SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Multi-Rate1,2.5,5,10GigabitEdgePoE++
Multi-RateSpineLeafDesign(10,25,40,50,100Gigabit)
X440-G2 (L3 - Value 1G to 10G)
PoE
Fiber
DC
Policy
 SummitStack-V (WITHOUT any
additional license required).
 Upgradeable 10GbE (PN 16542 or 16543).
 Policy built-in (simplicity with multi-auth).
EXOS 21.1 or
higher
Value with Automation
First Extreme
Switch to support
Cloud Value
X460-G2 (Advanced L3 1-40G) Multirate Option
PoE
Fiber
DC
Policy
Fit The Swiss Army Knife of Switches
Half Duplex
½ & ½
3 Models
This is where: 10G on
existing copper Cat5e
and Cat6 extend the
life of the installed
cable plant. Great for
1:N Convergence.
X620 (1OG Copper or Fiber)
Speed Next Gen Edge
Lowered TCO via
Limited Lifetime Warrantee
Wallplate AP
AP + Camera
Outdoor Wave 2
Multi-Gigabit
Wireless
High Density
-pack or Wedge
Facebook
ExtremeSupport
XoS
Platform
Config L2/L3
Analytics
Any OS
Any Bare Metal Switch
Policy
Disaggregated Switch
CAPEX or OPEX (you choose)?
Reduced Risk (just witness or take action)
Time is the critical Factor with XYZ Account Services...
Infrastructure
Businessmodel
Ownership
Considerations
Management
Location
 32 x 100Gb
 64 x 50Gb
 128 x 25Gb
 128 x 10Gb
 32 x 40Gb
96 x 10GbE Ports
(via4x10Gb breakout)
8 x 10/25/40/
50/100G
10G
Next Gen: Spine Leaf
X670 & X770 - Hyper Ethernet
Common Features
 Data Center Bridging (DCB) features
 Low ~600 nsec chipset latency in cut through mode.
 Same PSUs and Fans as X670s (Front to back or Back to
Front) AC or DC.
X670-G2 -72X (10GbE Spine Leaf) 72 10GbE
X670-48x-4q (10GbE Spine Leaf) 48 10GbE & 4 QSFP+
QSFP+
40G DAC
Extreme Feature Packs
Core
Edge
AVB
OpenFlow
Advance
Edge
1588 PTP
MPLS
Direct Attach
Optics License
Extreme Switches
include the license
they normally need.
Like any other
software platform
you have an
upgrade path.
QSPF28
100G DAC
Thin & Crunchy
XoS Platform with one track of software.
Speed with Features (Simple).
Metro Functionality like ATM or SONET
Flexible Horizontal or Vertical stacking
Purposed for Broadcom
(ASICs)
So What, Who cares?
Deliver XYZ Account, the
value of HP with the feature
function of Cisco.
XYZ Account Business Value
WhyExtreme?
Summit
Summit
Policy delivers automation..
Thick & Chewy
Know and control
the who, what, when, where and the user
experience across your XYZ Account
Network.
Control with insight...
WhyEnterasys?
XYZ Account Strategic Asset
Custom ASICs
S & K Series
Chantry
Motorola
Air
Defense
So What, Who cares?
Flow Based Switching
Simplicity w Policy
Wired and Wireless
100% insourced support
Today you get both
Control
So What, Who cares?
Fit
Speed
Unique
Value
Unique
Control
Summit G2
Yesterday - Cabletron Changed the game w Structured wiring
(remember Vampire taps, Coax ethernet ect.)
Today - Extreme Delivers Structured networking
Policy
Summit
Who?
Where?
When?
Whatdevice?
How?
QuarantineRemediate
Allow
Authentication
NAC Server
Summit
Netsite
Advanced
NAC Client
Joe Smith
XYZ Account
Access
Controlled
Subnet
Enforcement
Point
Network
Access
Control
This is where
if X + Y, then Z...
 LLDP-MED
 CDPv2
 ELRP
 ZTP
If user
matches a
defined
attribute
value
ACL
QoS
Then place
user into a
defined ROLE
A port is what it is because?This is where you easily Identify
the impact and Source of
Interference Problems.
Detailed Forensic Analysis
 Device, Threats, Associations,
Traffic, Signal and Location
Trends
 Record of Wireless Issues
Network Trend Analysis
 Historical Analysis of
Intermittent Wireless
Problems
 Performance Trends a
Spectrum Analysis for
Interference Detection
 Real-time Spectrograms
 Proactive Detection of
Application Impacting
Interference
Visualize RF Coverage
 Real-time RF Visualizations
 Proactive Monitoring and
Alerting of Coverage Problem
ADSP for faster Root Cause Forensic
Analysis for SECURITY & COMPLIANCE.
Event
Sequence
Classify
Interference
Sources
Side-by-side
Comparative
Analysis
Air Defense
Application
Experience
FullContext
App
App
Analytics
App
Stop the
finger-pointing
Application Network Response.
Flow or Bit
Bucket
Collector
3 million Flows
Sensors
X460 IPFix 4000 Flows
(2048 ingress, 2048 egress)
Sensor PV-FC-180, S or K Series (Core
Flow 2/ 1 Million Flows)
Flow-based Access Points
From the controller (8K Flows
per AP or C35 is 24K Flows)
Flows
Why not do this in the
network?
10110111011101110 101101110111011101
6 million Flows
Business Value
Context BW IP HTTP:// Apps
Platform Automation Control Experience Solution Framework
Is your network faster today than
it was 3 years ago? Going forward
it should deliver more, faster,
different
X430-G2 (L2 - 1G to 10G)
PoE
Distribute content
from a single source
to hundreds of displays
Ethernet as a Utility
(PoE)
Injectors
Up to 75
Watts
XYZ AccountXYZ Account
XYZ Account Network services delivering Converged Plant
wide Ethernet Architectures for manufacturing and
industrial environments
 Physical Security - limit physical access to authorized
personnel: areas, control panels, devices, cabling, and
control room - escort and track visitors.
 End-point Hardening - patch management, antivirus
software as well as removal of unused applications,
protocols, and services (IP or MAC-based Access
Control).
 Device Hardening - change management and
restrictive access (IEEE802.1x Access Control, RADIUS
and TACACS+).
Hardened Ethernet
4- 1G SFP
8- 10/100/1000 RJ-45
POE+
12 Port Switch
240 Watt PoE Budget
All Ports Active Simultaneously
-20 to + 70°C temperature range
Fan-less Free Air Convection
XYZ Account Network services delivering Converged Plant
wide Ethernet Architectures for manufacturing and
industrial environments
 Physical Security - limit physical access to authorized
personnel: areas, control panels, devices, cabling, and
control room - escort and track visitors.
 End-point Hardening - patch management, antivirus
software as well as removal of unused applications,
protocols, and services (IP or MAC-based Access
Control).
 Device Hardening - change management and
restrictive access (IEEE802.1x Access Control, RADIUS
and TACACS+).
Hardened Ethernet
4- 1G SFP
8- 10/100/1000 RJ-45
POE+
12 Port Switch
240 Watt PoE Budget
All Ports Active Simultaneously
-20 to + 70°C temperature range
Fan-less Free Air Convection
Old School Manufacturing Net (MAP)
Token bus was standardized by IEEE
standard 802.4. It was mainly used for
industrial applications.
 Token bus was used by General
Motors for their Manufacturing
Automation Protocol (MAP).
 This is an application of the
concepts used in token ring networks.
The main difference is that the
endpoints of the bus do not meet to
form a physical ring.
 The IEEE 802.4 Working Group is
disbanded and the standard has
been withdrawn by the IEEE.
Old School Manufacturing Net (MAP)
Token bus was standardized by IEEE
standard 802.4. It was mainly used for
industrial applications.
 Token bus was used by General
Motors for their Manufacturing
Automation Protocol (MAP).
 This is an application of the
concepts used in token ring networks.
The main difference is that the
endpoints of the bus do not meet to
form a physical ring.
 The IEEE 802.4 Working Group is
disbanded and the standard has
been withdrawn by the IEEE.
Networking Technologies in Manufacturing
The US market is dominated by the CIP
networks where Ethernet/IP is overtaking
Device Net in terms of market shares.
Runners-up are PROFIBUS and Ether CAT
 Fieldbuses most widely used type of
network with 66% of the market.
Industrial Ethernet networks - 34%
 Machine-to-machine (M2M) — essential
for smart factories and the largest
value driver for manufacturers.
 Embracing the Internet of Everything
to Capture Your Share of $14.4 Trillion,
Cisco white paper, February 2013.
– HMS Industrial Networks
Networking Technologies in Manufacturing
The US market is dominated by the CIP
networks where Ethernet/IP is overtaking
Device Net in terms of market shares.
Runners-up are PROFIBUS and Ether CAT
 Fieldbuses most widely used type of
network with 66% of the market.
Industrial Ethernet networks - 34%
 Machine-to-machine (M2M) — essential
for smart factories and the largest
value driver for manufacturers.
 Embracing the Internet of Everything
to Capture Your Share of $14.4 Trillion,
Cisco white paper, February 2013.
– HMS Industrial Networks
Automation on the Factory Floor
This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts
as the technology enabler for the convergence of industrial and enterprise networks.
 KPIs - By gaining timely access to key performance indicators (KPIs) make business
decisions from real time information.
 Ethernet-to-the-Factory, provide users with the foundation for success to deploy
the latest technology.
 Recognize - There are cultural and technical challenges to network convergence.
Automation on the Factory Floor
This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts
as the technology enabler for the convergence of industrial and enterprise networks.
 KPIs - By gaining timely access to key performance indicators (KPIs) make business
decisions from real time information.
 Ethernet-to-the-Factory, provide users with the foundation for success to deploy
the latest technology.
 Recognize - There are cultural and technical challenges to network convergence.
SCADA / PLCs (Plant Floor Challenges)
Where is SCADA used? When you move from a 3 tier
network - Device / Control / Info network – to
converged network – there are many variables
 When moving to a plant-wide Ethernet network,
more considerations (ie. Isolate or Segment
traffic – security, QOS Contain traffic in one
area).
 Sustaining Availability (keep the automation
and control systems operational) and Integrity -
protects data and systems from intentional or
accidental alteration.
 Customer Examples include Water and
Wastewater, Power, Oil and Gas, Research
facilities, Transportation, Security systems, Siren
systems, Irrigation, Communication control
SCADA / PLCs (Plant Floor Challenges)
Where is SCADA used? When you move from a 3 tier
network - Device / Control / Info network – to
converged network – there are many variables
 When moving to a plant-wide Ethernet network,
more considerations (ie. Isolate or Segment
traffic – security, QOS Contain traffic in one
area).
 Sustaining Availability (keep the automation
and control systems operational) and Integrity -
protects data and systems from intentional or
accidental alteration.
 Customer Examples include Water and
Wastewater, Power, Oil and Gas, Research
facilities, Transportation, Security systems, Siren
systems, Irrigation, Communication control
Manufacturing Technology Vendors
Adoption of standards-based technologies that eliminate
the need to support separate, closed, factory floor-
networks plus delivers an increase in plant flexibility and
accelerate moves, adds, and changes
 Schneider Electric, ABB, Legrand, Omron, Siemens,
Eaton, Cisco/Rockwell.
 Schneider Electric/Invensys is Extreme s biggest
customer in this vertical
 Extreme provides switches to Schneider for their
internal networks, and they bundle our switches for
them to OEM in their PLC (Programmable Logic
Controller) offerings to sell through distribution to their
integrators
Manufacturing Technology Vendors
Adoption of standards-based technologies that eliminate
the need to support separate, closed, factory floor-
networks plus delivers an increase in plant flexibility and
accelerate moves, adds, and changes
 Schneider Electric, ABB, Legrand, Omron, Siemens,
Eaton, Cisco/Rockwell.
 Schneider Electric/Invensys is Extreme s biggest
customer in this vertical
 Extreme provides switches to Schneider for their
internal networks, and they bundle our switches for
them to OEM in their PLC (Programmable Logic
Controller) offerings to sell through distribution to their
integrators
This is where, XYZ Account can segmenting plant floor networks from company wide
networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate
the network level between the Industrial and Enterprise Zones.
 Extreme automated security policy for helping secure manufacturing assets.
 IAM for defense-in-depth security approach that addresses internal security
threats with support for both wired and wireless access methods.
 Availability with 50 ms failover through Ethernet Rings with QoS buckets needs
to be applied as a service Ethernet like a MUX
Industrial Demilitarized Zone (IDMZ)
B
D E
C
A
B
D E
C
A
X
Spanning Tree Root Node
Or EAPS Master
FAILURE
B
D E
C
A
B
D E
C
A
B
D E
C
A
Spanning Tree Re-
Convergence Messages
 Complex & Slow
 Exponentially worse as more
nodes added
Recovered
Network
Healthy
Network
EAPS Re-
Convergence Messages
 Deterministic & Fast
 Simple scaling as more nodes
added
Failure
Re-convergence
Recovery
EAPS:
Simpler,
faster
Ethernet Rings
(without STP) SONET like
Ethernet Bus
Looks like
DMZ
VOIP
Guest
WiFi
VoIP
DMZ
WiFi
Guest
Guest
WiFi
VoIP
Guest
WiFi
VoIP
WiFi
VoIP
IP or MAC
IP or MAC
IP or MAC
IP or MAC
This is where, XYZ Account can segmenting plant floor networks from company wide
networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate
the network level between the Industrial and Enterprise Zones.
 Extreme automated security policy for helping secure manufacturing assets.
