{"id":63560,"date":"2013-12-17T19:55:45","date_gmt":"2013-12-18T00:55:45","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-31T13:25:48","modified_gmt":"2021-07-31T17:25:48","slug":"wiring-closet-3-0","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/wiring-closet-3-0\/","title":{"rendered":"Wiring Closet 3.0"},"content":{"rendered":"<p><a href=\"http:\/\/www.elegrity.com\/infrastructure-services-blog\/bid\/55145\/Disaster-Recovery-Planning-Crown-Jewels-and-Quick-Wins\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-99637 \" title=\"Wiring Closet 3.0\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/the_closet_monster_400_clr.png?resize=113%2C110&#038;ssl=1\" alt=\"Wiring Closet 3.0\" width=\"113\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/the_closet_monster_400_clr.png?resize=150%2C146&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/the_closet_monster_400_clr.png?resize=75%2C73&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/the_closet_monster_400_clr.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 113px) 100vw, 113px\" \/><\/a>The lowly <strong>wiring closet<\/strong> at the edge of the network is evolving. You know the one\u2019s that IT shares with the custodians or the women&#8217;s lav. The neglected place that <strong>connects all end-points<\/strong> into the enterprise network infrastructure. Throughout my career we have moved from 3Com SuperStack hubs to 10\/100 SuperStack switches to 100\/1000\/10000 Cisco 2960\u2019a fixed <a title=\"Ethernet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Ethernet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Ethernet<\/a> devices. In this first edge era, the primary buying criteria was the price per port. Low price was the critical factor. These devices might have had a few network services but they only provided best-effort connectivity services with little to no operational control according to <a title=\"Nick Lippis\" href=\"https:\/\/twitter.com\/nicklippis\" target=\"_blank\" rel=\"noopener noreferrer\">Nick Lippis<\/a> in the <em><a title=\"Lippis Report Issue 103: Wiring Closet Switches Gain Strategic IT Value Label\" href=\"https:\/\/web.archive.org\/web\/20160424093431\/http:\/\/lippisreport.com\/2008\/04\/lippis-report-issue-103-wiring-closet-switches-gain-strategic-it-value-label\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lippis Report 103: Wiring Closet Switches Gain Strategic IT Value Label<\/a><\/em>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130413021017\/http:\/\/itknowledgeexchange.techtarget.com\/networkhub\/behind-the-scenes-at-unhs-interoperability-lab\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99639 size-medium\" title=\"Baystack stack\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/baystack2-e1564964838992-150x143.jpg?resize=150%2C143&#038;ssl=1\" alt=\"Baystack stack\" width=\"150\" height=\"143\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/baystack2-e1564964838992.jpg?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/baystack2-e1564964838992.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/baystack2-e1564964838992.jpg?w=352&amp;ssl=1 352w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><strong>Commoditized<\/strong> network gear created enterprise networks consisting of equipment from different vendors. Purchases throughout the wiring closets, distribution, and core were based mainly on <strong>cost<\/strong>. The article says that equipment from multiple vendors is the hallmark of Wiring Closet 1.0. Wiring Closet 1.0 made effective management difficult. Multiple management systems required that organizations keep a large staff with diverse skills to keep up network functionality.<\/p>\n<h3>Wiring Closet 2.0<\/h3>\n<p>Most organizations are now in the Wiring Closet 2.0 era. As competition drove margins on edge switches into the single digits, the author states that vendors began to add services to a new breed of device. The new features on 2.0 switches created new ways for the vendors to compete on different (<em><strong>rb-<\/strong> and more profitable<\/em>) fronts beyond price per port. Mr. Lippis argues enterprise trends are forcing IT executives to check projects, programs, and priorities as they seek to drive down <a title=\"Total cost of ownership\" href=\"http:\/\/en.wikipedia.org\/wiki\/Total_cost_of_ownership\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Total Cost of Ownership<\/a> (<strong>TCO<\/strong>) while extracting added value from their enterprise network. Business executives expect their IT departments to meet continually growing demands without significant year-over-year network expenditures. (<em><strong>rb<\/strong>&#8211; the ever popular more with less argument<\/em>) The article says the new realities include new mixed traffic patterns and increased desktop bandwidth requirements for new applications, communications, and data center strategies.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99642 \" title=\"Goddard rocket scientist\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/rocket_science-e1564964976133-150x82.jpg?resize=146%2C80&#038;ssl=1\" alt=\"Goddard rocket scientist\" width=\"146\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/rocket_science-e1564964976133.jpg?resize=150%2C82&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/rocket_science-e1564964976133.jpg?resize=75%2C41&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/rocket_science-e1564964976133.jpg?w=540&amp;ssl=1 540w\" sizes=\"auto, (max-width: 146px) 100vw, 146px\" \/>Switch vendors recognized these trends. They responded by developing a new type of wiring closet switch. Second-generation switches added significant functionality. The vendors&#8217; goal is to transform the commoditized network edge (<em><strong>rb-<\/strong> low profit<\/em>) into a strategic IT asset (<em><strong>rb-<\/strong> high profit<\/em>). The blog says these new switches enable a host of new applications for Wiring Closet 2.0.