Академический Документы
Профессиональный Документы
Культура Документы
Public Sector
Ed Koehler
Director Distinguished Engineer
Ohio Digital Summit 2015
Using IP as the utility for establishing paths means that they have to
be visible. This creates a Catch-22 which in turn creates complexity
and cost
IP Address Explosion!
BGP Tables are being overrun.
IPv6 is exacerbating the issue!
Sensors and actuators require addresses
IPv6 is a huge address space
Service Paths are established by the use of SPB Ethernet Switched Paths
within Fabric Connect
As a result, path behaviors are established on a completely different plane
ESPs are invisible to IP
Helps to clear up IP address congestion and convoluted topologies
2014 Avaya Inc. All rights reserved.
Fabric Connect used end to end eliminates most if not all other network technologies!
Fabric Connect (IEEE 802.1aq)
Can significantly reduce ACL requirements and enhance data flow validation!
Based on
E-LINE
Provider
Service
Business Continuity
DR Capabilities
ONE.
Security
Business Continuity
Enterprise Fabric
PROTOCOL
TIER Data Center
Converged Infrastructure
Multi-Tenants
Multi-Services (16M+)
LOWER TCO
Unmatched Multicast
scalability & reliability
DR Capabilities
legacy protocols
Legacy Model
PIM
OTV
Instability &
Complexity
Protocols run
independently.
802.1
Stability
Stability
OAM
Fabric
Connect
ONE
protocol
802.1
UC Zone
Corporate
Zone
Guest Zone
Contractor
Zone
2015 Avaya
Inc.Avaya
AvayaInc.
Confidential
& Proprietary
2014
All rights reserved.
Do not duplicate, publish or distribute further without the express written permission of Avaya.
10
10
MPLS
PIM
BGP
OSPF
Business
MSTP
RSTP
PIM
20 seconds later
The
Protocol
Stack
(a Stack of
Protocols)
OSPF
VLANS
Network
RSTP/M
STP/PVS
T+
802.3
Link comes up
http://packetpushers.net/does-trill-stand-a-chance-at-wide-adoption/#disqus_thread
11
DONE end-to-end..!
12
Network
Distribution
Systems
Firewall/IDS
Security
Demarcation
Compute
Systems
VLAN
FW/IDS
Subnet A
Secure L2
Stealth Networks
IDE
I-SID
Core Distribution
Private
Application
(Client)
VRF
Secure L3 Stealth
Network (IP VPN)
VLAN
Subnet B
13
In Conclusion
While IP Virtual Private Networks are nothing new, IEEE
802.1aq takes the concept to a new level with Fabric Connect
Flexible and nimble service extensions lend itself to an
incredibly mobile secure networking paradigm
Stealth Networking Fast, nimble and invisible
14