 IAM for defense-in-depth security approach that addresses internal security
threats with support for both wired and wireless access methods.
 Availability with 50 ms failover through Ethernet Rings with QoS buckets needs
to be applied as a service Ethernet like a MUX
Industrial Demilitarized Zone (IDMZ)
B
D E
C
A
B
D E
C
A
X
Spanning Tree Root Node
Or EAPS Master
FAILURE
B
D E
C
A
B
D E
C
A
B
D E
C
A
Spanning Tree Re-
Convergence Messages
 Complex & Slow
 Exponentially worse as more
nodes added
Recovered
Network
Healthy
Network
EAPS Re-
Convergence Messages
 Deterministic & Fast
 Simple scaling as more nodes
added
Failure
Re-convergence
Recovery
EAPS:
Simpler,
faster
Ethernet Rings
(without STP) SONET like
Ethernet Bus
Looks like
DMZ
VOIP
Guest
WiFi
VoIP
DMZ
WiFi
Guest
Guest
WiFi
VoIP
Guest
WiFi
VoIP
WiFi
VoIP
IP or MAC
IP or MAC
IP or MAC
IP or MAC
Multi-discipline Industrial Network Convergence.
Ethernet with ATM like QoS delivers toll-
quality voice even under adverse congestion
conditions...
 low latency (.1ms),
 low jitter (.01ms)
 zero packet loss
Disparate V Single Technology
Vertically To Horizontally
VoiceVideo
Sensor
PlantSiteNetwork
I/ONetwork
SafetyNetwork
DriveNetwork
Switching & Routing
Enhanced Services
Performance w features turned on.
L2 SONET Like convergence
Multi-discipline Industrial Network Convergence.
Ethernet with ATM like QoS delivers toll-
quality voice even under adverse congestion
conditions...
 low latency (.1ms),
 low jitter (.01ms)
 zero packet loss
Disparate V Single Technology
Vertically To Horizontally
VoiceVideo
Sensor
PlantSiteNetwork
I/ONetwork
SafetyNetwork
DriveNetwork
Switching & Routing
Enhanced Services
Performance w features turned on.
L2 SONET Like convergence
Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588
precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded
switch technology - Transparent Clock - Ring and Linear topologies
 Real-time updates and alerts & Schedule/event triggers
 Interactive venue maps & Point of interest filters
 Wayfinding or Guest location discovery
1588 precision time protocol (PTP):
BEACONS
WI-FI
GPS
Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588
precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded
switch technology - Transparent Clock - Ring and Linear topologies
 Real-time updates and alerts & Schedule/event triggers
 Interactive venue maps & Point of interest filters
 Wayfinding or Guest location discovery
1588 precision time protocol (PTP):
BEACONS
WI-FI
GPS
In a plant, it is not just about data...
Extreme becomes an enabler with open secure
Infrastructure with integrated control and
information. Industrial Networks Needs
 Better asset utilization - lean initiatives
(training, support, and inventory)Capture &
Record every application flow network-wide
>100M Sessions (Quickly Identify Network vs.
Application Performance Problems).
 One Common network through converged
Extreme technologies (information sharing,
common design).
 Mobility - Measure and Trend Application
Behavior to maximize investments and
minimize risks
Status
updates from
the cloud
Everything
has a URL
Cameras
Energy Control
Sensors
Zero Config
Mobility
Automated
alerts
In a plant, it is not just about data...
Extreme becomes an enabler with open secure
Infrastructure with integrated control and
information. Industrial Networks Needs
 Better asset utilization - lean initiatives
(training, support, and inventory)Capture &
Record every application flow network-wide
>100M Sessions (Quickly Identify Network vs.
Application Performance Problems).
 One Common network through converged
Extreme technologies (information sharing,
common design).
 Mobility - Measure and Trend Application
Behavior to maximize investments and
minimize risks
Status
updates from
the cloud
Everything
has a URL
Cameras
Energy Control
Sensors
Zero Config
Mobility
Automated
alerts
XYZ Account Network services delivering Converged Plant
wide Ethernet Architectures for manufacturing and
industrial environments
 Physical Security - limit physical access to authorized
personnel: areas, control panels, devices, cabling, and
control room - escort and track visitors.
 End-point Hardening - patch management, antivirus
software as well as removal of unused applications,
protocols, and services (IP or MAC-based Access
Control).
 Device Hardening - change management and
restrictive access (IEEE802.1x Access Control, RADIUS
and TACACS+).
Hardened Ethernet
4- 1G SFP
8- 10/100/1000 RJ-45
POE+
12 Port Switch
240 Watt PoE Budget
All Ports Active Simultaneously
-20 to + 70°C temperature range
Fan-less Free Air Convection
Old School Manufacturing Net (MAP)
Token bus was standardized by IEEE
standard 802.4. It was mainly used for
industrial applications.
 Token bus was used by General
Motors for their Manufacturing
Automation Protocol (MAP).
 This is an application of the
concepts used in token ring networks.
The main difference is that the
endpoints of the bus do not meet to
form a physical ring.
 The IEEE 802.4 Working Group is
disbanded and the standard has
been withdrawn by the IEEE.
Networking Technologies in Manufacturing
The US market is dominated by the CIP
networks where Ethernet/IP is overtaking
Device Net in terms of market shares.
Runners-up are PROFIBUS and Ether CAT
 Fieldbuses most widely used type of
network with 66% of the market.
Industrial Ethernet networks - 34%
 Machine-to-machine (M2M) — essential
for smart factories and the largest
value driver for manufacturers.
 Embracing the Internet of Everything
to Capture Your Share of $14.4 Trillion,
Cisco white paper, February 2013.
– HMS Industrial Networks
Automation on the Factory Floor
This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts
as the technology enabler for the convergence of industrial and enterprise networks.
 KPIs - By gaining timely access to key performance indicators (KPIs) make business
decisions from real time information.
 Ethernet-to-the-Factory, provide users with the foundation for success to deploy
the latest technology.
 Recognize - There are cultural and technical challenges to network convergence.
SCADA / PLCs (Plant Floor Challenges)
Where is SCADA used? When you move from a 3 tier
network - Device / Control / Info network – to
converged network – there are many variables
 When moving to a plant-wide Ethernet network,
more considerations (ie. Isolate or Segment
traffic – security, QOS Contain traffic in one
area).
 Sustaining Availability (keep the automation
and control systems operational) and Integrity -
protects data and systems from intentional or
accidental alteration.
 Customer Examples include Water and
Wastewater, Power, Oil and Gas, Research
facilities, Transportation, Security systems, Siren
systems, Irrigation, Communication control
Manufacturing Technology Vendors
Adoption of standards-based technologies that eliminate
the need to support separate, closed, factory floor-
networks plus delivers an increase in plant flexibility and
accelerate moves, adds, and changes
 Schneider Electric, ABB, Legrand, Omron, Siemens,
Eaton, Cisco/Rockwell.
 Schneider Electric/Invensys is Extreme s biggest
customer in this vertical
 Extreme provides switches to Schneider for their
internal networks, and they bundle our switches for
them to OEM in their PLC (Programmable Logic
Controller) offerings to sell through distribution to their
integrators
This is where, XYZ Account can segmenting plant floor networks from company wide
networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate
the network level between the Industrial and Enterprise Zones.
 Extreme automated security policy for helping secure manufacturing assets.
 IAM for defense-in-depth security approach that addresses internal security
threats with support for both wired and wireless access methods.
 Availability with 50 ms failover through Ethernet Rings with QoS buckets needs
to be applied as a service Ethernet like a MUX
Industrial Demilitarized Zone (IDMZ)
B
D E
C
A
B
D E
C
A
X
Spanning Tree Root Node
Or EAPS Master
FAILURE
B
D E
C
A
B
D E
C
A
B
D E
C
A
Spanning Tree Re-
Convergence Messages
 Complex & Slow
 Exponentially worse as more
nodes added
Recovered
Network
Healthy
Network
EAPS Re-
Convergence Messages
 Deterministic & Fast
 Simple scaling as more nodes
added
Failure
Re-convergence
Recovery
EAPS:
Simpler,
faster
Ethernet Rings
(without STP) SONET like
Ethernet Bus
Looks like
DMZ
VOIP
Guest
WiFi
VoIP
DMZ
WiFi
Guest
Guest
WiFi
VoIP
Guest
WiFi
VoIP
WiFi
VoIP
IP or MAC
IP or MAC
IP or MAC
IP or MAC
Multi-discipline Industrial Network Convergence.
Ethernet with ATM like QoS delivers toll-
quality voice even under adverse congestion
conditions...
 low latency (.1ms),
 low jitter (.01ms)
 zero packet loss
Disparate V Single Technology
Vertically To Horizontally
VoiceVideo
Sensor
PlantSiteNetwork
I/ONetwork
SafetyNetwork
DriveNetwork
Switching & Routing
Enhanced Services
Performance w features turned on.
L2 SONET Like convergence
Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588
precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded
switch technology - Transparent Clock - Ring and Linear topologies
 Real-time updates and alerts & Schedule/event triggers
 Interactive venue maps & Point of interest filters
 Wayfinding or Guest location discovery
1588 precision time protocol (PTP):
BEACONS
WI-FI
GPS
In a plant, it is not just about data...
Extreme becomes an enabler with open secure
Infrastructure with integrated control and
information. Industrial Networks Needs
 Better asset utilization - lean initiatives
(training, support, and inventory)Capture &
Record every application flow network-wide
>100M Sessions (Quickly Identify Network vs.
Application Performance Problems).
 One Common network through converged
Extreme technologies (information sharing,
common design).
 Mobility - Measure and Trend Application
Behavior to maximize investments and
minimize risks
Status
updates from
the cloud
Everything
has a URL
Cameras
Energy Control
Sensors
Zero Config
Mobility
Automated
alerts
Heading
XYZ Account 2016 DesignExtremeEdgePoE
ExtremeCore10G
2016 Design
1G 2.5G/5G 10G 40G
Jeff Green
2016
Rev. 1
Florida
Legend
Legend
PoE
802.3at (PoE+)
Cat5e
30W
30W30W
60W
UPOE
No Cabling Change from PoE+
Cat5e
NBASE-T Alliance Copper Max Distances
Cat 7 Shielded 100 m
Cat 6a Shielded 100 m
Cat 6a Unshielded 100 m
Cat 6 Shielded** 100 m
Cat 6 Unshielded** 55 m
Need Correct
UTP, Patch Panel
and Adapter.
known as IEEE 802.3bz
Greenfield - Cat 6a (2.5, 5G & 10G) 100m
Cat 6 (2.5G, 5G & 10G) 55m
Brownfield - Cat 5e (2.5&5G) 100M
Requires X620 or
X460 Switch for
Multi-rate Support
plus Client that
supports Multi-rate.
10G Passive (PN 10306 ~ 5m, 10307~ 10M)
10G SFP+ Active copper cable (upto 100m)
40G Passive (PN 10321 ~3m, 10323~ 5m)
40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m)
40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4-
F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, )
10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m)
SFP+ DAC Cables
QSFP+ DAC Cables
10 LRM 220m (720ft/plus mode conditioning) (PN 10303)
10GBASE-T over Class E Cat 6 (55M) (10G)
10GBASE-T over Class E Cat 6a or 7 (100M) (10G)
10 SR over OM3 (300M) or OM4 (400M) (PN 10301)
10 LR over single mode (10KM) 1310nm (PN 10302)
10 ER over single mode (40KM) 1550nm (PN 10309)
10 ZR over single mode (80KM) 1550nm (PN 10310)
802.3bz 10GBASE-T (100M) for Cat 6 (5G)
10G Fiber
10G Copper
802.3bz 10GBASE-T (100M) for Cat 5e (2.5G)
OM3 50 µm (550m/SX) Laser, LC (PN 10051H)
OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H)
OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H)
OM4 50 µm (550m/SX) 2Km, LC (PN 10051H)
1G Fiber (50 µm)
1G Fiber (62.5 µm)
Single-fiber
transmission uses
only one strand of
fiber for both
transmit and
receive (1310nm
and 1490nm for
1Gbps; 1310nm and
1550nm for
100Mbps)
LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H)
ZX SMF 70km, LC (PN 10053H)
10/100/1000 (UTP to 100m) SFP (PN 1070H)
SR4 at least 100 m OM3 MMF (PN 10319)
SR4 at least 125 m OM4 MMF (PN 10319)
LR4 at least 10 km SMF, LC (PN 10320)
LM4 140m MMF or 1kM SMF, LC (PN 10334)
Optics
Optics +
Fan-out
Fiber Cable
QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter
ER4 40km SMF, LC (PN 10335) Internal CWDM
transits four wavelengths over single fiber.
MPO to 4 x LC Fanout 10m (PN 10327) for use
with (PN 10326) MPO to 4 x LC duplex
connectors, SMF
LR4 Parallel SM, 10km SMF, MPO (PN 10326)
25/50/100G
CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M))
SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M))
SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center)
LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus)
ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro)
Optics and DAC Cables
Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments,
unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration.
Proprietary got you Keyed Optics
ModelNumber Description
10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC
10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC
10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC
10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC
MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux
