SlideShare a Scribd company logo
SOFTWARE DEFINED NETWORKING:
FROM CAMPUS TO CARRIER
TO CLOUD
Shehzad T. Merchant

                      © 2012 Extreme Networks, Inc. All rights reserved.
Two Major Themes: Convergence and Mobility

                                         Ethernet
     3G / 4G      WLAN                          LAN                              Data Center         The Cloud

                          Seamless User Experience


                                                                      WIRED
                                                                                               Information
                                                                   WIRELESS                      Content
                                                                                               Applications
                                                                      3G / 4G




                 Businesses Are Being Mobilized
               SDN Can Deliver High Value & Make This a Reality


2                           © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Campus
                                                          Role                   Internet   Intranet   Mail   CRM/Database   VLAN

                                                          Unauthenticated           Yes       No       No          No        Default
                                                          Contractor                Yes       Yes      No          No        Default
                                                          Employee                  Yes       Yes      Yes        Yes        Default
User: John
Role: Employee
Resource Access = Permit All




User: Alice
Role: Contractor
Resource Access = Deny Mail and CRM




User: Bob
Role: Unauthenticated
Resource Access = Internet Only


 Page 3                               © 2012 Extreme Networks, Inc. All rights reserved.
Mobility and Tenancy In the Data Center
                                                                VM
                                                                Role                      Finance Accounting
                                                                                       Internet Intranet Mail         Engineering
                                                                                                                       CRM/Database VLAN
                                                                                                                                     VLAN

                     VM                                         Payroll
                                                                Unauthenticated           Yes Yes   No    No    No        NoNo     Default
                                                                                                                                    Default
                                                                Employee
                                                                ContractorDatabase Yes No           Yes   Yes   No        NoNo      Default
                                                                                                                                     Default
                                      Hypervisor                Outlook
                                                                Employee                  Yes Yes   Yes   Yes   Yes       No
                                                                                                                           Yes      Default
                                                                                                                                     Default
User: John
VM: Payroll
Role: Employee
Access = Finance
Resource Access = Permit All




                     VM

User: Alice
VM: Employee Database
Role: Contractor
Access = HR
Resource Access = Deny Mail and CRM
                                      Hypervisor




                     VM
VM: Outlook
User: Bob Employees
Access = All
Role: Unauthenticated
Resource Access = Internet Only


 Page 4                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Demarcation of the Access Edge no longer in the Wiring Closet
    • Access edge border now extends within the Enterprise Data Center …
      the “virtual wiring closet”
      • That’s where Virtual Desktop Machines are located
      • User sessions are now initiated within the Enterprise Data Center




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


5                                                     © 2012 Extreme Networks, Inc. All rights reserved.
VDI Provisioning: The Lines Are Blurring
    • Controls needs to be applied at Access Edge and within the Data
      Center ToR
    • Identity, Roles and Mobility pervasive across Campus and DC
      • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine
      • Dynamic roles, policies, and identity need to be consistent




                                                                     Internet

                                                                                                                                  “Virtual” John



                      User Traffic                                                                                User Traffic


                                               VDI Session



    “Physical” John                  Access Edge                    Core Network                           Data Center           Data Center
                                     Wiring Closet                                                             ToR               VM Servers


6                                                     © 2012 Extreme Networks, Inc. All rights reserved.
Enter Software Defined Networking
    • De-Couple Forwarding and Policy Decisions From Network Connectivity
      and Topology
    • Centralized, Consistent Policy and Management Model
     • Campus edge to DC server edge and into the mobile carrier edge


                                                   Ethernet
               3G / 4G        WLAN                      LAN                   Data Center      The Cloud

                                    Software DefinedExperience
                                     Seamless User Networking


                                                                        WIRED
                                                                                        Information
                                                                     WIRELESS               Content
                                                                                        Applications
                                                                       3G / 4G



                            Businesses Are Being Mobilized
                         SDN Can Deliver High Value & Make This a Reality


7                                  © 2012 Extreme Networks, Inc. All rights reserved.
Where Are The Deployments?


    • Mostly Early Trials
     • Universities, Enterprise Campus, DC and Cloud
    • Building Knowledge, Expertise and Comfort
    • But, With Growing Interest…




8                            © 2012 Extreme Networks, Inc. All rights reserved.
Challenges
    • Lack of Maturity
    • Standards Changing/Evolving Quickly
    • Limited Silicon Support
    • Vendor Commitment
    • Lack Of Vendor Interoperability
     • Controller, Switch, Security, Policy
    • The Proverbial Departmental Divide
    • Misplaced Expectations
    • Demonstrable ROI v/s Existing Vendor Approach




9                               © 2012 Extreme Networks, Inc. All rights reserved.
Technology Adoption Cycle



                OpenFlow




     Interest




                                                  Time


10                         © 2012 Extreme Networks, Inc. All rights reserved.
Looking To the Future – OpenFlow App Store?


