Tag Archive for Wi-Fi

Can SDN Save IT?

Can SDN Save IT?In a recent article “SDN Spreads Its Wings And Starts To Fly” on No Jitter Bob Emmerson writes that for Software Defined Networks (SDN) to take off and live up to its promise of a new area in ICT, an enterprise based ecosystem with key enterprise players must develop. He does not believe that SDN has made sufficient inroads into the enterprise, he writes, “.. so far most of the emphasis in Software Defined Networks (SDN) has been the virtual network architecture,” he continues, that the potential of SDN requires the enterprise, ” … the emergence of a new ICT era … can only come–via an ecosystem comprising key players in the enterprise space.”

Mr. Emmerson writes that SDN makes the network more valuable to the organization. “No longer is the networking infrastructure viewed as merely providing fast connectivity between users, servers, and storage.”

He explains that in an SDN-enabled network features are applications that run as individual processes and software packages on Ethernet switches. They can be downloaded when more services and features are required. There are also extensive scripting capabilities as well additional layers of intelligence that perform tasks like identity management to integrate security and policy enforcement that identifies, locates, and authenticates connected devices and users.

The centralized management platforms use network-level intelligence to replace the duties performed by a PC’s Operating System. These platforms automate tasks, like assigning profiles, and they also allow resources to be added, dropped, or relocated via a Web interface.

Comparing apples and organgesThe article argues that SDN can be used to converge networks. With SDN he argues that 6 networks can be converged on top of the regular wide-area infrastructure. He proposes that enterprises can converge their WLAN/BYOD, Unified Communications (UC), Physical Security for surveillance, Audio-Video Bridging, and HPC into a single network with SDN. These “silo” solutions become part of a single unified edge in an SDN environment. The network OS will immediately recognize new devices, phones, access points, or switches that use the OpenFlow communications protocol, and they will be configured automatically. This feature also applies to new employees as well as those that get a new position in the company. Rights will be assigned automatically according to their job title.

Network 1. WLAN/BYOD: The author predicts a new generation of Access Points (APs) that lowers the cost of deploying and operating a secure, reliable 802.11n WLAN, by using SDN acts as a virtual controller and coordinate the operation of neighboring APs. The SDN virtual controller handles BYOD and other security issues automatically. When a new device is detected, the relevant privileges and policies, determined by the network administrator for the device owner are granted automatically. No other process is required.

Network 2. Unified Communications: UC is a particularly interesting application according to the article. The article states that SDN can address concerns about bandwidth-hungry services like video streaming impacting other media. The issue can be addressed in real-time. If congestion is detected, then the management platform will dynamically allocate additional resources for the duration of the session. It’s that simple Mr. Emmerson concludes.

Network 3. Physical Security: On the physical security network, No Jitter reports that software intelligence embedded in the operating system automates tasks including IP surveillance camera and device discovery, configuration, authentication, power management via Power over Ethernet, and network policy assignment. Automated device discovery is enabled via LLDP.

Network 4. Audio-Video Bridging: Mr. Emmerson says that AVB technology is available on the switches. If AVB is available on network switches (rb- You may want to check with Cisco (CSCO) on the cost of their AV systems before you put it on a switch the TX9000 costs like $300,000.00) If you can swing the money, benefits include reduced complexity of cabling and installations, interoperability between networking devices, and a reduced need for complex network setup and management. The infrastructure negotiates and manages the network for optimal prioritized media transport.

Network 5. High-Performance Computing: The No Jitter article says that High-Performance Computing (HPC) can use SDN to eliminate the Fiber Channel network typically used to connect big data storage to HPC boxes. The author claims that the high-speed, low-latency communications needed by HPC can now be met with 40 Gbps Ethernet in the data center and SDN. He says, “Fiber Channel can go away.”

rb-

Mr. Emmerson concludes that SDN can solve many of the evils that plague IT. He writes that “SDN enables the consolidation of all the various network types that enterprises employ, and it automates many of the routine management tasks. In turn, this results in the ability to run more efficient communications tasks and to operate in a unified corporate environment.” (rb- especially if you use Extreme (EXTR) equipment)

I do agree with several other conclusions he makes in the article. He says that SDN is an IT game-changer, “The game it’s changing is the closed, proprietary world of networking with its vertically integrated hardware, slow innovation and artificially high margins: a world that hasn’t changed much for decades.” Did I almost hear the C_ _ _o word in there?

SDN reality checkHe breathlessly concludes that all that ails IT will be cured by SDN, “… the benefits of managing one network instead of different silos, the real-time automation of configuration and resource allocations tasks, and the tight integration of devices and the network will lead to efficiencies of scale and facilitate the development of next-generation services. SDN is enabling IT to make better use of corporate resources: to do more while operating in an era of tight budgets and a problematic economy.” Yeah but there also has to be someone to break down the silos and get the video guys and the facilities guys to give up some of their turf and headcount.

