Tag Archive for CSCO

Can SDN Save IT?

Can SDN Save IT?In a recent article “SDN Spreads Its Wings And Starts To Fly” on No Jitter Bob Emmerson writes that for Software Defined Networks (SDN) to take off and live up to its promise of a new area in ICT, an enterprise based ecosystem with key enterprise players must develop. He does not believe that SDN has made sufficient inroads into the enterprise, he writes, “.. so far most of the emphasis in Software Defined Networks (SDN) has been the virtual network architecture,” he continues, that the potential of SDN requires the enterprise, ” … the emergence of a new ICT era … can only come–via an ecosystem comprising key players in the enterprise space.”

Mr. Emmerson writes that SDN makes the network more valuable to the organization. “No longer is the networking infrastructure viewed as merely providing fast connectivity between users, servers, and storage.”

He explains that in an SDN-enabled network features are applications that run as individual processes and software packages on Ethernet switches. They can be downloaded when more services and features are required. There are also extensive scripting capabilities as well additional layers of intelligence that perform tasks like identity management to integrate security and policy enforcement that identifies, locates, and authenticates connected devices and users.

The centralized management platforms use network-level intelligence to replace the duties performed by a PC’s Operating System. These platforms automate tasks, like assigning profiles, and they also allow resources to be added, dropped, or relocated via a Web interface.

Comparing apples and organgesThe article argues that SDN can be used to converge networks. With SDN he argues that 6 networks can be converged on top of the regular wide-area infrastructure. He proposes that enterprises can converge their WLAN/BYOD, Unified Communications (UC), Physical Security for surveillance, Audio-Video Bridging, and HPC into a single network with SDN. These “silo” solutions become part of a single unified edge in an SDN environment. The network OS will immediately recognize new devices, phones, access points, or switches that use the OpenFlow communications protocol, and they will be configured automatically. This feature also applies to new employees as well as those that get a new position in the company. Rights will be assigned automatically according to their job title.

Network 1. WLAN/BYOD: The author predicts a new generation of Access Points (APs) that lowers the cost of deploying and operating a secure, reliable 802.11n WLAN, by using SDN acts as a virtual controller and coordinate the operation of neighboring APs. The SDN virtual controller handles BYOD and other security issues automatically. When a new device is detected, the relevant privileges and policies, determined by the network administrator for the device owner are granted automatically. No other process is required.

Network 2. Unified Communications: UC is a particularly interesting application according to the article. The article states that SDN can address concerns about bandwidth-hungry services like video streaming impacting other media. The issue can be addressed in real-time. If congestion is detected, then the management platform will dynamically allocate additional resources for the duration of the session. It’s that simple Mr. Emmerson concludes.

Network 3. Physical Security: On the physical security network, No Jitter reports that software intelligence embedded in the operating system automates tasks including IP surveillance camera and device discovery, configuration, authentication, power management via Power over Ethernet, and network policy assignment. Automated device discovery is enabled via LLDP.

Network 4. Audio-Video Bridging: Mr. Emmerson says that AVB technology is available on the switches. If AVB is available on network switches (rb- You may want to check with Cisco (CSCO) on the cost of their AV systems before you put it on a switch the TX9000 costs like $300,000.00) If you can swing the money, benefits include reduced complexity of cabling and installations, interoperability between networking devices, and a reduced need for complex network setup and management. The infrastructure negotiates and manages the network for optimal prioritized media transport.

Network 5. High-Performance Computing: The No Jitter article says that High-Performance Computing (HPC) can use SDN to eliminate the Fiber Channel network typically used to connect big data storage to HPC boxes. The author claims that the high-speed, low-latency communications needed by HPC can now be met with 40 Gbps Ethernet in the data center and SDN. He says, “Fiber Channel can go away.”

rb-

Mr. Emmerson concludes that SDN can solve many of the evils that plague IT. He writes that “SDN enables the consolidation of all the various network types that enterprises employ, and it automates many of the routine management tasks. In turn, this results in the ability to run more efficient communications tasks and to operate in a unified corporate environment.” (rb- especially if you use Extreme (EXTR) equipment)

I do agree with several other conclusions he makes in the article. He says that SDN is an IT game-changer, “The game it’s changing is the closed, proprietary world of networking with its vertically integrated hardware, slow innovation and artificially high margins: a world that hasn’t changed much for decades.” Did I almost hear the C_ _ _o word in there?

