discovering the network foundation for mobility and iot

14
1 Alcatel-Lucent Enterprise Networks Laying the ground for Tomorrow’s Digital Business Heitor Faroni June, 2016

Upload: alcatel-lucent-enterprise

Post on 15-Apr-2017

672 views

Category:

Technology


3 download

TRANSCRIPT

Alcatel-Lucent Enterprise NetworksLaying the ground for Tomorrows Digital BusinessHeitor FaroniJune, 2016

#

Hello and welcome! My name is Heitor Faroni. I am a director of solutions marketing for ALE. In this 2nd part of our theme around Mobility and IoT we are going to discuss what solution ALE can offer from the network point of view that lays the ground for tomorrows digital business.

#

The Growing Trends in Mobility and IoT

*1 Statista.com: http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/*2 IDC press release on 03Mar2016 - http://www.idc.com/getdoc.jsp?containerId=prUS41061616*4 Gartner Report: Infrastructure and Operations Leaders: Prepare for the IoT Rush, 1 March 2016*3, *5 - IDC FutureScape: Worldwide Mobility 2016 Predictions IDC web conference presentation by John Jackson Nov 2015

270B App Downloads by 2017 *1

1.5B Smartphones to be shipped in 2016 *2IoT endpoints will grow to 20.8B units in 2020 *4Enterprise mobile app. X4by 2018 and 60% of apps created will have no PC antecedent *383% of the 22M smart eyewear devices shipped in 2019 will go to enterprise use cases *5

Mobility

IoT

Network InfrastructureTomorrowsDigital BusinessHigher resilienceTighter securityMore wireless coverageHigher performanceLow latencyIoT traffic containment

Connectivity anywhereMore apps diversityMore devices/personFaster response timeBeyond employeesMore line of business adopting IoTMore devices to connectPoE for direct IoT powerBeyond carpeted areas

#

If you remember from the previous presentation, we discussed about the two growing trends of mobility and IoT.

We mentioned how these trends are shaping the way we are going to do business in the future, their specific requirements, and how they are going to impact the network infrastructure. So, in this presentation we are going to explain how we can help you solve the challenges that comes with these two trends. And Id like to do that using an example.

#

Meet SharpMetal Steel FactorySteel Plant 1Engineering LabAdministration OfficeSales Office

Sales

Manufac.

Admin

Sales

Manufac.RestaurantSteel Plant 2Office Automation

PhonesComputingNetwork InfraApplication Servers

Data Center

#

Let me introduce you to our fictitious SharpMetal steel factory. In this company we have a campus with multiple buildings: two steal plants, a sales office, an administration office, an engineering lab and even a restaurant that employees can use every day. Naturally, we have all sort of employees: some work on the manufacturing area, some in sales and others in administration. Each group of users have unique needs to access different applications and also use all kind of devices. Most of these users expect IT to offer mobility, allowing them to use their own devices or their corporate devices anywhere, independently if they are connected via wire or wireless.

I want you to meet our IT Manager. Which has deployed a network infrastructure that can support mobility, leveraging our UA technology. IT provides the connectivity for the IP Phones, and all the computing devices: smartphones, laptops, tablets. And it makes sure each individual have access to their specific applications. For instance, one request that came from sales is that wherever they are in the campus, either in the sales office or in the steel plant showing the production line to one of their customers, they have access to the same applications, with the same rights, with the same QoS. This is what IT has been working on, and they believe they have their system working well.

#

IoT demands coming from the Business UnitsThey want to use and control their own IoT solutionOperationalFreedom to deploy devices when and where they want without asking permission from ITThey want their own Eth network for traffic segregation (quality/integrity)Seamless endpoint connectivityTechnical requirementsL2 broadcastFixed IP addressing/VLANSecurityPrevent inappropriate endpoint accessConcern with compliance

Network InfraIoT Platforms

Manufacturing

SensorsActuators

I can improve the productivity by 30% and reduce maintenance costsSecurity

Video camsDoor locksIoT PlatformsNetwork Infra

I can reduce my operational costs by 20%

#

Now I want you to meet our head of engineering. He just went to a trade show and learned that there are new devices, sensors and actuators, that he can deploy in the plant where they do all the steel manufacturing . He is convinced he can improve the productivity by 30% and even reduce the maintenance costs. So, he comes to IT and says, I need you to interconnect these devices with my applications that run in the DC. Be aware that this is critical to our corporation so I need to have my own network, because there are special requirements and also I cannot take any risks of somebody in the corporation messing up with these devices or affecting the performance of the system.