 • OpenFlow becomes the Android of networking
 • OpenFlow and related specifications all available as
   Open Source
 • Apps for every need – From QoS, to PBR, to Identity and
   mobility, to multi-tenancy
 • ONF becomes the Marketplace for OpenFlow Apps?
 • Controller vendors eventually become application developers




11                      © 2012 Extreme Networks, Inc. All rights reserved.
Thank you



© 2012 Extreme Networks, Inc. All rights reserved.
Mobility Drives the Cloud

                                           Ethernet
     3G / 4G        WLAN                          LAN                              Data Center         The Cloud

                            Seamless User Experience


                                                                        WIRED
                                                                                                 Information
                                                                     WIRELESS                      Content
                                                                                                 Applications
                                                                        3G / 4G




                   Businesses Are Being Mobilized
               Extreme Can Deliver High Value & Make This a Reality


13                            © 2012 Extreme Networks, Inc. All rights reserved.

More Related Content

PPTX
Track 2, session 5, aligning security with business kartik shahani
PPT
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
PPTX
Riverbed Cascade and VXLAN Monitoring
PDF
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
PPSX
BPOS Information
PPSX
Credexo IDM
PDF
Windstream Webinar: The Evolution of the Data Center
PPTX
ECM: Bridging Content Process and Compliance Divide
Track 2, session 5, aligning security with business kartik shahani
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Riverbed Cascade and VXLAN Monitoring
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
BPOS Information
Credexo IDM
Windstream Webinar: The Evolution of the Data Center
ECM: Bridging Content Process and Compliance Divide

What's hot (19)

PPT
Operation High Roller: The need for a security ally!
PPTX
Cmg app migration ppt
PDF
Rubik Financial - Introduction- March 2012
ODP
WebSphere Portal | The Front End Of SOA
PDF
Gomez loadtesting salesnov2011
PDF
Dms introduction
PDF
Oracle Self Service Webcenter Soa Telco V 5
PDF
Application Security Testing - Tycho Schmidt
PDF
Application Security Testing - Tycho Schmidt
PPTX
Build Scanning into Your Web Based Business Application
PDF
PDF
Dharmes Mistry Tony De Bree S O A Business Persp V1b
PDF
ITSM in the Cloud - A Change in the Weather
PPTX
Dell services overview_customer_presentation[1]
PDF
Bell Total Connect Voice Webinar
PPT
It infrastructure cost reduction vision v5 customer
PPTX
Compuware APM Solution
PDF
2011 02 08_enabling_ins_agents_e_signatures
PDF
Telesemana ce nominum:mef
Operation High Roller: The need for a security ally!
Cmg app migration ppt
Rubik Financial - Introduction- March 2012
WebSphere Portal | The Front End Of SOA
Gomez loadtesting salesnov2011
Dms introduction
Oracle Self Service Webcenter Soa Telco V 5
Application Security Testing - Tycho Schmidt
Application Security Testing - Tycho Schmidt
Build Scanning into Your Web Based Business Application
Dharmes Mistry Tony De Bree S O A Business Persp V1b
ITSM in the Cloud - A Change in the Weather
Dell services overview_customer_presentation[1]
Bell Total Connect Voice Webinar
It infrastructure cost reduction vision v5 customer
Compuware APM Solution
2011 02 08_enabling_ins_agents_e_signatures
Telesemana ce nominum:mef
Ad

Similar to OpenFlow, the Android of Networking? (20)

PPT
Identity management
PPTX
Troubleshooting Virtualization Cascade10
PPTX
Education webinar april 2012
PPTX
Patterns of Cloud Applications Using Microsoft Azure Services Platform
PDF
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
PPTX
Debunking Common Myths of Mobile Application Development
PPTX
Application-Aware Network Performance Management
PDF
Cloud Computing Technology Overview 2012
PPTX
Splunk Overview
PDF
IBM Infosphere Guardium - Database Security
PDF
E-commerce Technology for Safe money transaction over the net
PDF
La era de los smart devices mexico
PDF
La era de los smart devices mexico
PDF
雲端服務對於台灣製造業IT的意義、挑戰及機會
PDF
Mobile application security – effective methodology, efficient testing! hem...
PDF
S series presentation
PDF
Enterprise Apps Future State
PDF
Virtual Insight Linked In Wi 2003
PPTX
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
PPTX
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Identity management
Troubleshooting Virtualization Cascade10
Education webinar april 2012
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Debunking Common Myths of Mobile Application Development
Application-Aware Network Performance Management
Cloud Computing Technology Overview 2012
Splunk Overview
IBM Infosphere Guardium - Database Security
E-commerce Technology for Safe money transaction over the net
La era de los smart devices mexico
La era de los smart devices mexico
雲端服務對於台灣製造業IT的意義、挑戰及機會
Mobile application security – effective methodology, efficient testing! hem...
S series presentation
Enterprise Apps Future State
Virtual Insight Linked In Wi 2003
DDHS 2009 Microsoft Heads In The Cloud Feet On The Ground Peter de Haas...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Ad

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation

OpenFlow, the Android of Networking?