<\/p>\n<ul>\n<li><strong>Quality of Service<\/strong>: Wiring Closet 2.0 switches tag applications like <a title=\"Voip\" href=\"https:\/\/web.archive.org\/web\/20190710223245\/https:\/\/www.wikinvest.com\/concept\/Voip\" target=\"_blank\" rel=\"noopener wikinvest noreferrer\">IP telephony<\/a> and <a title=\"Unified communications\" href=\"http:\/\/en.wikipedia.org\/wiki\/Unified_communications\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Unified Communications<\/a> at access to guarantee priority throughout an internal network and active monitoring<\/li>\n<li><strong>Power Over Ethernet<\/strong> (<a title=\"Power over Ethernet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Power_over_Ethernet\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">PoE<\/a>): Second generation, wiring closets distribute power over Ethernet cables. POE enables new classes of devices to be powered from the Wiring Closet 2.0. These demands include <a title=\"Wireless LAN\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wireless_LAN\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">WLAN<\/a> access points, video surveillance, and IP phones. As well as specialty devices such as health care instrumentation, point of sale devices and soon even laptops.<\/li>\n<li><strong>Security<\/strong>: The network edge Is the first level of defense.\u00a0<a title=\"Network Access Control\" href=\"http:\/\/en.wikipedia.org\/wiki\/Network_Access_Control\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Network Access Control<\/a> (NAC) and application policing have increased in importance. They are needed to protect the integrity of the network, data privacy, and compliance. Wiring Closet 2.0 switches integrate security features and the support of security appliances bolstering defense-in-depth strategies.<\/li>\n<li><strong>Wireless<\/strong> Local Area Networking: WLAN integration, which includes access point, PoE, and controller support, increases WLAN coverage. Further common network management interfaces streamline operational support for both wired and wireless networks.<\/li>\n<li><strong>Unified Communication<\/strong> (UC): UC support via PoE to power IP phones and UC end-points plus unique UC configuration profiles to ensure reliable and stable UC operation.<\/li>\n<li><strong>Application Intelligence<\/strong>: Application intelligence or the categorizing of applications as they enter the wiring closet and either mark them with <a title=\"Quality of service\" href=\"http:\/\/en.wikipedia.org\/wiki\/Quality_of_service\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">QoS<\/a> or discard the application. This enables application policing at the network edge.<\/li>\n<li>Layer 3: Full layer 3 forwarding enabling all the value associating with routing including segmentation and aggregation are now included in some wiring closet switches.<\/li>\n<li>Total Cost of Ownership: The network edge and wiring closet switches in particular have a TCO breakdown of 20% capital spend and 80% operational spend according to <a title=\"Gartner\" href=\"https:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a>\u00a0(<a title=\"NYSE : IT\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-IT\/\" target=\"_blank\" rel=\"nofollow noopener\">IT<\/a>). Mew wiring closet switches are more expensive from a capital acquisition point of view. However, their operational cost is lower. Thus, the total dollar spend over a three-year period will also be lower while delivering increased value to the enterprise.<\/li>\n<\/ul>\n<h3><strong><a href=\"https:\/\/web.archive.org\/web\/20240222151005\/https:\/\/world.edu\/higher-ed-disruption-not-so-nnew\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-99644 alignright\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/disruption1.jpg?resize=130%2C57&#038;ssl=1\" alt=\"\" width=\"130\" height=\"57\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/disruption1.jpg?resize=150%2C66&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/disruption1.jpg?resize=75%2C33&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/disruption1.jpg?w=680&amp;ssl=1 680w\" sizes=\"auto, (max-width: 130px) 100vw, 130px\" \/><\/a><\/strong>Wiring Closet 3.0<\/h3>\n<p>The IT industry is on the verge of a new era at the network edge. New technologies and requirements will disrupt Wiring Closet 2.0.<\/p>\n<ul>\n<li><strong>10Gbps Ethernet<\/strong>: 10Gbps Ethernet is the future of networking. If the past is a guide to the future, then over time more and more 1 Gbps Ethernet ports will upgrade to 10 Gbps. This will place a strain on wiring closet packet processing performance while driving up 10Gbps port density requirements plus downstream distribution and core switch capabilities.<\/li>\n<li><strong>Software-defined networking<\/strong> (SDN): The holy grail of SDN is to separate the network control plane from the data plane. The model I carry in my head is wireless networks. There is a central controller that tells the WAP\u2019s what to do and they do their job without any help from the central controller. This implies that the network devices can be dumber and cheaper.<\/li>\n<li><strong><a title=\"Network management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Network_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Network Management<\/a><\/strong>: Consistent network management means leveraging the same supplier for the network edge, distribution, and core.<\/li>\n<li>True Layer 3 Support: To support all the above-mentioned trends and unforeseen applications, wiring closet switches need to support full layer 3 forwarding.