MUX-RACK-01 Rack mount kit for MUX-CWDM-01
40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC
CWDM
MUX-CWDM-01
DACs
Notes:
Collapsed (1-tier) Spine
Summit Summit
Spine
Leaf
Storage
Summit
Management
Storage
Summit
Storage
Summit
Storage
Summit
Storage
Summit
Storage
Summit
Summit Summit
4 x 72 =248 10Gs
Preparation Netsite Operation
Motion
Each network-tier adds another
two hops, which adds latency.
Latency can impact system
performance and CPU cycles.
FCOE looks like legacy Fibre
Channel and eliminates the
processing overhead associated w
TCP/IP.
Ultralow Latency
Non-Blocking,
Lossless Fabric,
Lossless Ethernet,
Virtualization,
Convergence 2.0
(Microseconds')
Collapsed (1-tier) Spine
Summit Summit
Spine
Leaf
Storage
Summit
Management
Storage
Summit
Storage
Summit
Storage
Summit
Storage
Summit
Storage
Summit
Summit Summit
4 x 72 =248 10Gs
Preparation Netsite Operation
Motion
Each network-tier adds another
two hops, which adds latency.
Latency can impact system
performance and CPU cycles.
FCOE looks like legacy Fibre
Channel and eliminates the
processing overhead associated w
TCP/IP.
Ultralow Latency
Non-Blocking,
Lossless Fabric,
Lossless Ethernet,
Virtualization,
Convergence 2.0
(Microseconds')
Traditional control
LDAP NAC DHCP Radius Captive
Portal
DNS MDMLDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
LDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
NAC
Analytics
Netsite
Extreme (Wired and wireless) Control
Cloud Based control
On-prim / off-prim
Traditional control
LDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
NAC
Analytics
Netsite
Extreme (Wired and wireless) Control
Cloud Based control
On-prim / off-prim
Extreme and selected microwave gear
In the Extreme Networks microwave transportation implementation, there were several options for the L2 hello protocol that
would satisfy the reliability requirements. The two primary options considered were 802.1AG Continuity Check Messages (CCM)
and Extreme Link Status Monitoring (ELSM). The architecture of the microwave radios and the virtual chassis at each
location is critical so that no single point of failure can impact the mission.
 Flap Timers: The Extreme Networks implementation of G.8032 incorporates flap-timers to mitigate the network impact of
high-speed failure/recovery operations within the network. For example, if a crane were to spin around near to a roof-top
microwave transmitter, the link might fluctuate as the crane spun into and out of the microwave signal. In a lesser network
design the link would flap which means it would fail and restore constantly and might potentially cause an interruption of
service each time the link flapped.
 Spanning Tree to Slow: In implementations such as spanning tree convergence might be slow enough that the network would
remain out of service as the link fluctuated. After some engineering discussion it was determined to set the programmable
G.8032 wait-to-restore timer to five seconds.
 Hello Protocols: Since microwave link failures can find their origin in thunderstorms, fog, ice, intermediate transport domain
failures, or even moving machinery, each link in the network must have a hello protocol implemented which enables the
detection of logical faults. On a LAG port, these hello timers must operate on each link of the LAG. This means that the link
is now intelligent enough to wait until the physical link has been stable for 5000ms before moving traffic onto it. By the way,
this is why G.8032 restorals are so lightning fast.
Extreme and selected microwave gear
In the Extreme Networks microwave transportation implementation, there were several options for the L2 hello protocol that
would satisfy the reliability requirements. The two primary options considered were 802.1AG Continuity Check Messages (CCM)
and Extreme Link Status Monitoring (ELSM). The architecture of the microwave radios and the virtual chassis at each
location is critical so that no single point of failure can impact the mission.
 Flap Timers: The Extreme Networks implementation of G.8032 incorporates flap-timers to mitigate the network impact of
high-speed failure/recovery operations within the network. For example, if a crane were to spin around near to a roof-top
microwave transmitter, the link might fluctuate as the crane spun into and out of the microwave signal. In a lesser network
design the link would flap which means it would fail and restore constantly and might potentially cause an interruption of
service each time the link flapped.
 Spanning Tree to Slow: In implementations such as spanning tree convergence might be slow enough that the network would
remain out of service as the link fluctuated. After some engineering discussion it was determined to set the programmable
G.8032 wait-to-restore timer to five seconds.
 Hello Protocols: Since microwave link failures can find their origin in thunderstorms, fog, ice, intermediate transport domain
failures, or even moving machinery, each link in the network must have a hello protocol implemented which enables the
detection of logical faults. On a LAG port, these hello timers must operate on each link of the LAG. This means that the link
is now intelligent enough to wait until the physical link has been stable for 5000ms before moving traffic onto it. By the way,
this is why G.8032 restorals are so lightning fast.
CJIS & FIPS-140
RELIABILITY TO GO:
NETMOTION WIRELESS
MOBILITY XE MOBILE VPN Introduce a separate control plane to Ensure that users are
authorized is of greater concern in a mobile deployment where
devices can more easily be misplaced, lost or stolen.
 CJIS Authentication -Law enforcement agencies face
increasingly stringent requirements for authentication, which
is required to access federal criminal databases
 FIPS 140-2 validated AES encryption secures data sessions as
devices traverse networks.
 Persistence through coverage gaps, areas of weak signal
strength, or when users suspend their devices; applications
pause, then resume when a connection returns.
CJIS & FIPS-140
RELIABILITY TO GO:
NETMOTION WIRELESS
MOBILITY XE MOBILE VPN Introduce a separate control plane to Ensure that users are
authorized is of greater concern in a mobile deployment where
devices can more easily be misplaced, lost or stolen.
 CJIS Authentication -Law enforcement agencies face
increasingly stringent requirements for authentication, which
is required to access federal criminal databases
 FIPS 140-2 validated AES encryption secures data sessions as
devices traverse networks.
 Persistence through coverage gaps, areas of weak signal
strength, or when users suspend their devices; applications
pause, then resume when a connection returns.
Video Arraignment
Why Extreme for Smart City? Every WLAN We Design Must
Support Real-Time Applications delivering more real-time
access to information, better collaboration & enhanced
situational awareness.
 Increase security for Public safety with built-in NAC
perimeter control.
 Decrease operational expense through policy
automation Implement interoperability among agencies
 Better control City infrastructure upgrades, featuring
L2 failover and hardening for emergency/disaster
readiness
Legislative / Courts Infrastructure
Video Arraignment
Why Extreme for Smart City? Every WLAN We Design Must
Support Real-Time Applications delivering more real-time
access to information, better collaboration & enhanced
situational awareness.
 Increase security for Public safety with built-in NAC
perimeter control.
 Decrease operational expense through policy
automation Implement interoperability among agencies
 Better control City infrastructure upgrades, featuring
L2 failover and hardening for emergency/disaster
readiness
Legislative / Courts Infrastructure
Heading
XYZ Account 2016 DesignExtremeEdgePoE
ExtremeCore10G
2016 Design
1G 2.5G/5G 10G 40G
Jeff Green
2016
Rev. 1
Florida
Legend
Legend
PoE
802.3at (PoE+)
Cat5e
30W
30W30W
60W
UPOE
No Cabling Change from PoE+
Cat5e
NBASE-T Alliance Copper Max Distances
Cat 7 Shielded 100 m
Cat 6a Shielded 100 m
Cat 6a Unshielded 100 m
Cat 6 Shielded** 100 m
Cat 6 Unshielded** 55 m
Need Correct
UTP, Patch Panel
and Adapter.
known as IEEE 802.3bz
Greenfield - Cat 6a (2.5, 5G & 10G) 100m
Cat 6 (2.5G, 5G & 10G) 55m
Brownfield - Cat 5e (2.5&5G) 100M
Requires X620 or
X460 Switch for
Multi-rate Support
plus Client that
supports Multi-rate.
10G Passive (PN 10306 ~ 5m, 10307~ 10M)
10G SFP+ Active copper cable (upto 100m)
40G Passive (PN 10321 ~3m, 10323~ 5m)
40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m)
40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4-
F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, )
10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m)
SFP+ DAC Cables
QSFP+ DAC Cables
10 LRM 220m (720ft/plus mode conditioning) (PN 10303)
10GBASE-T over Class E Cat 6 (55M) (10G)
10GBASE-T over Class E Cat 6a or 7 (100M) (10G)
10 SR over OM3 (300M) or OM4 (400M) (PN 10301)
10 LR over single mode (10KM) 1310nm (PN 10302)
10 ER over single mode (40KM) 1550nm (PN 10309)
10 ZR over single mode (80KM) 1550nm (PN 10310)
802.3bz 10GBASE-T (100M) for Cat 6 (5G)
10G Fiber
10G Copper
802.3bz 10GBASE-T (100M) for Cat 5e (2.5G)
OM3 50 µm (550m/SX) Laser, LC (PN 10051H)
OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H)
OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H)
OM4 50 µm (550m/SX) 2Km, LC (PN 10051H)
1G Fiber (50 µm)
1G Fiber (62.5 µm)
Single-fiber
transmission uses
only one strand of
fiber for both
transmit and
receive (1310nm
and 1490nm for
1Gbps; 1310nm and
1550nm for
100Mbps)
LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H)
ZX SMF 70km, LC (PN 10053H)
10/100/1000 (UTP to 100m) SFP (PN 1070H)
SR4 at least 100 m OM3 MMF (PN 10319)
SR4 at least 125 m OM4 MMF (PN 10319)
LR4 at least 10 km SMF, LC (PN 10320)
LM4 140m MMF or 1kM SMF, LC (PN 10334)
Optics
Optics +
Fan-out
Fiber Cable
QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter
ER4 40km SMF, LC (PN 10335) Internal CWDM
transits four wavelengths over single fiber.
MPO to 4 x LC Fanout 10m (PN 10327) for use
with (PN 10326) MPO to 4 x LC duplex
connectors, SMF
LR4 Parallel SM, 10km SMF, MPO (PN 10326)
25/50/100G
CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M))
SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M))
SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center)
LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus)
ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro)
Optics and DAC Cables
Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments,
unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration.
Proprietary got you Keyed Optics
ModelNumber Description
10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC
10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC
10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC
10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC
MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux
MUX-RACK-01 Rack mount kit for MUX-CWDM-01
40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC
CWDM
MUX-CWDM-01
DACs
Notes:
vMAN untagged vMAN Tagged
I/O I/OPort Port
Content
Two Scheduling Algorithms
 Strict Priority
 CIR/PR bandwidth based control
Packet Classification
 Any data field could be used to
classify the packet
 Classify all packet types:
untagged, single-tagged or double
tagged
Carrier-Class Availability
 H/W: 1:1 MSM
 S/W: Hitless Failover/Upgrades
 Network: EAPS
Flexible VLAN/vMAN handling (remapping/
translation) functionality
 Ingress remapping
 Egress translation
 NNI translation
Video
Source
Video
Source
HD TV
TVoD, VoD
Video
Source
Video
Source
Voice
gateway
Voice/Video
Telephony
Data Center
Backup, ERP
Internet
Video
Source
Video
Source
HD TV
TVoD, VoD
Video
Source
Video
Source
Voice
gateway
Voice/Video
Telephony
Data Center
Backup, ERP
Internet
Simplicity may enable XYZ Account s next killer app
Today no single technology can drive this trillion dollar market forward
However, today s complex network environments delay the deployment of new technology while inflicting
more and more support cost each year.
The world is converging on IP & Ethernet.
After all technology convergence should produce simplicity.
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Multi-Switch LAG
MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking
solution tp meet today s requirements of time, cost, security and service level?
 Combine ports on two switches to form a single logical connection
 The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or
appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).
 Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC)
Service
1
Service
2
ISCISCSwitch 1 Switch 2
XYZ Account
Services anywhere...
Multi-Switch LAG
MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking
solution tp meet today s requirements of time, cost, security and service level?
 Combine ports on two switches to form a single logical connection
 The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or
appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).
 Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC)
Service
1
Service
2
ISCSwitch 1 Switch 2
XYZ Account
Services anywhere...
LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAGLAGLAGLAGLAGLAGLAGLAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG
LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAGLAGLAGLAGLAGLAGLAGLAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG
L2
L3
L2
L3
L2
L3
L2
L3
XYZ Account Design Requirements
 Ensure business and operational continuity
(Ensure long term consistency).
 Reduce overall costs (Ensure long term
investment protection).
 Minimize transformation risks (Improve level of
service).
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Remote
Server
Single
SSID
Multi-Switch LAG
MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking
solution tp meet today s requirements of time, cost, security and service level?
 Combine ports on two switches to form a single logical connection
 The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or
appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).
 Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC)
Service
1
Service
2
ISCSwitch 1 Switch 2
XYZ Account
Services anywhere...
LAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG
LAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG
L2
L3
L2
L3
XYZ Account Design Requirements
 Ensure business and operational continuity
(Ensure long term consistency).
 Reduce overall costs (Ensure long term
investment protection).
 Minimize transformation risks (Improve level of
service).
Single SSID
10GbE Link
SummitStack-160SummitStack-160
This is where, X460s will be connected QSPF Direct
Attach Cables (DAC) for a total of 160GbE of
stacking.
 Each switch would have a single 10GbE fiber
connection using either LR (10Km or less), ER
(40Km or less), or ZR (80Km or less) for ring
redundancy. A total of two (2) 10GbE links per
school built on a ring topology.
 The X460-G2-10G supports IEEE 802.1 Audio Video
Bridging to enable reliable, real-time audio/
video transmission over Ethernet. AVB technology
delivers the quality of service required for
today s high-definition and time-sensitive
multimedia streams.
 7The Summit X460-G2-10G supports SDN Openflow
in addition to NetFlow and IPFix.
Single SSID
10GbE Link
SummitStack-160
This is where, X460s will be connected QSPF Direct
Attach Cables (DAC) for a total of 160GbE of
stacking.
 Each switch would have a single 10GbE fiber
connection using either LR (10Km or less), ER
(40Km or less), or ZR (80Km or less) for ring
redundancy. A total of two (2) 10GbE links per
school built on a ring topology.
 The X460-G2-10G supports IEEE 802.1 Audio Video
Bridging to enable reliable, real-time audio/
video transmission over Ethernet. AVB technology
delivers the quality of service required for
today s high-definition and time-sensitive
multimedia streams.
 7The Summit X460-G2-10G supports SDN Openflow
in addition to NetFlow and IPFix.
X460 Analytics lite Option 1)
Single SSID
10GbE Link
SummitStack-160
This is where, X460s will be connected QSPF Direct
Attach Cables (DAC) for a total of 160GbE of
stacking.
 Each switch would have a single 10GbE fiber
connection using either LR (10Km or less), ER
(40Km or less), or ZR (80Km or less) for ring
redundancy. A total of two (2) 10GbE links per
school built on a ring topology.
 The X460-G2-10G supports IEEE 802.1 Audio Video
Bridging to enable reliable, real-time audio/
video transmission over Ethernet. AVB technology
delivers the quality of service required for
today s high-definition and time-sensitive
multimedia streams.
 7The Summit X460-G2-10G supports SDN Openflow
in addition to NetFlow and IPFix.
X460 Analytics lite Option 1)
Single SSIDSingle SSID
SSA Analytics (Option 2)
2-10GbE VSB Links
10GbE Link
 Virtual Switch Bonding (VSB) for
Redundancy at the Edge. Advanced
Routing featuring LSNAT (Load Sharing
Network Address Translation) for load
balancing of clustered assets.
 1 Million Flows of Unsampled NetFlow for
Data Analytics collection.
 MACsec Encryption to maintain
confidentiality of transmitted data and to
take measures against frames transmitted
or modified by unauthorized devices.
SSA-180 at the XYZ Account Edge...
Single SSID
SSA Analytics (Option 2)
2-10GbE VSB Links
10GbE Link
 Virtual Switch Bonding (VSB) for
Redundancy at the Edge. Advanced
Routing featuring LSNAT (Load Sharing
Network Address Translation) for load
balancing of clustered assets.
 1 Million Flows of Unsampled NetFlow for
Data Analytics collection.
 MACsec Encryption to maintain
confidentiality of transmitted data and to
take measures against frames transmitted
or modified by unauthorized devices.
SSA-180 at the XYZ Account Edge...
Single SSID
Industrial Edge w PoE (Option 3)
4- 1G SFP
8- 10/100 RJ-45 POE+
12 Port Switch
240 Watt PoE Budget
Single SSID
Industrial Edge w PoE (Option 3)
4- 1G SFP
8- 10/100 RJ-45 POE+
12 Port Switch
240 Watt PoE Budget
Single SSID
Wave 2 Multirate Edge w PoE++ (Option 4)
This is where: 10G on
existing copper Cat5e
and Cat6 extend the
life of the installed
cable plant. Great for
1:N Convergence.
X620 (1OG Copper or Fiber)
Speed Next Gen Edge
Lowered TCO via
Limited Lifetime Warrantee
Single SSID
Wave 2 Multirate Edge w PoE++ (Option 4)
This is where: 10G on
existing copper Cat5e
and Cat6 extend the
life of the installed
cable plant. Great for
1:N Convergence.
X620 (1OG Copper or Fiber)
Speed Next Gen Edge
Lowered TCO via
Limited Lifetime Warrantee
Single SSID
10GbE Link
SummitStack-160
This is where, X460s will be connected QSPF Direct
Attach Cables (DAC) for a total of 160GbE of
stacking.
 Each switch would have a single 10GbE fiber
connection using either LR (10Km or less), ER
(40Km or less), or ZR (80Km or less) for ring
redundancy. A total of two (2) 10GbE links per
school built on a ring topology.
 The X460-G2-10G supports IEEE 802.1 Audio Video
Bridging to enable reliable, real-time audio/
video transmission over Ethernet. AVB technology
delivers the quality of service required for
today s high-definition and time-sensitive
multimedia streams.
 7The Summit X460-G2-10G supports SDN Openflow
in addition to NetFlow and IPFix.
X460 Analytics lite Option 1)
Single SSID
SSA Analytics (Option 2)
2-10GbE VSB Links
10GbE Link
 Virtual Switch Bonding (VSB) for
Redundancy at the Edge. Advanced
Routing featuring LSNAT (Load Sharing
Network Address Translation) for load
balancing of clustered assets.
 1 Million Flows of Unsampled NetFlow for
Data Analytics collection.
 MACsec Encryption to maintain
confidentiality of transmitted data and to
take measures against frames transmitted
or modified by unauthorized devices.
SSA-180 at the XYZ Account Edge...
Single SSID
Industrial Edge w PoE (Option 3)
4- 1G SFP
8- 10/100 RJ-45 POE+
12 Port Switch
240 Watt PoE Budget
Single SSID
Wave 2 Multirate Edge w PoE++ (Option 4)
This is where: 10G on
existing copper Cat5e
and Cat6 extend the
life of the installed
cable plant. Great for
1:N Convergence.
X620 (1OG Copper or Fiber)
Speed Next Gen Edge
Lowered TCO via
Limited Lifetime Warrantee
Policies:
 QoS,
 VLAN,
 802.1X
 LLDP,
 CDPv2
PBX
L3
EAPS
XYZ Account Preparation
XYZ Account Operation
Convergence 1.0
(Milliseconds)
Ethernet w ATM like QoS
 low latency (.1ms),
 low jitter (.01ms)
 zero packet loss
Performance with features
turned on (L3 built-in).
Direct Ethernet
Provider connects to
Customer in POP
FTTH, DSL,
Cable
Customer
Equipment
Customer
Edge
Provider Edge Provider
Core
M/C
CPE PE
M/C
M/C
M/C
PC
M/C
Loop Detection: ELRP CLI
Summit
SwitchD
SpanningTreeProtocol
Summit
Summit
STP the Algorithm to avoid
I'm the Root
Because MY
ID is Lesser
I’m the
root?
No, I’m
the root
No, I’m
the root?
How will
the loop
converge?
Block here!
Timing associatedwith STP:
Blocking - 20 Sec Or No Limits
Listening - 15 Sec.
Learning - 15Sec.
Forwarding - No Limits.
MasterNode
DataTraffic
ControlTraffic
10GEAPS
Summit
Summit
SummitSummit
Summit
Summit
SummitSummit
Sub50msRestoration
Scalefrom1to40GEthernetSummit
Summit
Fiber
Fiber
Fiber
Fiber
Metro Demarcation
LAG
EAPS
Blocked
EAPS
RFC3619
Ethernet Ring Protection Switching (ERPS) is an
effort at ITU-T under G.8032 Recommendation to
provide sub-50ms protection and recovery
switching for Ethernet traffic in a Ring topology
and at the same time ensuring that there are no
loops formed at the Ethernet Layer.
 G.8032v1 supports a single ring topology.
 G.8032v2 supports multiple rings/ladder
topology.
XYZ Account Design challenges
 Pervasive connectivity (Service elasticity with a
future requirement for IPv6 support).
 Explosion of interconnections (Support growth of
virtual environment).
 Converged, automated infrastructure (Security
and compliance).
Heading
XYZ Account 2016 DesignExtremeEdgePoE
ExtremeCore10G
2016 Design
1G 2.5G/5G 10G 40G
Jeff Green
2016
Rev. 1
Florida
Legend
Legend
PoE
802.3at (PoE+)
Cat5e
30W
30W30W
60W
UPOE
No Cabling Change from PoE+
Cat5e
NBASE-T Alliance Copper Max Distances
Cat 7 Shielded 100 m
Cat 6a Shielded 100 m
Cat 6a Unshielded 100 m
Cat 6 Shielded** 100 m
Cat 6 Unshielded** 55 m
Need Correct
UTP, Patch Panel
and Adapter.
known as IEEE 802.3bz
Greenfield - Cat 6a (2.5, 5G & 10G) 100m
Cat 6 (2.5G, 5G & 10G) 55m
Brownfield - Cat 5e (2.5&5G) 100M
Requires X620 or
X460 Switch for
Multi-rate Support
plus Client that
supports Multi-rate.
10G Passive (PN 10306 ~ 5m, 10307~ 10M)
10G SFP+ Active copper cable (upto 100m)
40G Passive (PN 10321 ~3m, 10323~ 5m)
40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m)
40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4-
F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, )
10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m)
SFP+ DAC Cables
QSFP+ DAC Cables
10 LRM 220m (720ft/plus mode conditioning) (PN 10303)
10GBASE-T over Class E Cat 6 (55M) (10G)
10GBASE-T over Class E Cat 6a or 7 (100M) (10G)
10 SR over OM3 (300M) or OM4 (400M) (PN 10301)
10 LR over single mode (10KM) 1310nm (PN 10302)
10 ER over single mode (40KM) 1550nm (PN 10309)
10 ZR over single mode (80KM) 1550nm (PN 10310)
802.3bz 10GBASE-T (100M) for Cat 6 (5G)
10G Fiber
10G Copper
802.3bz 10GBASE-T (100M) for Cat 5e (2.5G)
OM3 50 µm (550m/SX) Laser, LC (PN 10051H)
OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H)
OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H)
OM4 50 µm (550m/SX) 2Km, LC (PN 10051H)
1G Fiber (50 µm)
1G Fiber (62.5 µm)
Single-fiber
transmission uses
only one strand of
fiber for both
transmit and
receive (1310nm
and 1490nm for
1Gbps; 1310nm and
1550nm for
100Mbps)
LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H)
ZX SMF 70km, LC (PN 10053H)
10/100/1000 (UTP to 100m) SFP (PN 1070H)
SR4 at least 100 m OM3 MMF (PN 10319)
SR4 at least 125 m OM4 MMF (PN 10319)
LR4 at least 10 km SMF, LC (PN 10320)
LM4 140m MMF or 1kM SMF, LC (PN 10334)
Optics
Optics +
Fan-out
Fiber Cable
QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter
ER4 40km SMF, LC (PN 10335) Internal CWDM
transits four wavelengths over single fiber.
MPO to 4 x LC Fanout 10m (PN 10327) for use
with (PN 10326) MPO to 4 x LC duplex
connectors, SMF
LR4 Parallel SM, 10km SMF, MPO (PN 10326)
25/50/100G
CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M))
SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M))
SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center)
LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus)
ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro)
Optics and DAC Cables
Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments,
unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration.
Proprietary got you Keyed Optics
ModelNumber Description
10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC
10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC
10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC
10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC
MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux
MUX-RACK-01 Rack mount kit for MUX-CWDM-01
40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC
CWDM
MUX-CWDM-01
DACs
Notes:
Managed Services WAN (Cat 1 Spending)
SSA-180 at the XYZ Account Edge...
Preparation Netsite Operation
XYZ Account
architectural models
Example of Extreme
simplified architecture.
wire-speed non- blocking,
ultra low latency
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
XYZ Account Next generation design
 Full or almost full network virtualization (Automation
of vMotion across DC). SAN synchronization over
Ethernet connections, removing the requirement for
separate infrastructures for example Ethernet
switches and FC switches.
 Collapsed (1- or 2- tier L2 designs) No distribution
layer, no STP.
 VxLAN logical switching (Create a platform for
advanced service management Optimize for cloud
and virtualized environments).
XYZ Account Simplified architecture
 1- or 2- tier architecture with broad simplification and
virtualization (Automation of moving of virtual servers
to underutilized hardware in other data centers to
balance power and cooling requirements).
 Reduced number of network devices, Balanced
between legacy (optimized and next generation).
 Partial but relevant virtualization, reduced physical
constraints (virtualization creates uniform virtual
hardware profiles irrespective of server hardware).
Preparation Netsite Operation
XYZ Account
architectural models
Example of Extreme
simplified architecture.
