Вы находитесь на странице: 1из 21

The Internet of Everything

Use case examples and things to consider


Michigan Digital Summit 2014

Ed Koehler Director WW DSE Group
Distinguished Engineer


2012 Avaya Inc. All rights reserved.
2 2
This stuff is happening now!
Sensor and control networks are being deployed at a
record rate
Some of these implementations are rather mundane
Video Surveillance
Smart Buildings
Some begin to stretch the imagination as to whats
possible
Advanced field telemetry
What follows are few real world use case examples
2012 Avaya Inc. All rights reserved.
3 3
Metro and Regional Transit Authorities
Utilizes remote programmable logic controllers to control
trains and subways
Monitoring of railways
Control of track switching
Environmental Monitoring
Air Quality & Flow
Temperature
Perimeter and Infrastructure Security
Video Surveillance
Audio Monitoring
Perimeter Entry/Exit
PCI compliant Ticket Terminals
CDE* must be scoped and segmented
* Card holder Data Environment
2012 Avaya Inc. All rights reserved.
4 4
State & Local Government
Intelligent Traffic Systems
Algorithmic feedback
Allows for the dynamic changing of traffic patterns based on density
Control of weighted loops based on time of day
Highway Video Surveillance
Roadway hazards
Criminal Activity
Water Management
Automated potable water control & distribution
Reservoir Management
Tank Management
Natural water flow controls (flood prevention)
Flood Reservoir Management
Sluice gate controls

2012 Avaya Inc. All rights reserved.
5 5
Power Authorities
Utilize Remote Programmable Logic Controllers
provide for the monitoring and control
Power generation
Power substations
Power distribution network
Video Surveillance
Perimeter Security
Process and Procedure assurance
SMART GRID
Feedback on residential and commercial power usage
Predictive Analytics Seasonal, Heat waves, Cold spells
Quick Disconnect
Shunting relays provide automatic protection of transformer
infrastructure

2012 Avaya Inc. All rights reserved.
6 6
Airports
Homeland Defense/Transportation Security Authority
Video Surveillance low and high definition
Algorithmic anomaly monitoring
High definition facial profiling
Passenger background match and risk assessment
Environmental & Luggage Monitoring
Explosives & Weapons
Flight information systems and monitors
Automated Luggage Tracking
PCI Compliant Ticketing Kiosks
CDE must be scoped and segmented


2012 Avaya Inc. All rights reserved.
7 7
Medical/Healthcare
Medical Telemetry
Patient Monitoring
Local
Remote at home
Nurse/Physician Alerts (i.e., code red, blue, pink, etc.)
HIPAA Compliance requires strict scoping & segmentation
Perimeter and Infrastructure Security
Video Surveillance
Entry/Exit control/lockdown
Infirmary
Emergency
PCI Compliant PoS Admin/Bedside
CDE must be scoped and segmented


2012 Avaya Inc. All rights reserved.
8 8
Automated Manufacturing
Automated Tiered Production Flows
Stationary and mobile robotics
Process control feedback
Flow Sensors
Programmatic issues
Hardware issues or failure
Quality Assurance Sensors
Video
Magnetic resonance Imaging
Millimeter wavelength
Weld or fusion inspection
2012 Avaya Inc. All rights reserved.
9
The Significance of the Network at the
2014 Olympic Winter Games
First Olympic Games to
deploy a Virtualized
Network
First Olympic Games to
deploy IPTV technology
First Olympic Games to
offer free WiFi to the
Olympic Family
One of the largest
BYOD/Guest environments
in the world
2012 Avaya Inc. All rights reserved.
10
First Fabric Enabled Games EVERYTHING was
networked!
Primary
Data Center
Mountain
Media
Center
Krasnaya
Polyana
Secondary
Data Center
Competition
venues
Data Center
(secondary)
IPTV Service
Games Network
Unified Communications Service
Organizing Committee Service
WiFi Services
Media Transparent LAN Services
Secure Management
Venues
Data
Center
Network
Core
2012 Avaya Inc. All rights reserved.
11

