Readying the Campus for the IOT
Billy Turnbull Steve Keating
Infrastructure and core hardware
HARDWARE & INFRASTRUCTURE
1.0
Value-added services & apps built on top of a data from connected devices
3.0SERVICES2.0
DEVICESOPERATING SYSTEM
Connected devices running on an operating system
“Intranet of Things” to the “Internet of Things”
INTRANET OF THINGS INTERNET OF THINGS
Agility Gap
Flatter Organizations
Dynamic Application Development Big Data
Mobile
CloudSocial
Business
AgilityAgili
ty
Time
Network Agility
The Problem
4
The Benefits of Virtualization
Server VirtualizationAllows aggregation of multiple
independent virtual servers to exist on a physical server
Network VirtualizationDecouples the physical infrastructure from the connectivity services making
the network adaptive and dynamic with simple one-touch provisioning
Network Virtualization enabled via Shortest Path Bridging
ComputeAccess
Data CenterCore
CampusCore
Distribution
LayerAccessLayer
Multiple Segments
Multiple Protocols
Multiple Resiliency constructs
Hop by hop configuration
Manual device configuration
Todays Networks
Status Quo
Complexity Agility
Today’s networks are based on too many protocols causing instability, slowing down recovery times and ability to troubleshoot issues
“Protocols are killing us. Protocols are like the never-ending bottle of pills, each one prescribed to remedy the problems introduced by the previous medication.”
- Ethan Banks – Host of Packet Pushers, and a network engineerhttp://packetpushers.net/does-trill-stand-a-chance-
at-wide-adoption/#disqus_thread
STP
RIP
OSPF
BGP
PIM
MPLS
One wrong move ….and the stack collapses!
7
Shortest Path Bridging - Fabric
» Important Properties› Shortest path based on link metrics with no
blocked paths› Reverse Path Forwarding Check (RPFC) eliminates
loops› Symmetric data path between any two nodes
provides ability to leverage Ethernet based OAM CFM/Y.1731 standards
› Unicast path calculated from every node to every other node
› Ability to calculate service specific multicast delivery trees
› No IP configuration required inside the Fabric› Network becomes a Virtual Switched Fabric
ISIS
ISIS ISIS
ISISISIS
ISISISIS
ISIS ISIS
ISIS
ISIS
Unified Management
IS-IS forms adjacencies to neighbouring nodes, discovers the core network topology and then automatically calculates shortest paths from itself to every other node in the network.IS-IS programs forwarding entries (FIB) in the Backbone VLANs (BVIDs)
One Network
One Protocol
One active-active resiliency model
Automatic core configuration
Automatic device Configuration
SDN(fx) Multiple Segments
Multiple Protocols
Multiple Resiliency constructs
Hop by hop configuration
Manual device configuration
Status Quo
Today’s Network is Inconsistent and Complex
There is a Better Way…
How It Works
Today, each network switch is its own island of control
Packet processing is end-to-end1. Only Fabric Connect
header read2. Sent to next
shortest hop
Packet contents Concealed
Packet processing is box-by-box1. Packet contents
inspected2. Compared against
manual routing tables
3. Routing rules determine next hop
4. Segmentation occurs at each box
Packet contents exposed
With SDN(fx), the control function is abstracted from each box into one virtual distributed
control plane
What It Delivers
True Core Automation
Automated Core with Fabric Connect
11xFASTER
Implementation Time
7xFASTER
Troubleshooting Time
7xFASTER
Configuration Time
2,553xFASTERFailover
Time
100% IMPROVEMENT
Outages Due to Human Error
Core automatically configures isolated paths for: New Services New Applications Security
Segmentation Multi-Tenants QoS Discrimination
One Active-Active resiliency model
Network Services simply delegated to the fabricNo human touch in the
network core
Game-Changing Functionality
The case for SPB
Fast
Flexible
Secure
• Provision at the “edge”• One Configuration Command• Optimized Link State Protocol• Fast to Converge, heal,& add, delete, move services
• Extend services anywhere seamlessly• True service virtualization with ease• L2, L3, Multicast, VRFs…
• As much service isolation as needed• Carrier type virtualization, zero complexity• Network Invisibility to users
12
Leeds Beckett University – Steve Keating
© 2011 Avaya Inc. All rights reserved. 12
Challenge Value Avaya Difference• Large flat network to
segmented network issues• STP not being suitable• How to securely support 3rd
parties
• Ability to span services across entire campus
• Resiliency improved• Dedicated campus wide
VSN for 3rd parties
• Secure isolated IP networks without added protocols
• Simple end point provisioning• Ability to make changes
quickly and easily
05/01/2023 13
Avaya Technology Forum 2016
» ATF promises a rich learning experience to grow your knowledge of the latest technologies
» WHY INVEST THE TIME?Through in-depth technical sessions and tailored expert engagement, ATF is focused on helping you make the most informed decisions possible about designing, implementing or migrating to a truly integrated Digital Organisation
» Please ask for more information on Avaya Stand 37
Want to know more?
»Visit us on stand 37 @AvayaNetworking
Recommended