wire-speed non- blocking,
ultra low latency
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
XYZ Account Next generation design
 Full or almost full network virtualization (Automation
of vMotion across DC). SAN synchronization over
Ethernet connections, removing the requirement for
separate infrastructures for example Ethernet
switches and FC switches.
 Collapsed (1- or 2- tier L2 designs) No distribution
layer, no STP.
 VxLAN logical switching (Create a platform for
advanced service management Optimize for cloud
and virtualized environments).
XYZ Account Simplified architecture
 1- or 2- tier architecture with broad simplification and
virtualization (Automation of moving of virtual servers
to underutilized hardware in other data centers to
balance power and cooling requirements).
 Reduced number of network devices, Balanced
between legacy (optimized and next generation).
 Partial but relevant virtualization, reduced physical
constraints (virtualization creates uniform virtual
hardware profiles irrespective of server hardware).
Managed Services WAN (Cat 1 Spending)
SSA-180 at the XYZ Account Edge...
Preparation Netsite Operation
XYZ Account
architectural models
Example of Extreme
simplified architecture.
wire-speed non- blocking,
ultra low latency
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
2-10GbE VSB Links
10GbE Link
XYZ Account Next generation design
 Full or almost full network virtualization (Automation
of vMotion across DC). SAN synchronization over
Ethernet connections, removing the requirement for
separate infrastructures for example Ethernet
switches and FC switches.
 Collapsed (1- or 2- tier L2 designs) No distribution
layer, no STP.
 VxLAN logical switching (Create a platform for
advanced service management Optimize for cloud
and virtualized environments).
XYZ Account Simplified architecture
 1- or 2- tier architecture with broad simplification and
virtualization (Automation of moving of virtual servers
to underutilized hardware in other data centers to
balance power and cooling requirements).
 Reduced number of network devices, Balanced
between legacy (optimized and next generation).
 Partial but relevant virtualization, reduced physical
constraints (virtualization creates uniform virtual
hardware profiles irrespective of server hardware).
Traditional control
LDAP NAC DHCP Radius Captive
Portal
DNS MDMLDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
LDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
NAC
Analytics
Netsite
Extreme (Wired and wireless) Control
Cloud Based control
On-prim / off-prim
Traditional control
LDAP NAC DHCP Radius Captive
Portal
DNS MDM
XYZ Account ServicesUser Repositories or Corporate Control
NAC
Analytics
Netsite
Extreme (Wired and wireless) Control
Cloud Based control
On-prim / off-prim
XYZ Account (911 LLDP MED Design)
XYZ Account Reference Design Notes: 802.1X/Access control – multiple supplicants with
Auto-sensing of IP phones (LLDP, LLDP-MED). Create dynamic profiles, Switch applies profiles
based on standard LLDP-MED discovery protocols, One Device Profile per port Profile
action
Deep Rate-limiting with upto 8 queues per port with consistent queue policing
 Weighted-round robin
 Weight fair queuing
 WRED
Topology maps are created in OneView with the assistance of link and device discovery
protocols (e.g. Link Layer Discovery Protocol) that aid in the creation of these maps by
automatically identifying and drawing the physical links between network devices. It is
necessary for the link layer protocol to be enabled on each device within the
infrastructure for discovery to take place. Once the appropriate devices have been
discovered, a network administrator can arrange the corresponding device icons in a
logical manner that best represents the network infrastructure.
XYZ Account Endpoint move detection and reporting. In this case, Cisco phones must be
individually provisioned (through the phone interface) with their voice VLAN information.
Both LLDP-MED and Cisco Discovery Protocol support this capability. LLDP-MED provides finer
control of the network policy by allowing separate control for signaling and bearer
applications. However, from a practical point of view, the critical capability is the VLAN
configuration, and it is supported by both Cisco Discovery Protocol and LLDP-MED.
XYZ Account VoWLAN management application or an LIS (Location Information Server)
programs the location identification into network using SNMP and the LLDP-MED MIB
 Every port may advertise a unique coordinate, civic, and/or ELIN location value
 Network infrastructure advertise periodic LLDP-MED frames containing location TLV
 Endpoint has location information to use immediately in the call setup
XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the
information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting.
Information
 Logical Address (if define).
 Hostname (given by hostname command).
 Hardware Platform.
 IOS Version.
 Interface Type and Interface Number of local and remote device connected.
1
Cisco VOIP
VoIP phone advertise
CDP packets
Switch responds to phone
request with Voice VLAN
and QoS info
2
 Configure Voice VLAN
 Configure QoS
 Advertise PoE
 CDPv2 for VOIP setup
CDP Advertisement are send through all
the ports by default. Global CDP
information:
 Sending CDP packets every 60 seconds
 Sending a hold time value of 180
seconds
 Advertisement are send via multicast.
XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the
information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting.
Information
 Logical Address (if define).
 Hostname (given by hostname command).
 Hardware Platform.
 IOS Version.
 Interface Type and Interface Number of local and remote device connected.
1
Cisco VOIP
VoIP phone advertise
CDP packets
Switch responds to phone
request with Voice VLAN
and QoS info
2
 Configure Voice VLAN
 Configure QoS
 Advertise PoE
 CDPv2 for VOIP setup
CDP Advertisement are send through all
the ports by default. Global CDP
information:
 Sending CDP packets every 60 seconds
 Sending a hold time value of 180
seconds
 Advertisement are send via multicast.
LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN
Location Considerations, For WLAN devices capable of higher accuracy Smart clients
could compute relative position, using TOA or triangulation, from nearby APs
AP could advertise client specific location using reliable multicasts or via the Presence
Parameters information element (11v), in addition to LLDP-MED location
Emergency Services, Some Thoughts ...
 Wireless client would quickly discover new physical location on roaming
 Switches need physical location configuration anyway, to support wired IP phones
 AP could auto-discover it s physical location via LLDP from wired network
Information Exchanged is in the form of
TLVs and includes mandatory and
optional information such as:
 System name and description
 Port name and description
 IP management address
 VLAN name
 System capabilities (switching,
routing, etc.)
 MAC/PHY information
 MDI power
 Link aggregation
LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN
Location Considerations, For WLAN devices capable of higher accuracy Smart clients
could compute relative position, using TOA or triangulation, from nearby APs
AP could advertise client specific location using reliable multicasts or via the Presence
Parameters information element (11v), in addition to LLDP-MED location
Emergency Services, Some Thoughts ...
 Wireless client would quickly discover new physical location on roaming
 Switches need physical location configuration anyway, to support wired IP phones
 AP could auto-discover it s physical location via LLDP from wired network
Information Exchanged is in the form of
TLVs and includes mandatory and
optional information such as:
 System name and description
 Port name and description
 IP management address
 VLAN name
 System capabilities (switching,
routing, etc.)
 MAC/PHY information
 MDI power
 Link aggregation
Cisco Discovery Protocol - If you have ever worked or studied Cisco on any level you will already
be aware of Cisco Discovery Protocol (CDP), and what it is and does. Invented at Cisco by Keith
McCloghrie and Dino Farinacci, Cisco Discovery Protocol was initially introduced on Cisco products
in 1994. This protocol now operates on tens of millions of Cisco devices throughout the world. It
initially supported a limited set of attributes that were used mainly for device discovery. These
attributes are based on type, length, and value descriptions, referred to as TLVs
XYZ Account (911 LLDP MED Design)
XYZ Account Reference Design Notes: 802.1X/Access control – multiple supplicants with
Auto-sensing of IP phones (LLDP, LLDP-MED). Create dynamic profiles, Switch applies profiles
based on standard LLDP-MED discovery protocols, One Device Profile per port Profile
action
Deep Rate-limiting with upto 8 queues per port with consistent queue policing
 Weighted-round robin
 Weight fair queuing
 WRED
Topology maps are created in OneView with the assistance of link and device discovery
protocols (e.g. Link Layer Discovery Protocol) that aid in the creation of these maps by
automatically identifying and drawing the physical links between network devices. It is
necessary for the link layer protocol to be enabled on each device within the
infrastructure for discovery to take place. Once the appropriate devices have been
discovered, a network administrator can arrange the corresponding device icons in a
logical manner that best represents the network infrastructure.
XYZ Account Endpoint move detection and reporting. In this case, Cisco phones must be
individually provisioned (through the phone interface) with their voice VLAN information.
Both LLDP-MED and Cisco Discovery Protocol support this capability. LLDP-MED provides finer
control of the network policy by allowing separate control for signaling and bearer
applications. However, from a practical point of view, the critical capability is the VLAN
configuration, and it is supported by both Cisco Discovery Protocol and LLDP-MED.
XYZ Account VoWLAN management application or an LIS (Location Information Server)
programs the location identification into network using SNMP and the LLDP-MED MIB
 Every port may advertise a unique coordinate, civic, and/or ELIN location value
 Network infrastructure advertise periodic LLDP-MED frames containing location TLV
 Endpoint has location information to use immediately in the call setup
XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the
information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting.
Information
 Logical Address (if define).
 Hostname (given by hostname command).
 Hardware Platform.
 IOS Version.
 Interface Type and Interface Number of local and remote device connected.
1
Cisco VOIP
VoIP phone advertise
CDP packets
Switch responds to phone
request with Voice VLAN
and QoS info
2
 Configure Voice VLAN
 Configure QoS
 Advertise PoE
 CDPv2 for VOIP setup
CDP Advertisement are send through all
the ports by default. Global CDP
information:
 Sending CDP packets every 60 seconds
 Sending a hold time value of 180
seconds
 Advertisement are send via multicast.
LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN
Location Considerations, For WLAN devices capable of higher accuracy Smart clients
could compute relative position, using TOA or triangulation, from nearby APs
AP could advertise client specific location using reliable multicasts or via the Presence
Parameters information element (11v), in addition to LLDP-MED location
Emergency Services, Some Thoughts ...
 Wireless client would quickly discover new physical location on roaming
 Switches need physical location configuration anyway, to support wired IP phones
 AP could auto-discover it s physical location via LLDP from wired network
Information Exchanged is in the form of
TLVs and includes mandatory and
optional information such as:
 System name and description
 Port name and description
 IP management address
 VLAN name
 System capabilities (switching,
routing, etc.)
 MAC/PHY information
 MDI power
 Link aggregation
Cisco Discovery Protocol - If you have ever worked or studied Cisco on any level you will already
be aware of Cisco Discovery Protocol (CDP), and what it is and does. Invented at Cisco by Keith
McCloghrie and Dino Farinacci, Cisco Discovery Protocol was initially introduced on Cisco products
in 1994. This protocol now operates on tens of millions of Cisco devices throughout the world. It
initially supported a limited set of attributes that were used mainly for device discovery. These
attributes are based on type, length, and value descriptions, referred to as TLVs
Heading
XYZ Account 2016 DesignExtremeEdgePoE
ExtremeCore10G
2016 Design
1G 2.5G/5G 10G 40G
Jeff Green
2016
Rev. 1
Florida
Legend
Legend
PoE
802.3at (PoE+)
Cat5e
30W
30W30W
60W
UPOE
No Cabling Change from PoE+
Cat5e
NBASE-T Alliance Copper Max Distances
Cat 7 Shielded 100 m
Cat 6a Shielded 100 m
Cat 6a Unshielded 100 m
Cat 6 Shielded** 100 m
Cat 6 Unshielded** 55 m
Need Correct
UTP, Patch Panel
and Adapter.
known as IEEE 802.3bz
Greenfield - Cat 6a (2.5, 5G & 10G) 100m
Cat 6 (2.5G, 5G & 10G) 55m