2014 Avaya Inc. All
rights reserved.
Technology Innovation & Evolution
Milliseconds to recovery
2 clicks to the secure zone
0.3 sec for Web Postings of Results
Secure & mobile Policy based guest access
Reliable IPTV & Enhanced QoE
From 0 to 40,000+ BYOD users in one day
2012 Avaya Inc. All rights reserved.
12
Issues to Consider
Its not ALL magic!
2012 Avaya Inc. All rights reserved.
13 13
There are two courses of dealing with IoT or IoE
Do something
Requires systemic feedback
Requires communications
Machine to Humans
Machine to machines
Requires policy environment for proper response
Human procedures and protocol
Machine to machine policies
Ingest and Analyze
Requires massive storage Big Data
Requires analytic processes
Data Science and analytics staff
Parallel Processing Hadoop HDFS
2012 Avaya Inc. All rights reserved.
14 14
Business Process Evented
Conference Room Launched
Dynamic Team Created
Video Escalation Leveraged
Team Members Notified
Collaboration is Optimized
Automated Manufacturing Machine Malfunctions
Doing something
Need vector
pics
2012 Avaya Inc. All rights reserved.
15 15
Analyzing the data
Things to consider
The data influx can be massive!
Proper storage sizing is key!
5 to 10 times traditional EDW
Analytics infrastructure and staff
Proper data/compute node scaling
Intense analytics? Simple trending?
Subject matter experts People that KNOW the data!
Determine needs up front
Real Time based on data stream Storm/Spark
Near Real Time based on atomic batch Spark
Non Real Time batch Normal Hadoop
Data Center Design
Massive east/west capacity
Low deterministic latency rack to rack
Security for protecting confidential data
2012 Avaya Inc. All rights reserved.
16 16
IP Address explosion!
Sensors and actuators require addresses
IPv6 is a huge address space
Sensors do not have resources to hold such huge addresses
Address gateways/ IPv6 address concatenation
We can not afford to waste IP space on transit routes!!!
Non-IP path establishment technologies
IEEE 802.1aq/IETF RFC6329 Shortest Path Bridging
Avaya Fabric Connect IETF Draft enhancements for L3 and multicast
There are also implicit security concerns in using IP as a path
protocol
IP Scanning
Infrastructure Attack
Confidential Data Breach
If we can remove the dependency on IP to establish service
paths EVERYTHING becomes much EASIER!
BGP Tables are being overrun.
IPv6 is exacerbating the issue!
2012 Avaya Inc. All rights reserved.
17 17
Security impact What makes this so difficult?
Traditional networking approaches utilize IP as a utility
protocol to establish service paths
These paths are prone to IP scanning techniques that
are used to:
Discover network topology
Identify key attack vectors
Using traditional approaches for privacy and separation
are costly and complex
Inadvertent Routed Black Holes
Poor resiliency
High Capital Expenditure (CAPEX) and Operational Expenditure
(OPEX)
Using IP as the utility for establishing paths means that they
have to be visible. This creates a Catch-22 which in turn
creates complexity and cost
2012 Avaya Inc. All rights reserved.
18 18
Avayas Fabric Connect is truly Stealthy!
Fabric Connect is not dependent upon IP to establish
the service path
Service Paths are established by the use of SPB
Ethernet Switched Paths within Fabric Connect
As a result, path behaviors are established on a
completely different plane
ESPs are invisible to IP
2012 Avaya Inc. All rights reserved.
19 19
In Summary
The Internet of Things and the Internet of Everything are inevitable paths of
evolution for the Internet
Many of the basic concepts of networking do not change
Most of the issues are in design for reachability and scale to the infrastructure
Scale up Scale out
Use of the system and/or data generated will require back-end infrastructure
solutions
Enhanced automated UC for machine to human communications
Enhanced systems automation for machine to machine communications
Enhanced Data Analytics environment to utilize data
Security and IP addressing need to be considered up front!
End point Classification
Authentication
Authorization
Non IP based path establishment technologies provide for the consolidation and
condensation of the IP address space.
IEEE 802.1aq Shortest Path Bridging
Enhanced Services via Avaya Fabric Connect provide for Stealth
Networking environments


2012 Avaya Inc. All rights reserved.
20
THANK YOU!
Ed Koehler email koehlere@avaya.com


Blog Site
www.edkoehler.wordpress.com


You Tube Channel
https://www.youtube.com/channel/UCn8AhOZU3ZFQI-YWwUUWSJQ

Corporate Website www.avaya.com

Вам также может понравиться