Then I want you to meet another individual, which is the head of security. He also did some research and found out some high definition cameras that can see almost anywhere. He also found some door locks that can be controlled from a central location. With that, he wont need to send people everywhere. He can work with less security guards, and open and close doors as needed. He believes he can reduce his operational costs by 20% if he implements this system. So, he comes to IT and says: I need to interconnect these devices with my applications. However this is security. This cannot be accessible to anybody else. I need my own network.

So each one of these departments and their systems have specific requirements. Operational requirements: for instance, the freedom to deploy device when and where they want without asking permission to IT. They want their own Ethernet network, because of quality, because of security. They want a simple and seamless endpoint connectivity. These device may also have specific technical requirements. Could be they all need a L2 broadcasting environment. Perhaps they may require fixed IP address. What happens, for instance, if a device used in the manufacturing environment have the same IP address as a security device. They may require a fixed VLAN. And from the security point of view they want to prevent inappropriate use or access to these IoT endpoints, and they are also concerned with compliance and other security factors.

#

Company & IT concerns

MaintenanceCablingOperationsTrainingOverheadProcurementAdministrationDeployment

CostEfficiencyProductivity

#

If we go back to our IT manager, when he sees all these requirements, he understands why they want it, but he is thinking about other aspects: How he is going to deploy and maintain all of this? Separate networks turns out into different configurations. What about all the cabling? The operation, the overall assets security? Training people to support all these devices, the overhead, the administration? Many factors that the individuals requesting support did not think about. Furthermore, the IT manager can already imagine the CEO and CFO reaction when he requests to buy more equipment in order to have separate networks. Of course we would love to sell more equipment, but we know, in most of cases, this is not feasible.

Finally, the CFO and CEO are thinking not only about the cost of these independent networks, but also about the productivity and efficiency of the corporation. So as you see, different point of views, different needs. So how can we solve these challenges?

#

SolutionOne network with virtualization capabilityIoT Containment by ALE

Unified Access

Intelligent Fabric

Smart Analytics

#

What we propose is the IoT containment solution from ALE which leverages our three main technologies: the UA, iFab and Smart Analytics. And with these technologies we are able to still use one single network. We use virtualization capabilities, that allows a single infrastructure to look like multiple independent networks. So, lets look at in some more detail#

One networkRobust, easy to deploy, a virtual network for each business unit

ONE NetworkIntelligent FabricAuto Virtual ChassisAuto TopologySelf HealingNetwork VirtualizationManufacturingFacilitiesOffice Automation

Manufacturing NetworkSecurity NetworkOffice Automation Network

#

First of all you build one network where you interconnect all these different type of devices with their respective applications. How you do this? You can use our network portfolio : our access switches, wireless APs, core and aggregation equipment. Then you leverage our iFab technology, which automates the deployment and operation of the network. iFab automatically creates for you the virtual chassis to simplify the operation. It automatically sets up the topology. It has the capability of self-healing. For instance if a node comes down, it knows automatically how to reroute and maintain the ongoing traffic and then, when that unit is replaced, all the configuration is restored back to normal. The other technique that an iFab infrastructure allows us to use is virtualization. We create separate virtual networks, one for the manufacturing group, another for security and another for the office automation while they are all sharing the same physical infrastructure.

#

IOT containedIndependent, secure, simple moves adds and changesSteel Plant 1Engineering LabAdministration OfficeSales Office

Sales

Manufac.