Brownfield - Cat 5e (2.5&5G) 100M
Requires X620 or
X460 Switch for
Multi-rate Support
plus Client that
supports Multi-rate.
10G Passive (PN 10306 ~ 5m, 10307~ 10M)
10G SFP+ Active copper cable (upto 100m)
40G Passive (PN 10321 ~3m, 10323~ 5m)
40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m)
40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4-
F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, )
10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m)
SFP+ DAC Cables
QSFP+ DAC Cables
10 LRM 220m (720ft/plus mode conditioning) (PN 10303)
10GBASE-T over Class E Cat 6 (55M) (10G)
10GBASE-T over Class E Cat 6a or 7 (100M) (10G)
10 SR over OM3 (300M) or OM4 (400M) (PN 10301)
10 LR over single mode (10KM) 1310nm (PN 10302)
10 ER over single mode (40KM) 1550nm (PN 10309)
10 ZR over single mode (80KM) 1550nm (PN 10310)
802.3bz 10GBASE-T (100M) for Cat 6 (5G)
10G Fiber
10G Copper
802.3bz 10GBASE-T (100M) for Cat 5e (2.5G)
OM3 50 µm (550m/SX) Laser, LC (PN 10051H)
OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H)
OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H)
OM4 50 µm (550m/SX) 2Km, LC (PN 10051H)
1G Fiber (50 µm)
1G Fiber (62.5 µm)
Single-fiber
transmission uses
only one strand of
fiber for both
transmit and
receive (1310nm
and 1490nm for
1Gbps; 1310nm and
1550nm for
100Mbps)
LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H)
ZX SMF 70km, LC (PN 10053H)
10/100/1000 (UTP to 100m) SFP (PN 1070H)
SR4 at least 100 m OM3 MMF (PN 10319)
SR4 at least 125 m OM4 MMF (PN 10319)
LR4 at least 10 km SMF, LC (PN 10320)
LM4 140m MMF or 1kM SMF, LC (PN 10334)
Optics
Optics +
Fan-out
Fiber Cable
QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter
ER4 40km SMF, LC (PN 10335) Internal CWDM
transits four wavelengths over single fiber.
MPO to 4 x LC Fanout 10m (PN 10327) for use
with (PN 10326) MPO to 4 x LC duplex
connectors, SMF
LR4 Parallel SM, 10km SMF, MPO (PN 10326)
25/50/100G
CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M))
SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M))
SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center)
LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus)
ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro)
Optics and DAC Cables
Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments,
unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration.
Proprietary got you Keyed Optics
ModelNumber Description
10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC
10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC
10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC
10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC
MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux
MUX-RACK-01 Rack mount kit for MUX-CWDM-01
40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC
CWDM
MUX-CWDM-01
DACs
Notes:
Wireless Controllers
Elastic virtual Appliance? delivers Scale on demand, V2110 V9 Virtual Wireless Appliance of 8
APs, expandable to 250 (Hyper-V)/525 (VMware) APs in 1 or 16 AP increments – includes 2 free
Radar licenses.
 This is where, XYZ Account can scale on demand by adjusting resources allocated to
virtual machine (*Supported on VMware version only).
 Support for 525 APs in standalone and 1050 APs in H/A mode.
 Support for 4,096 users in standalone and 8,192 users in H/A mode.
Configuration Small (OVA) Medium Large
HostResources 2 CPU
1 GB RAM
25 GB HDD
4 CPU
2 GB RAM
25 GB HDD
8 CPU
4 GB HDD
25 GB HDD
System Limits
AP Capacity 100 500 1050
Local AP
High Availability
50
50
250
250
525
525
User Capacity 1024 4096 8192
Standalone Users
High Availability
512
512
2048
2048
4096
4096
Max Number Services/VNS 32 128 256
Max Number of Active WLAN
services
16 64 128
Max Number Topologies 32 128 256
Max Number Policies/Roles 128 512 1024
Traditional Appliance
(30135 or WS-C5210)
Elastic Appliance
(WS-V2110-9-NAM)
Wireless Controllers
Elastic virtual Appliance? delivers Scale on demand, V2110 V9 Virtual Wireless Appliance of 8
APs, expandable to 250 (Hyper-V)/525 (VMware) APs in 1 or 16 AP increments – includes 2 free
Radar licenses.
 This is where, XYZ Account can scale on demand by adjusting resources allocated to
virtual machine (*Supported on VMware version only).
 Support for 525 APs in standalone and 1050 APs in H/A mode.
 Support for 4,096 users in standalone and 8,192 users in H/A mode.
Configuration Small (OVA) Medium Large
HostResources 2 CPU
1 GB RAM
25 GB HDD
4 CPU
2 GB RAM
25 GB HDD
8 CPU
4 GB HDD
25 GB HDD
System Limits
AP Capacity 100 500 1050
Local AP
High Availability
50
50
250
250
525
525
User Capacity 1024 4096 8192
Standalone Users
High Availability
512
512
2048
2048
4096
4096
Max Number Services/VNS 32 128 256
Max Number of Active WLAN
services
16 64 128
Max Number Topologies 32 128 256
Max Number Policies/Roles 128 512 1024
Traditional Appliance
(30135 or WS-C5210)
Elastic Appliance
(WS-V2110-9-NAM)
Wireless Analytics (Netflow with MirrorN)
Physical or Virtual Appliance? Overlay design and deployment in this case, the network switches
lack the required capabilities required for unsampled NetFlow. A passive network tap can be
used to direct traffic to an out-of-band CoreFlow2 switch that can generate the required
unsampled NetFlow stats and traffic mirror. A Massive and Customizable Signature Set – With
a library of more than 7,000 applications with over 13,000 fingerprints and growing, and the
ability to easily create your own fingerprint, Purview can identify virtually any application.
Analytics with Sensor
W PV-A-300 Appliance Bundle
(PV-50K-SYS-2)
Virtual Appliance Bundle
(PV-V-50K-SYS-2)
PV-FPB-XXX – Purview Flow per Minute license
 Up to 25K tracked clients (20
tracked applications/client).
 Up to 500K flows in active
cache
 Up to 1M Flows/Min
PV-A-300
Sensor PV-FC-180, S or K Series (Core
Flow 2/ 1 Million Flows)
Netsite Advance (NMS-ADV-5)
6 Million Flows
Wireless Analytics (Netflow with MirrorN)
Physical or Virtual Appliance? Overlay design and deployment in this case, the network switches
lack the required capabilities required for unsampled NetFlow. A passive network tap can be
used to direct traffic to an out-of-band CoreFlow2 switch that can generate the required
unsampled NetFlow stats and traffic mirror. A Massive and Customizable Signature Set – With
a library of more than 7,000 applications with over 13,000 fingerprints and growing, and the
ability to easily create your own fingerprint, Purview can identify virtually any application.
Analytics with Sensor
W PV-A-300 Appliance Bundle
(PV-50K-SYS-2)
Virtual Appliance Bundle
(PV-V-50K-SYS-2)
PV-FPB-XXX – Purview Flow per Minute license
 Up to 25K tracked clients (20
tracked applications/client).
 Up to 500K flows in active
cache
 Up to 1M Flows/Min
PV-A-300
Sensor PV-FC-180, S or K Series (Core
Flow 2/ 1 Million Flows)
Netsite Advance (NMS-ADV-5)
6 Million Flows
NAC : Who (and What) is on Your Network?
Physical or Virtual Appliance? Extreme Networks NAC is
upgradable, allowing assessment to be integrated onto a
single box with the other NAC functions. The appliances
are capable of supporting both network-based and/or
agent-based assessment. A virtual appliance is a software
image that runs on a virtual machine. The Identity &
Access Virtual Appliance is packaged in the .OVA file
format defined by VMware and must be deployed on a
VMware ESXTM 4.0, 4.1, 5.0, or 5.1 server or ESXiTM 4.0, 4.1,
5.0, or 5.1 server with a vSphere(TM) 4.0, 4.1, 5.0, or 5.1
client. Virtual appliance requires 12 GB of memory, four
CPUs, two network adapters, and 40 GB of thick-
provisioned hard drive space.
IA-ES-1K 1,000 End-system license $7,995
IA-ES-3K 3,000 End-system license $22,495
IA-ES-12K 12,000 End-system license $84,995
IA-PA-3K 3,000 Posture Assessment license $9,995
IA-PA-12K 12,000 Posture Assessment license $39,995
Traditional Appliance
(IA-A-20 & IA-A-300)
NAC Elastic Appliance
(Virtual appliances are
included in NetSight
Advanced
(IA-ES license required))
NAC : Who (and What) is on Your Network?
Physical or Virtual Appliance? Extreme Networks NAC is
upgradable, allowing assessment to be integrated onto a
single box with the other NAC functions. The appliances
are capable of supporting both network-based and/or
agent-based assessment. A virtual appliance is a software
image that runs on a virtual machine. The Identity &
Access Virtual Appliance is packaged in the .OVA file
format defined by VMware and must be deployed on a
VMware ESXTM 4.0, 4.1, 5.0, or 5.1 server or ESXiTM 4.0, 4.1,
5.0, or 5.1 server with a vSphere(TM) 4.0, 4.1, 5.0, or 5.1
client. Virtual appliance requires 12 GB of memory, four
CPUs, two network adapters, and 40 GB of thick-
provisioned hard drive space.
IA-ES-1K 1,000 End-system license $7,995
IA-ES-3K 3,000 End-system license $22,495
IA-ES-12K 12,000 End-system license $84,995
IA-PA-3K 3,000 Posture Assessment license $9,995
IA-PA-12K 12,000 Posture Assessment license $39,995
Traditional Appliance
(IA-A-20 & IA-A-300)
NAC Elastic Appliance
(Virtual appliances are
included in NetSight
Advanced
(IA-ES license required))
Netsite: How is Your Network Being Used?
Physical or Virtual Appliance? Understand your
network in OneView Third-party devices can
be managed via SNMP, SSH, Syslog, or even
Secure Copy. OneViewTM supports reporting on
about 2,500devices/interfaces in a typical
enterprise network which stores: raw data for
7 days with a 15 minute polling interval, hourly
rollups for 8 weeks, and daily rollups for
6months. More information on tuning the
deployment is available in the OneViewTM
Users Guide.
Up to 6 Purview Engines
Up to 3 Million Flows/Min
Up to 50K tracked clients
Up to 5K TopN records/hour
Up to 20 applications/client (10 TopN, 10
tracked)
Up to 600 GB database storage
Traditional Appliance
(NS-A-20)
Elastic Appliance
(NMS-ADV-XX )
VM and
Cloud
Directory
PKI
Device
Mgmt
Provisioning
Software
CMDB
Asset
Alarm
Systems
Netsite: How is Your Network Being Used?
Physical or Virtual Appliance? Understand your
network in OneView Third-party devices can
be managed via SNMP, SSH, Syslog, or even
Secure Copy. OneViewTM supports reporting on
about 2,500devices/interfaces in a typical
enterprise network which stores: raw data for
7 days with a 15 minute polling interval, hourly
rollups for 8 weeks, and daily rollups for
6months. More information on tuning the
deployment is available in the OneViewTM
Users Guide.
Up to 6 Purview Engines
Up to 3 Million Flows/Min
Up to 50K tracked clients
Up to 5K TopN records/hour
Up to 20 applications/client (10 TopN, 10
tracked)
Up to 600 GB database storage
Traditional Appliance
(NS-A-20)
Elastic Appliance
(NMS-ADV-XX )
VM and
Cloud
Directory
PKI
Device
Mgmt
Provisioning
Software
CMDB
Asset
Alarm
Systems
Integrated RADAR : Wireless Dashboard
The wireless dashboard provides an
overview of the status and performance
of the entire wireless infrastructure. It
displays an overview of the availability,
load and status of the controllers, the
most recent and severe events from the
wireless infrastructure and statistics on
the most loaded APs.
Wireless coverage
 Overall
 Per channel
 Expected data rate
 Channel allocation
 Location
 Current
 Over time
 Location readiness
Integrated RADAR : Wireless Dashboard
The wireless dashboard provides an
overview of the status and performance
of the entire wireless infrastructure. It
displays an overview of the availability,
load and status of the controllers, the
most recent and severe events from the
wireless infrastructure and statistics on
the most loaded APs.
Wireless coverage
 Overall
 Per channel
 Expected data rate
 Channel allocation
 Location
 Current
 Over time
 Location readiness
ADSP : Air Defense Spectrum Control
Forensic
Summary
Association
Analysis
Protocol
Abuse
Anomalous
Behavior
Signature
Analysis
Policy
Manager
Noise &
Interference
Roaming
Issues
Scanner Printer
Connectivity
Problems
Correlation
Engines
Context-aware
Detection
Engines
ADSP : Air Defense Spectrum Control
Forensic
Summary
Association
Analysis
Protocol
Abuse
Anomalous
Behavior
Signature
Analysis
Policy
Manager
Noise &
Interference
Roaming
Issues
Scanner Printer
Connectivity
Problems
Correlation
Engines
Context-aware
Detection
Engines
XYZ Account Single Site
Design Considerations
A Single Site deployment of Identity and Access Control (IAC) is typical in small to medium sized environments. The network design generally consists
of a core router with collapsed distribution and edge switching. A small datacenter is typically deployed where virtual machines can be used to
host services and a dual ISP link is configured through a pair of firewalls. Based on this general architecture, the design for IAC will include a
Control Center appliance and at least two IAC Engines in the datacenter. These three appliances can all be virtual, physical, or a combination of
both physical and virtual. Depending upon the use case, the wireless controller will also sit in the datacenter with Bridge at AP topologies, Bridge at
Controller topologies or a combination of both.
For an IAC deployment it's common to see the IAC Engines in the datacenter at the main building. A minimum of two IAC Engines are recommended
for redundancy and they can be either virtual or physical. Generally, along with the IAC Engines, the Control Center server and wireless controllers
