Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF



Similar documents
Enterasys Data Center Fabric

The Purview Solution Integration With Splunk

Data Center Networking Designing Today s Data Center

ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

Extreme Networks: A SOLUTION WHITE PAPER

Data Center Networking Managing a Virtualized Environment

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Application Visibility and Monitoring >

Convergence: The Foundation for Unified Communications

Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

Cisco Network Analysis Module Software 4.0

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Data Center Network Evolution: Increase the Value of IT in Your Organization

Brocade One Data Center Cloud-Optimized Networks

The Advantages of Cloud Services

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs

Gaining Operational Efficiencies with the Enterasys S-Series

Cisco IOS Flexible NetFlow Technology

How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time

QRadar Security Intelligence Platform Appliances

Building Tomorrow s Data Center Network Today

Secure Networks for Process Control

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Alcatel-Lucent Enterprise Converged Network Solution

Service assurance for communications service providers White paper. Improve service quality and enhance the customer experience.

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Whitepaper Unified Visibility Fabric A New Approach to Visibility

Voice Over IP Performance Assurance

MPLS and NetEnforcer Synergy. Enhancing the control of MPLS-based, enterprise managed services with Allot's NetEnforcer

Is Your Network Ready for VoIP? > White Paper

Central Office Testing of Network Services

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device

Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Switching Solution Creating the foundation for the next-generation data center

E-Guide. Sponsored By:

Data Center Manager (DCM)

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

Virtualizing the SAN with Software Defined Storage Networks

WAN Optimization in MPLS Networks- the Transparency Challenge!

MS Series: VolP Deployment Guide

The Basics. Configuring Campus Switches to Support Voice

Solutions Guide. High Availability IPv6

Application Delivery Testing at 100Gbps and Beyond

VIRTUALIZING THE EDGE

Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Optimizing Data Center Networks for Cloud Computing

Technology Trends in the Current Economic Scenario. A 3Com Presentation, Manoj Kanodia CEO

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

CISCO IOS IP SERVICE LEVEL AGREEMENTS: ASSURE THE DELIVERY OF IP SERVICES AND APPLICATIONS

We are able to increase application response time thus increasing productivity

July, Figure 1. Intuitive, user-friendly web-based (HTML) interface.

Simplifying Data Center Network Architecture: Collapsing the Tiers

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center

Cisco Prime Network Analysis Module Software 5.1 for WAAS VB

Data Center Evolution without Revolution

SummitStack in the Data Center

SDN Software Defined Networks

Enterprise. Application Performance Optimization Services Boosting your application performance by optimizing network resources

Delivering Managed Services Using Next Generation Branch Architectures

Virtualized Network Services SDN solution for enterprises

Virtual CPE and Software Defined Networking

Hosted PBX Platform-asa-Service. Offering

Deliver Fabric-Based Infrastructure for Virtualization and Cloud Computing

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Visibility in the Modern Data Center // Solution Overview

When SDN meets Mobility

Avaya ExpertNet Lite Assessment Tool

Global Headquarters: 5 Speen Street Framingham, MA USA P F

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

convergence: preparing the enterprise network

Extreme Networks Purview Application Analytics Integration with VMware vrealize Log Insight

Technical Brief: Introducing the Brocade Data Center Fabric

NEC s Juniper Technology Brief Issue 2

Boosting Business Agility through Software-defined Networking

Realizing the True Potential of Software-Defined Storage

The term Virtual Private Networks comes with a simple three-letter acronym VPN

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Introduction. The Inherent Unpredictability of IP Networks # $# #

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Transcription:

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their usage and response times in the network infrastructure MORE GRANULAR CONTROL Network-based policy enforcement on the application layer rather than on the transport layer BETTER SERVICE LEVEL Guaranteed bandwidth and minimum delay for sensitive applications REDUCED TCO Longer product lifecycles with flexible CoreFlow2 technology Adoption of new standards via software upgrades rather than expensive and downtime intensive hardware swaps Introduction Most network infrastructure components that are deployed today do not provide data to control or monitor applications. Networks are typically implemented in such a way that all services and all applications are given equal priority or with only very basic prioritization schemes. With the increasing use of virtualization, SOA architectures, cloud computing and continued network convergence, this typical scenario cannot meet today s requirements. This affects both access networks and data center fabrics. In each area of the network it becomes more critical to properly identify applications to ensure availability by monitoring and enforcing controls. This goal cannot be achieved just by examining traffic at the transport layer. A second challenge is that traditional network management does not provide granular visibility down to end-systems, users and applications. The IT management landscape is very fragmented today. A consolidation of tools must occur. This fragmentation combined with the lack of application visibility makes it difficult to troubleshoot problems that cross borders between various technologies and departments within the enterprise. There are also evolutionary changes throughout the various components of the data center, including server, storage and network virtualization. New standards are gaining traction to address the needs of the new data center fabric. In a recent Information Week Data Center Networking IT Pro Ranking, 65% of respondents said they are planning to re-architect their data center network in the next 24 months. The convergence of new standards and data center upgrades poses a challenge to data center architects. Will the solutions you are reviewing today support these new standards or will they require expensive upgrades? This paper highlights the unique advantages of the Extreme Networks CoreFlow2 technology that address the challenges associated with application visibility & control. We will also provide you with a vision toward developing standards, their effect and their anticipated adoption. Use Cases Enabled by Coreflow2 Customers want more from their network solutions. Applications in the data center are more demanding of the network, and users expect more from IT each day. CoreFlow2 enables IT administrators with greater visibility into critical business applications by using information deep in the data layer of the packet. With this instrumentation, CoreFlow2 enables better controls to meet the SLAs the business demands. Other vendors products are limited to TCP or UDP ports, greatly reducing visibility and control of applications. Examples of some use cases enabled by CoreFlow2 include*: SAN Enable access control for iscsi targets (Fig. 1) with granularity to the initiator Bandwidth usage monitoring per iscsi target CoreFlow2 Technology Technology Strategy Brief 2