What do you think?

Is the biggest challenge to SDN technical or political?

View Results

Loading ... Loading ...
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Another Net for IoT

Another Net for IoTKevin Fitchard at GigaOM writes about the French start-up Sigfox that wants to take on the mobile service providers. Sigfox plans to build a new network just for the Internet of Things (IoT). Thomas Nicholls, Sigfox business development chief, and internet of things of evangelist said that cellular networks are built to connect humans, not objects. Sigfox is proposing to build an alternate wireless network dedicated solely to linking together the internet of things.

Sigfox logoThe Toulouse France-based start-up argues that the majority of objects linked to the network will connect rarely. A GPS tracker in a vehicle or shipping container may send out its coordinates just once a day. A smart meter may link back to its utility company’s servers once a week. Many of the sensors being embedded in devices from vending machines to security cameras only transmit when something goes wrong, meaning an M2M module may wait months if not years between connections to the Internet of Things. Connected home appliances like LG Electronic’s (LGLD) new Smart Thinq refrigerator, GPS tracking devices, smart meters and medical alert sensors are all the types of devices that Sigfox hopes to target.

Mr. Nicholls added that Sigfox thinks there’s a huge opportunity in the growing business-to-consumer connected device space. The assortment of gadgets and wearable devices making their way into the connected home and onto our bodies are typically connected by local area networking technologies like Bluetooth, Zigbee, and Wi-Fi. But he thinks there’s a big case to be made for replacing those technologies with Sigfox according to the article.

Wireless networkThe author claims that as Sigfox achieves economies of scale, its radio will not only shrink, their costs will fall to just a few dollars per module. Due to the huge efficiencies in running its network, Sigfox can support a device connection for little more than a dollar a year, Mr. Nicholls said. At those prices, gadget manufacturers can include IoT connectivity costs into the device costs without requiring customers to sign up for a subscription.

Not only would using Sigfox give these devices a range far beyond local networks, but they would also be “on” right out of the box, the Sigfox IoT evangelist said. It also wouldn’t require any signing up or logging on, as the machine-to-machine communication would just work out of the box.

Noisy networkTo host these devices over power-hungry and expensive cellular radios makes little sense, the business development chief said. The better course is to attach these devices to a network optimized for their use cases — one that can support billions of devices each sending relatively little data at distinct intervals, the start-up believes. “Our network is structured in a radically different way,” Nicholls claims in the GigaOM article. “There is really no notion of a network. You only connect when you have a payload to deliver.

Sigfox has developed a wireless architecture using ultra narrow-band modulation techniques that can theoretically support millions of devices with only a handful of network transmitters. Using the unlicensed frequencies commonly used for baby monitors and cordless phones (868 MHz in Europe and 915 MHz in the US), Sigfox says it can offer the same coverage with a single tower that a cellular network could provide with 50 to 100 cell sites. Sigfox is building a network covering all of France with 1,000 transmission sites, and Mr. Nicholls estimates that the company could do the same in the US with 10,000 transmitters.

size of two thumbnailsThe author describes the embedded radio modules as about the size of two thumbnails, and they transmit at power levels 50 times lower than their cellular M2M counterparts. Such low consumption levels mean that objects that normally have no external power supply could stay connected for as long as 20 years before their module batteries would need recharging, Mr. Nicholls said.

rb-

Apparently, Sigfox’s ultra narrow-band technology can only support bandwidths of 100 bps (YEAP THAT’S BPS, NOT KBPS) — which makes it far slower than even the poorest 2G data connection so it will be popular with wireless service providers who will try to connect everything to the Internet of Things.

Sigfox does not seem to be the answer for devices that send large quantities of data or keep up constant connections to the network like telemedicine aren’t the “things” that Sigfox intends to connect to the Internet.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WiGig, Wi-Fi Join Forces

WiGig, Wi-Fi Join ForcesWireless Week is reporting that the Wireless Gigabit Alliance (WiGig) and the Wi-Fi Alliance have joined forces. According to the article, the Wi-Fi Alliance and WiGig Alliance have collaborated for over two years on the WiGig Alliance’s work to develop an interoperability certification for 60GHz products.

Wi-Fi Alliance logoWi-Fi Alliance President and CEO Edgar Figueroa said in a statement that the 60GHz technology has been an important highlight in the Wi-Fi Alliance’s certification roadmap for some time. “Combining the expertise of Wi-Fi Alliance and WiGig Alliance will deliver a terrific user experience with 60 GHz solutions, and will help ensure that a full range of interoperable WiGig solutions reach the market as quickly as possible,” Mr. Figueroa said in a statement.