  • 1. SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER TO CLOUD Shehzad T. Merchant © 2012 Extreme Networks, Inc. All rights reserved.
  • 2. Two Major Themes: Convergence and Mobility Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 2 © 2012 Extreme Networks, Inc. All rights reserved.
  • 3. Mobility and Tenancy In the Campus Role Internet Intranet Mail CRM/Database VLAN Unauthenticated Yes No No No Default Contractor Yes Yes No No Default Employee Yes Yes Yes Yes Default User: John Role: Employee Resource Access = Permit All User: Alice Role: Contractor Resource Access = Deny Mail and CRM User: Bob Role: Unauthenticated Resource Access = Internet Only Page 3 © 2012 Extreme Networks, Inc. All rights reserved.
  • 4. Mobility and Tenancy In the Data Center VM Role Finance Accounting Internet Intranet Mail Engineering CRM/Database VLAN VLAN VM Payroll Unauthenticated Yes Yes No No No NoNo Default Default Employee ContractorDatabase Yes No Yes Yes No NoNo Default Default Hypervisor Outlook Employee Yes Yes Yes Yes Yes No Yes Default Default User: John VM: Payroll Role: Employee Access = Finance Resource Access = Permit All VM User: Alice VM: Employee Database Role: Contractor Access = HR Resource Access = Deny Mail and CRM Hypervisor VM VM: Outlook User: Bob Employees Access = All Role: Unauthenticated Resource Access = Internet Only Page 4 © 2012 Extreme Networks, Inc. All rights reserved.
  • 5. VDI Provisioning: The Lines Are Blurring • Demarcation of the Access Edge no longer in the Wiring Closet • Access edge border now extends within the Enterprise Data Center … the “virtual wiring closet” • That’s where Virtual Desktop Machines are located • User sessions are now initiated within the Enterprise Data Center Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 5 © 2012 Extreme Networks, Inc. All rights reserved.
  • 6. VDI Provisioning: The Lines Are Blurring • Controls needs to be applied at Access Edge and within the Data Center ToR • Identity, Roles and Mobility pervasive across Campus and DC • Mapping Identity to Physical Desktop Machine and Virtual Desktop Machine • Dynamic roles, policies, and identity need to be consistent Internet “Virtual” John User Traffic User Traffic VDI Session “Physical” John Access Edge Core Network Data Center Data Center Wiring Closet ToR VM Servers 6 © 2012 Extreme Networks, Inc. All rights reserved.
  • 7. Enter Software Defined Networking • De-Couple Forwarding and Policy Decisions From Network Connectivity and Topology • Centralized, Consistent Policy and Management Model • Campus edge to DC server edge and into the mobile carrier edge Ethernet 3G / 4G WLAN LAN Data Center The Cloud Software DefinedExperience Seamless User Networking WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized SDN Can Deliver High Value & Make This a Reality 7 © 2012 Extreme Networks, Inc. All rights reserved.
  • 8. Where Are The Deployments? • Mostly Early Trials • Universities, Enterprise Campus, DC and Cloud • Building Knowledge, Expertise and Comfort • But, With Growing Interest… 8 © 2012 Extreme Networks, Inc. All rights reserved.
  • 9. Challenges • Lack of Maturity • Standards Changing/Evolving Quickly • Limited Silicon Support • Vendor Commitment • Lack Of Vendor Interoperability • Controller, Switch, Security, Policy • The Proverbial Departmental Divide • Misplaced Expectations • Demonstrable ROI v/s Existing Vendor Approach 9 © 2012 Extreme Networks, Inc. All rights reserved.
  • 10. Technology Adoption Cycle OpenFlow Interest Time 10 © 2012 Extreme Networks, Inc. All rights reserved.
  • 11. Looking To the Future – OpenFlow App Store? • OpenFlow becomes the Android of networking • OpenFlow and related specifications all available as Open Source • Apps for every need – From QoS, to PBR, to Identity and mobility, to multi-tenancy • ONF becomes the Marketplace for OpenFlow Apps? • Controller vendors eventually become application developers 11 © 2012 Extreme Networks, Inc. All rights reserved.
  • 12. Thank you © 2012 Extreme Networks, Inc. All rights reserved.
  • 13. Mobility Drives the Cloud Ethernet 3G / 4G WLAN LAN Data Center The Cloud Seamless User Experience WIRED Information WIRELESS Content Applications 3G / 4G Businesses Are Being Mobilized Extreme Can Deliver High Value & Make This a Reality 13 © 2012 Extreme Networks, Inc. All rights reserved.