IP Voice & Video Enable QoS and access control for RTP media streams and control data Cloud Enable role-based access controls for cloud services such as www.salesforce.com Bandwidth monitoring for specific sites such as www.youtube.com * Implementation details per product category are subject to the development roadmap. Please refer to the product datasheet and release notes for details Expanded visibility will soon be realized in a subsequent release of Extreme Networks Network Management Suite (NMS). NMS will aggregate the native unsampled NetFlow records generated by CoreFlow2 powered devices to provide application-level visibility across the network. Select Extreme Networks products will also support application response time measurement probes distributed throughout the network infrastructure. This will further enable the IT administrator to monitor application response times in their network to meet SLAs, deliver higher application availability and enable more efficient troubleshooting. Figure 1: Extreme Networks CoreFlow2 improves application performance with greater visibility into packet flows CoreFlow2 Technology CoreFlow2 is the cornerstone of Extreme Networks switching technology addressing the need for application monitoring and control. CoreFlow2 is a highly programmable custom designed ASIC which delivers flexibility in packet classification and reframing not found in competitive offerings. The granularity of packet analysis and controls is unsurpassed, and it translates into real-world benefits in the data center. CoreFlow2 Technology Technology Strategy Brief 3

Existing network systems treat the network as a collection of TCP and UDP ports, not applications. A common problem today is differentiating traffic on port 80. Commonly associated with web traffic, it is now used by many cloud applications. IT managers need a solution that can focus on the applications and systems that drive the business. The CoreFlow2 ASIC is a key enabler of such a solution. CoreFlow2 looks beyond TCP and UDP ports. The deep packet classification engine enables the switches and routers to differentiate what type of traffic is using port 80 to apply more granular controls for access control and quality of service. A network infrastructure built on CoreFlow2: Automatically classifies and enforces application traffic at line rate providing differentiated access for cloud applications from web surfing Scales to an unmatched 64 million flows and more than 1 Terabits per system providing the granularity and scale for today s network cores and tomorrow s data centers Enables an easy upgrade path to various new standards without a disruptive and costly hardware upgrade a cornerstone for an overall lower TCO than comparable products Future-Proofed Design Enterprises today are faced with the prospect of making rip and replace network decisions based upon which future-looking data center standards they want to support. CoreFlow2 is designed with the flexibility to support new standards (via simple software upgrades) as they develop, thereby providing true investment protection. CoreFlow2 is supported on key data center fabric, distribution and core router products offered by Extreme Networks. It will also be leveraged in future high end access switch families. Several important new standards (though, by no means, an exhaustive list) that can be supported through software upgrades include: IEEE 802.1q Shortest Path Bridging IEEE 802.1ah Provider Backbone Bridges IEEE Virtual Ethernet Port Aggregator (VEPA) IEEE 802.1ad Provider Bridges Management of CoreFlow2 Application Controls Network administrators are presented with a number of disparate network management tools that do not adequately provide them visibility into application traffic and performance. Extreme Networks Network Management Suite (NMS), along with the integrated role based access control, management is the key which unlocks granular network control. Released in 2001, it was the first policybased network management solution in the industry which controls access and enforces rules at the edge of the network. Today, more than 10 million switch ports and access points supporting this technology have been successfully deployed into thousands of customer networks. Extreme Networks NMS enables the enforcement of quality of service (QoS), bandwidth control, VLAN and access control rules from layer-2 to layer-4. With CoreFlow2, this enforcement will be extended beyond end-system policies and extended policies into layer-7 to enable application-level classification & control, allowing for granular control and visibility into network traffic. CoreFlow2 Technology Technology Strategy Brief 4

Automated Visibility & Control (i.e.- policies) Application Policies Extended Policies End-System Policies Port Policies Figure 2: Evolution of Network Policies Extreme Networks NMS leveraging NAC allows the administrator to dynamically assign roles to end systems and users based on multiple attributes such as authenticated identity (of both users and devices), security posture, device type, location, time and more. Extreme Networks NMS enables the collection of performance data so it intelligently merges network, topology, end-system, user and application data into a single management application for unmatched visibility and control of the infrastructure. Conclusion CoreFlow2 is a truly unique differentiator of Extreme Networks products. The technology encapsulates more than 15 years of advanced research & development. It provides industry leading application visibility and control at terabit speeds, investment protection and future proofing through its programmable nature, yielding both technical and business benefits to our customers. With CoreFlow2, customers are able to increase the reliability of application delivery and application control beyond what is possible today while reducing the TCO of the network infrastructure. http://www.extremenetworks.com/contact Phone +1 408 579 2800 2014 Extreme Networks, Inc. All rights reserved. Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names are the property of their respective owners. For additional information on Extreme Networks Trademarks please see http://www.extremenetworks.com/company/legal/trademarks/. Specifications and product availability are subject to change without notice. 0548-0114 WWW.EXTREMENETWORKS.COM CoreFlow2 Technology Technology Strategy Brief 5