WiGig operates in the unlicensed 60 MHz band and offers short-range multi-gigabit connections with speeds up to 7 Gbps. FierceBroadbandWireless reports that early applications will include ultrabooks and peripherals. WiGig offers short-range multi-gigabit connections for applications ranging from high-definition WiGig Display Extensions (WDE) to peripheral connectivity and I/O cable replacement such as WiGig Serial Extension (WSE), WiGig Bus Extension (WBE), and WiGig SDIO Extension (WDS). Tablets will then include the technology, primarily for media streaming, and smartphones will drive more widespread WiGig adoption from 2015 on according to ABI Research.

60ghz 802-11ad scenarios

Its major limitation is the extremely high 60 GHz frequencies it uses, which limits its connections to near-line-of-sight within a single room. Signals in the 57–64 GHz region are subject to a resonance of the oxygen molecule and are severely attenuated.

WiGig logoEarly 60 GHz implementations based on the WiGig specifications are entering the market now, and ABI Research forecasts that by 2016, annual shipments of devices with both Wi-Fi and WiGig technology will reach 1.8 billion units.

Related articles
  • WiFi spec update promises to double your wireless speeds (pcproactive.wordpress.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Power Over Ethernet 802.3at

Power Over Ethernet 802.3atA client recently asked what happened to the network design rule of thumb which said do not install data cables anywhere near electrical cables? The fear of cross-talk, interference, and corruption of the data traffic seems to have disappeared with power over Ethernet. He rightly pointed out that now it seems OK to mix data and power in the same cable going to a networked device. Power over Ethernet (PoE) is similar in principle to the way that the copper wire pair that carries your POTS (Plain Old Telephone System) telephone signals into your house also carries enough electricity (48v DC) from the telco Central Office to power the phone’s core elements of the headset, dial, and ringer. The latest PoE standard is 802.3at.

See part 1 here.

can cut installation costsPoE end devices (PD) became popular with the bean-counters because these devices can cut installation costs by as much as 90% over traditional powering techniques. With cost savings comes demands for new products however, the power limitation of 802.3af  prevented full support of  “high power” devices via the industry-standard PoE. In September 2005, the IEEE launched a task force to begin reviewing new PoE specifications to enhance the IEEE 802.3af guidelines into a next-generation standard.

The IEEE ratified the new PoE standard in 2009 called IEEE 802.3at-2009 PoE standard (aka PoE+ or PoE plus). Under the new standard Power Sourcing Equipment (PSE) must provide at least 30.0 Watts at the PSE port and 25.5 watts continuous power to up to 100 meters from the PSE over Cat5e or better cable to each PD. This will allow PoE to address applications such as multi-radio wireless APs, Pan-Tilt-Zoom (PTZ) gimbal-mounted cameras, 802.16 subscriber stations, 3G/LTE femtocells, perimeter security equipment, videoconferencing products, thin clients, and even some notebooks, as well as emerging applications. The new standard also provides full backward compatibility and interoperability to existing 802.3af compliant PSE’s and PD’s.

802.11n Wi-Fi technologyThe widespread use of 802.11n Wi-Fi technology has been one of 802.3at’s drivers. The multiple-input/multiple-output (MIMO) architecture used by 802.11n technology requires more power than earlier technologies, like 802.11a and 802.11b/g.

Installation practices and cable type impact the ability to use PoE+ to power a PD. Installation practices are outside the scope of the IEEE 802.3at standard. The Telecommunications Industry Association (TIA) has addressed these issues in a Telecommunications Systems Bulletin (TSB). TSB-184, Guidelines for Supporting Power Delivery Over Balanced Twisted-Pair Cabling describes how the impact of environmental conditions of the installed cabling and heat dissipation profiles of the cables’ effect the telecommunications cabling capacity to support the PoE+ application.

But Wait There’s More

IEEE logoOne of the most important benefits of the IEEE 802.3at standard is it incorporates existing 802.3af PoE safety requirements. The new standard includes compliance detection features for safe powering as well as safe PD disconnection in overload, short-circuit or under-load conditions enabling fast and safe adoption of the new standard.

The definition of a powered device changed under the IEEE 802.3at-2009 standard. The new standard considers the PD to be the powered interface, as opposed to the entire device being powered. This means that one device can have two power interfaces, each taking 25.5W, inside the same box. Nothing precludes these to be connected—one over the two pairs using lines 1, 2, 3, and 6 and the other over the two pairs using lines 4, 5, 7, and 8. This is what makes it possible to double the standard 802.3at-2009 maximum of 25W and go up to 51W while fully complying with the standard. Applications that need 51W PoE are an exterior IP camera with a heater or an access control system that includes a controller, a reader, and a few door locks which can easily consume 45W of power or more.