SDN reality checkHe breathlessly concludes that all that ails IT will be cured by SDN, “… the benefits of managing one network instead of different silos, the real-time automation of configuration and resource allocations tasks, and the tight integration of devices and the network will lead to efficiencies of scale and facilitate the development of next-generation services. SDN is enabling IT to make better use of corporate resources: to do more while operating in an era of tight budgets and a problematic economy.” Yeah but there also has to be someone to break down the silos and get the video guys and the facilities guys to give up some of their turf and headcount.

What do you think?

Is the biggest challenge to SDN technical or political?

View Results

Loading ... Loading ...
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Disrupters

Tech DisruptersThe BusinesInsider notes that analysts at investment bank Citi (C) have issued a new research report, that takes a look at 10 disrupting technologies, According to BusinessInsider, these technologies will change the way we do business. The firm which took $300 billion dollars taxpayer-funded bail-out looked into practically every sector you can think of: energy, entertainment, IT, manufacturing, and transportation among them to identify disrupters.

Software-Defined Networks

One of the information technologies that Citi called a disrupter is Software Defined Networks (SDN). SDN’s simplify IT networks by separating the Control Plane (the intelligence) from the Data Plane (the packet forwarding engine). “Instead of having intelligence distributed across the network in separate boxes, SDN centralizes the Control plane in an overriding software layer which disseminates instructions to each router or switch.

Citi claims that SDN is too cheap to resist. They cite data from IDC that says Software Defined Networking is expected to grow from just under $360 million in 2013 to $3.7 billion in 2016. Revenues are likely to be split between startups, traditional network vendors like Cisco (CSCO), and big IT vendors like IBM (IBM), HP (HPQ), and Dell.

Software-as-a-Service

The prognosticators at Citi also identified SaaS as another disruptive opportunity. The article explains that Software-as-a-Service (SaaS) is Internet-based software delivery. Basically, customers can use software that they’d otherwise have to buy via downloads or at a store. Examples include Google (GOOGAppsMicrosoft (MSFT) 365, and Amazon (AMZN) web services.

In 2012, the SaaS market grew 26% to become an $18 billion market according to market research firm IDC. According to Citi’s survey, SaaS has already captured 8% of their software wallets so far and firms expect to increase spending to 70% of their budget over time — a 9-fold increase.

rb-

The Citi prognosticators are so smart, they are at least a year behind the Bach Seat. I have covered cloud since 2011. I think we all know that cloud computing and software-defined networking are information technology disrupters. Thanks, guys.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Is Cisco buying Twitter followers for CSO?

Is Cisco buying Twitter followers for CSO?Brad Reese at BradReese.com writes that it seems ailing network giant Cisco (CSCO) has bought Twitter followers for Chief Strategy Officer Padmasree Warrior. Mr. Reese asks if Cisco purposely violate the Twitter rules that forbid the purchasing of accounts to gain followers?

Cisco logoMr. Reese points to information from TwitterAudit which exposes Twitter fraud is reporting: Approximately half-a-million (509,426) of the Twitter followers of the network gear maker’s Chief Strategy Officer, Padmasree Warrior, are fake Twitter accounts.

Each audit takes a random sample of 5000 Twitter followers for a user and calculates a score for each follower. This score is based on number of tweets, date of the last tweet, and ratio of followers to friends. We use these scores to determine whether any given user is real or fake. Of course, this scoring method is not perfect but it is a good way to tell if someone with lots of followers is likely to have increased their follower count by inorganic, fraudulent, or dishonest means.

Padmasree Warrior TwitterAudit

Mr. Reese writes he ran the following Status People check on the 1.4 million Twitter followers of Cisco Chief Strategy Officer, Padmasree Warrior:

Padmasree Warrior TwitterAudit

The practice of buying Twitter followers to boost your reputation in an online network seems to be mainstream business, as any Google search on the topic will show. It has also been covered by the New York Times, “Buying Their Way to Twitter FameNetwork World, “Inside the real economy behind fake Twitter accounts” and even mentioned on NPR.

 

rb-
I signed up to follow the networking business’s CSO to see what competitive insights I could gain from the CSO. The tweets coming out of the Cisco Chief Strategy Officer was were often so pointless that they seemed to be coming from a 16-year-old and not a key business person in the IT world.

The tweets were so pointless I just ignored them, now I am going to expend the effort to actually unfollow Warrior …..

Done – So now Cisco you will have to buy another Twitter follower to follow pointless tweets for your business leaders – Now get back to making great network gear.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Internet of Things

Internet of ThingsThe Internet of Things is a world where everything can be both analog and digitally approached. It reformulates our relationship with objects – things- as well as the objects themselves.  Any object that carries an RFID tag relates not only to you but also through being read by an RFID reader nearby, to other objects, relations or values in a database. In this world, you are no longer alone, anywhere.

