Upload
marketingarrowecscz
View
214
Download
0
Embed Size (px)
Citation preview
Uwe RichterDirector Systems Engineering–Turkey / Israel /Swiss / Austria / CEE /
TECHNOLOGY INNOVATION THAT MATTERS –Praha 25th May 2016
NETWORKS ARE COMMODITIES
WATER PLUMBING 1991 WATER PLUMBING 2016
OH, REALLY? HANG ON ….
NETWORK PLUMBING 1991100Mbps SUN Sbus FDDI interface
NETWORK PLUMBING 2016100Gbps Juniper PTX Core router interface
1000 times capacity increase in only 25 yearsNetworking == Continuous innovation
QUESTION If demand for water would have followedthe demand for Internet bandwidth in the past 25 years…
What would be the diameter of of a water plumbing pipe today ?
1991 – 0,002 petabyte/month1991 - Diameter of water pipe 2,54 cm
WHAT DOES THIS MEAN FOR VENDORS ?
201140nm4 chips15W/10GE
7.3Bn Transistors3.4Tbps IO
DDR3 SDRAM
200965nm4 chips26W/10GE
1.2Bn Transistors604Gbps IORLDRAM/DDR3
SDRAM
201528nm2 chips7W/10GE
12Bn Transistors6.8Tbps IOHMC SDRAM
201716nm1 chip
3.5W/10GE20Bn Transistors13Tbps IOHMC SDRAM
Megatrend #1
EVERYTHING SHIFTING
TO THE CLOUD
AS WE SPEAK……
DISRUPTION AT WORK…
WHAT DO SOME OF THE CLOUD DISRUPTORS HAVE IN COMMON ?
DEMAND1.000.000’sof consumers and customers
SUPPLY1.000.000’sof suppliers
Connect Demand and SupplyIn Cloud time
Fast, Simple, Efficient and Effective
MODERN NETWORKSSUPER HIGH WAYS CONNECTINGSUPPLY AND DEMAND
IN “CLOUD TIME”
REQUIRES CONTINUOUS INNOVATION TO KEEP UP WITH BANDWIDTH EXPLOSION, BIG DATA, VIDEO CONTENT, MORE SUBSCRIBERS, IOT
2011 2016
5.3ZB 22ZB
2.1B 3.3B
5B 14B
2011
Megatrend #2
SECURITY
SECURITY HAS DIFFERENT ASPECTS
Beograd HotelJune 2015
300 USB SticksUniversity IllinoisMay 2015
Central BankBangladeshJan 2016
SOFTWARE-DEFINED SECURE NETWORKS
Today’s layered security model (based on perimeter security) is not enough to protect against new sophisticated threats and the increasing surface area of possible attacks.SDSN is the future of network security by embracing SDN by leveraging the cloud to solve current network security issues more effectively. SDSN evolves the old guard security mindset around policy, detection, and enforcement. The main components include:1. Leveraging the network as points of threat detection and
enforcement. 2. Leveraging the economy of cloud to share threat intelligence at
scale to accelerate and adapt detection.3. Implementing a centralized controller/policy engine to dynamically
adapt policy that stays ahead of constantly evolving threats and attacks.
The Software Defined Secure Networks
Megatrend #3
AUTOMATION
QUO VADIS – COMMUNICATIONS ?
SO, WHAT IS A “THING” ?
• So, what is a “thing “ ?
How do you secure devices like these?How do you know if they are on your network?
What operating system do they run?
AUTOMATIONAND ORCHESTRATION : THE ASSEMBLY LINE IN NETWORKS AND DATACENTERS
Virtualization
Automation
Orchestration
Virtualize what you can virtualizeReplicate, scale up and down in Cloud time
Automate repetitive and time consuming tasksSpeed up deployment,test and validation, ZTPAnalytics
Orchestrate tasks and workflowsOrchestrate compute, storage, Workloads, Network and SecurityFunctions in cloud time
High Performance network underlay, Open, Scalable, Performance, Secure by designAnd collaborative for automation and virtualization
18
CONCLUSION• Continuous Innovation sets the stage for new ideas we can’t even think of today.
• Security all over – new concepts are required.• Doing things in Cloud time means Virtualization, Automation and Orchestration.
• Massive scale is key for the internet of things. No way without Automation !
• Embrace - don’t Resist. Old wine in new pipes isn’t good.
19