POE PTZ cameraAnother way PoE system developers are addressing the growing device powering requirements is by employing the option in the IEEE standard to add PoE functionality over all four pairs of the Ethernet cable. This option opens the door for safely delivering 60 watts of direct current (DC) power over a single Ethernet cable, using current levels of 600 milliamps (mA) than the 1.2 Amp level of two-pair 60W midspans.

The manufacturers claim this configuration can cut power consumption by 15% compared to two-pair solutions. This could translate into savings of about $25 per year per powered device, assuming energy costs of $0.10 per kilowatt-hour.

Related articles
  • IEEE Introduces Groundbreaking Standard for Body Area Networking (sys-con.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Detroit Safest Online City Again

Detroit Safest Online City AgainNorton, the anti-virus arm of Symantec (SYMC) teamed up with research firm Sperling’s BestPlaces to rank US cities based on a number of cybercrime risks and they found Detroit the safest online city for 2012. I wrote about Detroit’s 2011 ranking here.

DetroitBert Sperling, lead researcher for the analysis said, “By looking at data from consumer lifestyle habits as well as cybercrime data provided by Symantec, … we’re able to provide a holistic view of the various factors that put a person at potential risk.

The Huff Post reports that the study looked at the prevalence of Internet use in addition to the types of risks users face online. Consumer statistics include the number of PCs, use of smartphones, the use of social networks, e-commerce, and accessing potentially unsecured Wi-Fi hotspots. BestPlaces also looked at the following cybercrime data: bot-infected computers located within a specific city, attempted malware infections, spamming IP addresses found within a specific city, and web attacks originating within a specific city.

Wi=FiSymantec says Detroit had low scores in the number of Wi-Fi hotspots, potentially risky online consumer behavior, and PC expenditures. Other low-ranked cities include Tulsa and El Paso.

Users are at most risk for cybercrime in the following cities:

1. Washington
2. Seattle
3. San Francisco
4. Atlanta
5. Boston

SymantecWith the explosion of smartphones, tablets, and laptops in recent years, and the rise of apps and social networking sites, our online and offline lives are blending together in ways that we’ve never before experienced,” said Marian Merritt, Norton Internet Safety Advocate. “…this analysis highlights the potentially risky factors we face each time we go online. By taking a few simple precautions now, people can make sure they stay protected against online threats.”

Greg Donewar, manager of the National White Collar Crime Center told Huff Post,… over the past year, we’ve seen a considerable increase in cybercrime attacks, and whether a person lives in the riskiest online city or the safest, consumers everywhere need to be aware of the inherent dangers of online activity.

rb-

Forbes says that cyber-crime is a $37 billion crime that affects 1 in 25 Americans. Take these steps to protect yourself online:

Create better passwords. Avoid passwords like password, 123456, qwerty, abc123, or monkey, these are the top most common passwords (I have been writing about weak passwords for since 2010). Forbes says your first line of protection against cybercrime is to make sure all of your passwords follow these rules of thumb:

  • At least eight characters
  • A mix of these four types of characters: upper case letters, lower case letters, numbers, and special characters
  • Not a name, slang word, or any word in the dictionary
  • Don’t keep the same password; change it every six months
  • Have uniquely different passwords (not just slight variations of the same password) for every account and site

Monitor your financial accounts. If you shop online, use online banking, or have any personal or financial information available online, you are at risk of finance-related crimes like identity theft and fraud which Huff Post says costs the average victim $631 in out-of-pocket costs. Forbes says that one of the easiest ways to protect yourself is to monitor your credit to detect any red flags early. They recommend users set up spending limit alerts on credit cards and checking accounts to keep tabs on your balances. Automatically monitoring for suspicious activity and fraudulent accounts helps catch costly identity theft and fraud immediately.

Lockdown your smartphone. If you use your smartphone to shop, spend, socialize, and surf, your phone’s sensitive information essentially becomes a one-stop shop for cybercriminals. Forbes says if stolen or exposed to thieves, your smartphone can compromise your personal and financial information anytime and anywhere. Here’s a quick five-minute checklist from Forbes on how to properly secure your mobile phone:

  • Password-protect your phone with a complex and unique password, and set your phone so it auto-locks and never saves any passwords.
  • Enable a service with remote tracking. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.
  • Turn Bluetooth off if you’re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.
  • Be careful on public Wi-Fi networks where thieves can remotely access your data undetected. Only connect your phone to secure networks.
  • Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like appWatchdog for complaints.
Related articles
  • Why you should password-protect your smartphone (ctv.ca)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.