Admin

Sales

Manufac.Restaurant

Steel Plant 2

Universal ProfileClassifyAuthorizeAuto ProvisionContainerQualitySecurity

Manufacturing NetworkActuatorsSensors Security NetworkCamerasDoor Lock

Office Automation NetworkOfficeComms

#

But, lets look in more detail how this is actually done. So here is our campus again, originally with just the users, employee devices and telephones, and the network infrastructure that interconnect these users to the multiple applications in the DC. Then we install all this IoT devices to support the manufacturing in the steel plants, and all the surveillance cameras and door lockers that the security team wants to deploy. Then we leverage the concept of a universal profile which is part of our UA technology. With this technology, we forces every single devices to be authorized before they can connect to the network. Once they are authorized, which could be as simple as using a MAC address or using 802.1X authentication, then they are classified and put into a certain profile. In the profile we have information that defines in which container this device is going to participate, what quality of service it is going to be applied, and what level of security. In other words, we associate a device with a virtual environment. In our particular example, the manufacturing container would have specific policies, restricting the sensors to only interface with the sensor application, and the actuators with the actuator application. Nobody else can access or see these devices or their applications, so it is really protected from all other users in the network. Same concept applies to the security network. The door lockers cannot be accessed by anybody outside of security and nobody in the security team can have access to the actuators in the manufacturing network. This virtual environments really operate as independent separate networks. Again, same concept applies to the office virtual network, where you have the communication and office devices all interconnected and talking to their respective applications.#

IoT ContainmentSPB standardScalableAvailabilityVirtualization (Multitenant)Enabled by one network with simple operations, high reliability and tight security Accessible only by compliant devices Contains only the traffic from the IoT system Provides the quality necessary to run the IoT application successfullyUA with Smart AnalyticsAuto ContainmentAuthenticationRogue traffic preventionIntelligent FabricAuto ChassisAuto TopologySelf healingIoT Container is a secure virtualized network

#

So, in a nutshell, what we call IoT container is really a secure virtualized network which is accessible only by the compliant devices, contains only the traffic from the IoT system, and provides the quality necessary, in terms of latency and prioritization to ensure the IoT application and the IoT devices operate successfully. How we do this? We leverage 3 technologies:

We use SPB which is a standard. It is scalable, provides high availability and uses virtualization. We use iFab which really brings agility and automation to the network by automatically configuring virtual chassis, by setting up automatically the topology, by providing self-healing. And then we use the UA with smart analytics to offer the automatic containment association, the authentication of devices and the ability to detect and prevent rough traffic.

All of this is enabled by one network, with simple operations, high reliability and tight security.#

Simple IoT deploymentIsolated environmentEasy moves, adds & changesMinimal dependencyMaximum uptimeBusiness UnitBenefits for the entire companyIT DepartmentEasy operationsHigh availabilityMulti tenantIoT and MobilityOne network to acquireReduced operational expensesCAPEX/On demandManaged/ DIYCFO/CEO

#

With this solution we just described , we bring benefits to everybody in the company. The Business units can deploy their IoT systems in a very simple way. They have their own isolated environment. It is easy to do moves, adds and changes. They have minimal dependency on IT, and a maximum uptime due to the intrinsic capabilities of SPB.The IT department have their operations simplified. They can manage a single physical network, which is highly available, which supports multi-tenancy, and that has all the elements to facilitate IoT and mobility.And the CFO and CEO are happy because they can acquire fewer equipment, minimizing the investment. They can reduce their operational expenses, because less people in IT are needed. Also, IoT systems bring by themselves, in many cases, operations efficiencies. Companies can acquire this technology either using CAPEX or on a on-demand mode, which is another capability that I advise you to learn more, where you can pay per use. And this could be managed by IT, or even pushed to an independent company offering managed services.

#

Connecting people, applications and thingsAnywhereSimply, Securely and ReliablyFor improved productivity and user satisfactionAlcatel-Lucent Enterprise NetworkThe foundation for Tomorrows Digital Business

#

With this type of solution, ALE sets the network foundation that can support tomorrows digital business. It provides an environment that can connect people, applications and things, anywhere, in a simple, secure and reliable manner. Note that this connectivity can be people to people, application to things, or any other combination. And this brings improved productivity and better user satisfaction, being either to your customers or to your own employees.

#

#

Linkedin.com/company/alcatellucententerprise Twitter.com/ALUEnterprise Facebook.com/ALUEnterpriseYoutube.com/user/enterpriseALUSlideshare.net/Alcatel-Lucent_Enterprise Storify.com/ALUEnterprise

Follow us on:

#

#

enterprise.alcatel-lucent.com

#

#