge and into the mobile carrier edge Ethernet 3G / 4G WLAN LAN Data Center The Cloud Software DefinedExperience Seamless User Networking WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 7 © 2012 Extreme Networks, Inc. All rights reserved.
  • 8. Where Are The Deployments? • Mostly Early Trials • Universities, Enterprise Campus, DC and Cloud • Building Knowledge, Expertise and Comfort • But, With Growing Interest… 8 © 2012 Extreme Networks, Inc. All rights reserved.
  • 9. Challenges • Lack of Maturity • Standards Changing/Evolving Quickly • Limited Silicon Support • Vendor Commitment • Lack Of Vendor Interoperability • Controller, Switch, Security, Policy • The Proverbial Departmental Divide • Misplaced Expectations • Demonstrable ROI v/s Existing Vendor Approach 9 © 2012 Extreme Networks, Inc. All rights reserved.
  • 10. Technology Adoption Cycle OpenFlow Interest Time 10 © 2012 Extreme Networks, Inc. All rights reserved.
  • 11. Looking To the Future – OpenFlow App Store? • OpenFlow becomes the Android of networking • OpenFlow and related specifications all available as Open Source • Apps for every need – From QoS, to PBR, to Identity and mobility, to multi-tenancy • ONF becomes the Marketplace for OpenFlow Apps? • Controller vendors eventually become application developers 11 © 2012 Extreme Networks, Inc. All rights reserved.
  • 12. Thank you © 2012 Extreme Networks, Inc. All rights reserved.
  • 13. Mobility Drives the Cloud Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized Extreme Can Deliver High Value & Make This a Reality 13 © 2012 Extreme Networks, Inc. All rights reserved.