The Machines Are Talking a Lot

The Machines Are Talking a LotCisco’s Visual Networking Index Global Mobile Data Traffic Forecast Update, 2011-2016 reports that Internet traffic continues to grow at unprecedented rates. Cisco says that the second leading source of internet traffic will be the Internet of Things devices.

The networking giant says the source will be from machine-to-machine communications, or “M2M.” Brian Bergstein at MIT‘s Technology Review says to think of sensors in cars and in appliances, surveillance cameras, smart electric meters, and devices still to come, monitoring the world and reporting to each other and to centralized computers what they’re detecting. The chart below, reprinted from the Cisco report, shows just how extreme the jump in machine-to-machine communications could be. Cisco says M2M will grow, on average, 86 percent a year, reaching 508 petabytes a month, or half a billion gigabytes by 2016.

Related articles

New ARM chip for Internet of Things

ARM logoARM (ARMH), the semiconductor company whose chip technology powers most modern smartphones, has come up with a chip for the Internet of things (IoT). Om Malik at GigaOM reports that the Cortex-M0+ is an energy-efficient chip, optimized for use in everything from connected lighting to power controls to other home appliances. In a press release, the company explains:

The 32-bit Cortex-M0+ processor … consumes just 9µA/MHz … around one-third of the energy of any 8 or 16-bit processor available today, while delivering much higher performance …[to] enable the creation of smart, low-power microcontrollers to provide … wirelessly connected devices, a concept known as the ‘Internet of Things.’

At GigaOM’s Mobilize 2011 event ThingM CEO Mike Kuniavsky said that “ubiquitous network connectivity, cloud-based services, cheap assembly of electronics, social design, open collaboration tools, and low-volume sales channels create an innovation ecosystem that is the foundation for an Internet of things.”

GigaOM says Freescale and NXP (NXPI), both are major suppliers to the automotive and home automation industries have signed up for the new ARM Internet of Things chip technology. Freescale and NXP have locations in the Farmington Hills, MI area.

Related articles

A new chip for the Internet of Things

Atheros logoOm Malik at GigaOm recently noted that Atheros, a division of Qualcomm (QCOM) launched a new very low power consuming Wi-Fi chip. The AR4100P, is focused on the “Internet of Things.” He predicts that soon, there might be Wi-Fi in everything around us, including Samsung’s (005930) Wi-Fi-enabled washing machines, which Malik wrote about earlier.

According to the blog, the new “highly integrated 802.11n single-stream Wi-Fi system-in-package with integrated dual IPv4 IPv6 networking stack” is focused on smart home and building controls and appliances. Atheros and other chip companies such as ARM are betting that the Internet of Things will prove to be a new giant market opportunity.

rb-

The new Atheros chip also includes an IPv6 stack as well as 802.11n to give end-to-end control of your home appliances.

Related articles
  • Marvell chip makes appliances and LED lights ‘smart’ (ces.cnet.com)

The Web Connected Smelly Robot

olly logoThe Internet of Things now has smell-o-vision from Olly. Olly takes services on the Internet and delivers their pings as smell according to his website. Whether it’s a tweet or a like on Instagram, Olly will be sure to let your nose know about it. Mint Foundry, a graduate design lab at Mint Digital dedicated to exploring the potential of web-connected objects developed Olly.

It is possible to change Olly’s smells in an instant. It has a removable section in the back which can be filled with any smell you like. It could be essential oils, a slice of fruit, your partner’s perfume, or even a drop of gin.

Olly is stackable, so if you have more than one, you can assign each one to a different service with a different smell. Connect one to Twitter and another to your calendar. Before you know it, you’ll have a networked Internet smell center claims the website.

Olly is not yet in production, but Mint is glad to offer the source files to anyone who’s got a 3D printer and a nose for adventure.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Power over Ethernet 802.3af

Power over Ethernet 802.3afA client recently asked what happened to the network design rule of thumb which said do not install data cables anywhere near electrical cables? The fear of cross-talk, interference, and corruption of the data traffic seems to have disappeared with Power over Ethernet (PoE). He rightly pointed out that now it seems OK to mix data and power in the same cable going to a networked device. 

Read part 2 here.

Plain Old Telephone SystemPoE is similar in principle to the way that the copper wire pair that carries your POTS (Plain Old Telephone System) telephone signals into your house also carries enough electricity (48v DC) from the telco Central Office to power the phone’s core elements of the headset, dial, and ringer. Power over Ethernet’s development started with early implementations of Voice over Internet Protocol VoIP)phone systems. VoIP pioneers did not have a telco CO to power the phones and powering the VoIP phones with wall warts proved unreliable. The phones stopped working when unplugged from the wall or if the building lost power.