<\/li>\n<li>Support of UC, Mobility, and Security: This basis of competition is one of the most important attributes to the new network edge. Wiring closet switches need to support both standard interfaces and services for UC, mobility, and security so that mixed vendor solutions may occur.<\/li>\n<li>IPv6:\u00a0If you have wiring closets full of perfectly good Layer 2 switches, there&#8217;s no reason to replace them just because you can&#8217;t manage them with IPv6. If they work today, they&#8217;ll work until they break, and you don&#8217;t need to worry about (or budget for) swapping them out any sooner.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.webtorials.com\/content\/2012\/05\/ipv6-transition-the-time-is-finally-here.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-99647 size-medium alignright\" title=\"IPv6\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IPv6-Artwork-e1564965073301-150x106.jpg?resize=150%2C106&#038;ssl=1\" alt=\"IPv6\" width=\"150\" height=\"106\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IPv6-Artwork-e1564965073301.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IPv6-Artwork-e1564965073301.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IPv6-Artwork-e1564965073301.jpg?w=386&amp;ssl=1 386w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<h3>IPv6<\/h3>\n<p><a title=\"Dan Campbell\" href=\"http:\/\/www.circleid.com\/members\/3028\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dan Campbell<\/a>, President, <a title=\"Millennia Systems, Inc.\" href=\"https:\/\/web.archive.org\/web\/20210513060106\/http:\/\/millenniasystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Millennia Systems, Inc.<\/a> <a title=\"IPv6: Don't Forget About Your Switches!\" href=\"http:\/\/www.circleid.com\/posts\/20120724_ipv6_dont_forget_about_your_switches\/\" target=\"_blank\" rel=\"noopener noreferrer\">suggested<\/a> in a recent <em><a title=\"CircleID\" href=\"http:\/\/www.circleid.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CircleID <\/a><\/em>post that to manage the move to an IPv6 enabled Wiring Closet 3.0. Organizations should strive to use theIPv6 dual-stack migration strategy. This is where <strong>IPv6<\/strong> is added to the existing systems so they can simultaneously function with both IP versions. Tunneling and translation techniques should be used when the dual-protocol configuration is not possible. The mantra of &#8220;dual stack where you can, tunnel where you must&#8221; is the order of the day.<\/p>\n<p>He advises that starting today, don&#8217;t buy another box unless it supports dual-stack operation or offers a clear, well-defined upgrade plan. It doesn&#8217;t matter if the manufacturer is &#8220;up and to the right&#8221; in the latest\u00a0<a title=\"Gartner\" href=\"https:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a> (<a title=\"NYSE : IT\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IT\" target=\"_blank\" rel=\"noopener noreferrer\">IT<\/a>) report; anything you buy from now on that is IPv4-only is a waste of valuable resources.<\/p>\n<p>Mr. Campbell tells network administrators that while LAN switches function mainly at layer 2. They forward Ethernet frames regardless of whether the packet inside is IPv4 or IPv6. There are some functions on a switch that works at layer 3 or higher. They include:<\/p>\n<p style=\"padding-left: 40px;\">\u2022 Dynamic ARP Inspection (DAI).<br \/>\n\u2022 DHCP Snooping.<br \/>\n\u2022 Multicast Listener Discovery (MLD) Snooping (the IPv6 equivalent of IGMP Snooping).<br \/>\n\u2022 Quality of Service (QoS) marking for upstream Differentiated Services treatment.<br \/>\n\u2022 Access Lists (e.g., VLAN or regular ACLs).<\/p>\n<p>He explains that these features need layer 3 or upper-layer information; Layer 3 is needed to inspect the packet header or payload inside the Ethernet frame. These features may not be things you are doing now, but you never know when you will. Security requirements and hardening guidelines are recommending things like DAI, DHCP Snooping, and ACLs at the access layer.<\/p>\n<p>The more streaming video gets moved to IP networks, the more the need for multicast. MLD Snooping is necessary to improve performance. Finally, the continued convergence of voice, video, and other rich media and interactive applications to IP networks is furthering the need for QoS. It is always best to mark traffic as close to the edge as possible.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140306080000\/http:\/\/networking.answers.com:80\/ethernet\/best-wiring-closet-products-for-large-companies\" target=\"_blank\" rel=\"noopener noreferrer\">Best Wiring Closet Products for Large Companies<\/a> (networking.answers.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wiring closet 3.0 is necessary at the network edge because of network technology disrupters like IPv6 SDN video BYOD security disrupting<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[3044,1400,1174,33,1834,1913,252,2027,2028,2019],"class_list":["post-63560","post","type-post","status-publish","format-standard","hentry","category-low-voltage","tag-3044","tag-access-control","tag-ethernet-2","tag-ipv6","tag-management","tag-network","tag-poe","tag-tco","tag-uc","tag-wireless-lan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=63560"}],"version-history":[{"count":11,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63560\/revisions"}],"predecessor-version":[{"id":131418,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/63560\/revisions\/131418"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=63560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=63560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=63560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}