also reside in the datacenter. For the wireless deployment it's common to see Bridge at AP topologies for wireless users within the campus buildings.
However, guest services may still tunnel back to the datacenter with a Bridge at Controller topology before accessing network resources.
XYZ Account Single Site
Design Considerations
A Single Site deployment of Identity and Access Control (IAC) is typical in small to medium sized environments. The network design generally consists
of a core router with collapsed distribution and edge switching. A small datacenter is typically deployed where virtual machines can be used to
host services and a dual ISP link is configured through a pair of firewalls. Based on this general architecture, the design for IAC will include a
Control Center appliance and at least two IAC Engines in the datacenter. These three appliances can all be virtual, physical, or a combination of
both physical and virtual. Depending upon the use case, the wireless controller will also sit in the datacenter with Bridge at AP topologies, Bridge at
Controller topologies or a combination of both.
For an IAC deployment it's common to see the IAC Engines in the datacenter at the main building. A minimum of two IAC Engines are recommended
for redundancy and they can be either virtual or physical. Generally, along with the IAC Engines, the Control Center server and wireless controllers
also reside in the datacenter. For the wireless deployment it's common to see Bridge at AP topologies for wireless users within the campus buildings.
However, guest services may still tunnel back to the datacenter with a Bridge at Controller topology before accessing network resources.
Unique Purpose-Built Access Points
(Opex or CAPEX)
Wall-plate AP
 2x2:2 11ac Wave 2
 Up to 3 pass-through E/N
ports with PoE out port
 BLE/Zigbee support
AP + Camera (AP3916)
 2x2:2 SS, Dual band &
radio
 RF Spectrum Analysis
 4x integral antennae
MU-MIMO (up to 4) 160 MHz
 4 MU-MIMO sessions
 2.5/5G Ethernet
 BLE/Zigbee support (IoT)
Stadiums (3865e)
 11ac (3x3:3 MIMO)
 Mesh, Policy, QoS
 IP67/NEMA6
Unique Purpose-Built Access Points
(Opex or CAPEX)
Wall-plate AP
 2x2:2 11ac Wave 2
 Up to 3 pass-through E/N
ports with PoE out port
 BLE/Zigbee support
AP + Camera (AP3916)
 2x2:2 SS, Dual band &
radio
 RF Spectrum Analysis
 4x integral antennae
MU-MIMO (up to 4) 160 MHz
 4 MU-MIMO sessions
 2.5/5G Ethernet
 BLE/Zigbee support (IoT)
Stadiums (3865e)
 11ac (3x3:3 MIMO)
 Mesh, Policy, QoS
 IP67/NEMA6
Separate voice and/or data
 32 VNS segments per Controller
 Per SSID or WLAN domain (Controller, AP)
 QoS, Security, Roaming, No VLAN
configuration required
Single XYZ Account SSID
Separate voice and/or data
 32 VNS segments per Controller
 Per SSID or WLAN domain (Controller, AP)
 QoS, Security, Roaming, No VLAN
configuration required
Single XYZ Account SSID
This is where, XYZ Account maybe familiar with the idea that as chaos or change rates within a particular network go up, so do your costs.
 Roles are Business level groupings built to correspond to specific user types.
 Rules are policies enforced at the port level to decide what types of traffic XYZ Account wants to allow, deny, rate limit or prioritize (No complicated scripting).
 Services are containers of similar Rules. Grouping Rules allows the Administrator to apply rules in groups rather than as individual components.
Policy Components (Cost to Chaos Ratio)
Roles
Faculty
Student
Guest
Rules
Allow, deny, rate limit,
prioritize. Or contain.
Services
PoS
Oracle
Guest
if X + Y,= Z then action
IT Admin Employee Guest
Oracle VPNAdmin.
AllowHTTP
AllowHTTPS
AllowIPSec
AllowSAP
RateLimit
AllowPing
AllowTelnet
AllowEmail
AllowTFTP
AllowSNMP
AllowOracle
DenyBlast
then place user into a defined ROLE
Looks like a next
generation Firewall
across your XYZ
Account Network.
RolesRulesServices
This is where, XYZ Account maybe familiar with the idea that as chaos or change rates within a particular network go up, so do your costs.
 Roles are Business level groupings built to correspond to specific user types.
 Rules are policies enforced at the port level to decide what types of traffic XYZ Account wants to allow, deny, rate limit or prioritize (No complicated scripting).
 Services are containers of similar Rules. Grouping Rules allows the Administrator to apply rules in groups rather than as individual components.
Policy Components (Cost to Chaos Ratio)
Roles
Faculty
Student
Guest
Rules
Allow, deny, rate limit,
prioritize. Or contain.
Services
PoS
Oracle
Guest
if X + Y,= Z then action
IT Admin Employee Guest
Oracle VPNAdmin.
AllowHTTP
AllowHTTPS
AllowIPSec
AllowSAP
RateLimit
AllowPing
AllowTelnet
AllowEmail
AllowTFTP
AllowSNMP
AllowOracle
DenyBlast
then place user into a defined ROLE
Looks like a next
generation Firewall
across your XYZ
Account Network.
RolesRulesServices
The XYZ Account first line of defense,
This is where Increase Safety. Lack of
visibility of critical assets is a problem with
substantial business impact
 Network can facilitate and assist with
implementing inpatient, ambulatory,
and clinical information systems with
security and reliability.
 Real-time location services for
inventory and asset tracking.
 Network analytics to provide real-time
tracking of patient status and
increase awareness on present patient
locations.
Asset Visibility
Asset
Location
Wi-Fi Tags
and Clients
RTLS Location Engine
(built-in)
Ekahau
Positioning
Engine
AeroScout
Engine
The XYZ Account first line of defense,
This is where Increase Safety. Lack of
visibility of critical assets is a problem with
substantial business impact
 Network can facilitate and assist with
implementing inpatient, ambulatory,
and clinical information systems with
security and reliability.
 Real-time location services for
inventory and asset tracking.
 Network analytics to provide real-time
tracking of patient status and
increase awareness on present patient
locations.
Asset Visibility
Asset
Location
Wi-Fi Tags
and Clients
RTLS Location Engine
(built-in)
Ekahau
Positioning
Engine
AeroScout
Engine
Device capabilities (clients),
 Constraints = certifications, drivers/software, power, durability, size
 Understand protocols/standards and channels supported
 Take measurements with device, understand Rx sensitivities
Coverage - How much? 2.4GHz or 5GHz? Choose one!
 Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal
 Always consider environmental elements, SNR & retries
 Match AP and Client Tx power; target symmetrical speeds
Interference
 Channel reuse and cell dimension critical – 20MHz high-density
 Static channel assignment to avoid CCI
 More power better Wi-Fi
Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime
 WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?
 Target below 50ms
 Consider wired network and traffic forwarding (L2/L3, local/centralized)
Quality of Service (QoS) - Does the client/application support marking?
 Never forget end-to-end QoS, Consider both voice signaling and encoding.
 Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.
 Use OKC if 802.11r/802.11k not available
VoWLAN Design Considerations
Device capabilities (clients),
 Constraints = certifications, drivers/software, power, durability, size
 Understand protocols/standards and channels supported
 Take measurements with device, understand Rx sensitivities
Coverage - How much? 2.4GHz or 5GHz? Choose one!
 Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal
 Always consider environmental elements, SNR & retries
 Match AP and Client Tx power; target symmetrical speeds
Interference
 Channel reuse and cell dimension critical – 20MHz high-density
 Static channel assignment to avoid CCI
 More power better Wi-Fi
Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime
 WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?
 Target below 50ms
 Consider wired network and traffic forwarding (L2/L3, local/centralized)
Quality of Service (QoS) - Does the client/application support marking?
 Never forget end-to-end QoS, Consider both voice signaling and encoding.
 Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.
 Use OKC if 802.11r/802.11k not available
VoWLAN Design Considerations
Device capabilities (clients),
 Constraints = certifications, drivers/software, power, durability, size
 Understand protocols/standards and channels supported
 Take measurements with device, understand Rx sensitivities
Coverage - How much? 2.4GHz or 5GHz? Choose one!
 Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal
 Always consider environmental elements, SNR & retries
 Match AP and Client Tx power; target symmetrical speeds
Interference
 Channel reuse and cell dimension critical – 20MHz high-density
 Static channel assignment to avoid CCI
 More power better Wi-Fi
Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime
 WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?
 Target below 50ms
 Consider wired network and traffic forwarding (L2/L3, local/centralized)
Quality of Service (QoS) - Does the client/application support marking?
 Never forget end-to-end QoS, Consider both voice signaling and encoding.
 Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.
 Use OKC if 802.11r/802.11k not available
VoWLAN Design Considerations
Wave 2 XYZ Account Considerations
The Edge deployment model is the most frequently used in the IAC
solution. This deployment model identifies and controls both wired and
wireless devices at the edge of the network with the main requirement
being that there is no additional networking equipment downstream of
the port where the device is being identified.
When identifying devices at the edge of the network a visibility
mechanism, typically authentication, needs to be enabled at every entry
point to the network. On edge switches, this requires enabling
authentication for each port. For wireless, this means enabling
authentication on the wireless SSID's. If there are multiple devices
attached to a single port of a switch, then multi-user authentication
needs to be enabled on the port in order to detect all devices and assign
them individual authentication sessions.
The VPN Remote Access deployment model allows IAC to identify devices
connected to the network through a compatible VPN concentrator.
Deployment spectrum recommendations - transmit Power (dBm) 5 GHz: Min
12/Max 15. 5GHz is the preferred Wi-Fi frequency for indoor use More
capacity, less interference compared to 2.4GHz. 5GHz should become
dominant for your client devices 2.4GHz should be left for Bluetooth,
ZigBee and RTLS (M2M). Unlicensed 5GHz spectrum is attractive for
service providers. New LTE-U/LAA services are coming; impact currently
unknown
 Beacon Rate (Mbps) By default lowest For both 802.11a and g radio
use 12 or 24.
 Multicast rate optimization enabled.
 Channels 80 MHz channels can be used in green field deployments. DFS
channels must be used when operating on 80 MHz channels (Remove
channel 144 from list).
 Rogue Devices can be Anywhere on the Network and can be
Encrypted. Identify Every Type of Rogue Device Connected to the
Network
 Track and Identify New Non-Wireless Devices
 Track Critical Assets to Identify Removal From Network
Wave 2 XYZ Account Considerations
The Edge deployment model is the most frequently used in the IAC
solution. This deployment model identifies and controls both wired and
wireless devices at the edge of the network with the main requirement
being that there is no additional networking equipment downstream of
the port where the device is being identified.
When identifying devices at the edge of the network a visibility
mechanism, typically authentication, needs to be enabled at every entry
point to the network. On edge switches, this requires enabling
authentication for each port. For wireless, this means enabling
authentication on the wireless SSID's. If there are multiple devices
attached to a single port of a switch, then multi-user authentication
needs to be enabled on the port in order to detect all devices and assign
them individual authentication sessions.
The VPN Remote Access deployment model allows IAC to identify devices
connected to the network through a compatible VPN concentrator.
Deployment spectrum recommendations - transmit Power (dBm) 5 GHz: Min
12/Max 15. 5GHz is the preferred Wi-Fi frequency for indoor use More
capacity, less interference compared to 2.4GHz. 5GHz should become
dominant for your client devices 2.4GHz should be left for Bluetooth,
ZigBee and RTLS (M2M). Unlicensed 5GHz spectrum is attractive for
service providers. New LTE-U/LAA services are coming; impact currently
unknown
 Beacon Rate (Mbps) By default lowest For both 802.11a and g radio
use 12 or 24.
 Multicast rate optimization enabled.
 Channels 80 MHz channels can be used in green field deployments. DFS
channels must be used when operating on 80 MHz channels (Remove
channel 144 from list).
 Rogue Devices can be Anywhere on the Network and can be
Encrypted. Identify Every Type of Rogue Device Connected to the
Network
 Track and Identify New Non-Wireless Devices
 Track Critical Assets to Identify Removal From Network
Manufacturing pov jeff green 2016 v2