In 2000 Cisco (CSCO) developed the first successful technique of putting 48v DC on the LAN data cable along with the data traffic. This proprietary system allowed Cisco to overcome customer objections to wall warts and sell a lot of VoIP systems.

Cisco logoCisco’s original PoE equipment was capable of delivering up to 10W per port. The endpoint and the Cisco switch negotiated the amount of power to be delivered based on a power value in the proprietary Cisco Discovery Protocol (CDP). The Power Sourcing Equipment (PSE) will send a Fast Link Pulse (FLP) on the transmit pair. The Powered Device (PD) connects the transmit line to the receiving line via a low pass filter. And thus the PSE gets the FLP in return. Cisco’s original PoE implementation is not software upgradeable to the IEEE 802.3af standard. Cisco manufactured many IP phones and WLAN access points devices that were not compliant with the IEEE 802.3-2005 Clause 33 including:

Cisco pre-standard IP phones
7985G7960G7940G7910G7910G + SW
7912G7905G7902G7970G
Cisco IEEE 802.3af and pre-standard IP phones
7970G7961G7906G7941G
7911G7962G
The Cisco 7936 Conference Phone does not support any LAN based power and requires a Cisco power injection adapter
Source

Throughout 2001 and 2002, other VoIP and Wireless Access Point (WAP) vendors saw Cisco’s success and developed their own proprietary (and often non-interoperable) powering systems. As more proprietary systems were developed the Institute of Electrical and Electronics Engineers (IEEE) recognized the need to standardize PoE. The IEEE 802.3 Ethernet Committee assigned PoE technology to a new working subcommittee called 802.3af. The IEEE working group’s charge was to create a standardized version of the Power Over Ethernet so that any manufacturer who wanted to could make their products PoE ready. The IEEE working group took commentary from 2001 to 2003 and released the ratified IEEE 802.3af-2003 Power over Ethernet standard in June 2003 which added clause 33 to the IEEE 802.3 standard

Institute of Electrical and Electronics Engineers (IEEE) 802.3 Ethernet CommitteeThe 802.3af document describes how PoE systems should work.  The standard defines two types of PoE equipment, Power Sourcing Equipment (PSE) and the Powered Device (PD). Power Sourcing Equipment sends the power out over the LAN cabling system to the Powered Device. The PSE would send out a maximum of 15.4 watts DC per link to each device, (limited to standard Ethernet distances). 12.95 watts are assumed to be available at the PD because some power is lost in the cable.

The nominal voltage is 48 V, over two of the four available pairs on a Cat. 3/Cat. 5e cable. “Phantom power” is used to allow the powered pairs to also carry data. This permits PoE to be used with 10BASE-T and 100BASE-TX, which use only two of the four pairs in the cable, but also with 1000BASE-T (gigabit Ethernet), which uses all four pairs for data transmission. This is possible because all versions of Ethernet over twisted pair cable specify differential data transmission over each pair with transformer coupling; the DC supply and load connections can be made to the transformer center-taps at each end. Each pair thus operates in “common mode” as one side of the DC supply, so two pairs are required to complete the circuit. The polarity of the DC supply may be inverted by cross cables; the powered device must work with either pair: spare pairs 4-5 and 7-8 or data pairs 1-2 and 3-6. Polarity is required on data pairs and ambiguously implemented for spare pairs, with the use of a bridge rectifier. (Source)

VOIP devicesPower Sourcing Equipment can be in two form factors. A PSE can be implemented as an endspan which is an Ethernet switch with powered ports (a PoE enabled switch) or midspan which is a power hub that is used along with a non-powered switch the end-user already has in place. PD’s can receive PoE equally well from either type of PSE per the standard. The decision to use an endspan or a midspan is left up to the end-user.  The end device can use either powering technique.

The Powered Device (PD) is a network device like VoIP phones, Wireless Access Points, and IP cameras. which are capable of taking the power off the LAN cable, through the RJ-45 (8P8C) connector and using it to power itself. Some pre-standard PoE devices are incompatible with 802.3af equipment. More PoE ready PD’s are available every year  PoE ready end devices can reduce installation costs by as much as 90% over traditional powering techniques.  Among the newer PoE PD’s devices on the market or coming soon are IP Paging, Speaker Systems, POS Terminals, Door and Gate Security hardware, Public Information signs, Building Access, Temperature Control Systems, Stage Lighting, and Computers. These newer PD’s were pushing 802.3af to its limits and the IEEE began work to evolve the standard. This power limitation prevented “high power” devices that required up to 30W to be supported via the industry-standard PoE solution.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.