Contenu connexe

Tendances

2011 WPC IAG IoT Booth training material 20111020 Eric Lo
2011 WPC IAG IoT Booth training material 20111020 Eric Lo2011 WPC IAG IoT Booth training material 20111020 Eric Lo
2011 WPC IAG IoT Booth training material 20111020 Eric Lo
Eric Lo
 
Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
PROFIBUS and PROFINET InternationaI - PI UK
 
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
Robert Rivenbark
 

Tendances (20)

Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2Sled local gov pov october 2016 v2
Sled local gov pov october 2016 v2
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
2011 WPC IAG IoT Booth training material 20111020 Eric Lo
2011 WPC IAG IoT Booth training material 20111020 Eric Lo2011 WPC IAG IoT Booth training material 20111020 Eric Lo
2011 WPC IAG IoT Booth training material 20111020 Eric Lo
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
 
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...Cisco Connect Ottawa 2018  Cisco digital buildings and the 4th utility   w co...
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
 
Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
 
Weaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for ServicesWeaving the Future - Enable Networks to Be More Agile for Services
Weaving the Future - Enable Networks to Be More Agile for Services
 
TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Journey to Software-Defined Cloud Networking
Journey to Software-Defined Cloud NetworkingJourney to Software-Defined Cloud Networking
Journey to Software-Defined Cloud Networking
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Cisco catalyst 4506 switch
Cisco catalyst 4506 switchCisco catalyst 4506 switch
Cisco catalyst 4506 switch
 
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
PCN InterMax IX1610-P Product Brochure rev 1-0 (1)
 
Electronics Division Linked In
Electronics Division   Linked InElectronics Division   Linked In
Electronics Division Linked In
 

Similaire à Manufacturing pov jeff green 2016 v2

Jeff Green April 2011 May V1
Jeff Green April 2011 May V1Jeff Green April 2011 May V1
Jeff Green April 2011 May V1
JeffGreenMichigan
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2
Jeff Green
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
Jeff Green
 

Similaire à Manufacturing pov jeff green 2016 v2 (20)

Jeff Green April 2011 May V1
Jeff Green April 2011 May V1Jeff Green April 2011 May V1
Jeff Green April 2011 May V1
 
D-Link Industrial Networking Brochure
D-Link Industrial Networking BrochureD-Link Industrial Networking Brochure
D-Link Industrial Networking Brochure
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN Solution
 
Services pov jeff green 2016 v2
Services pov jeff green 2016 v2Services pov jeff green 2016 v2
Services pov jeff green 2016 v2
 
Sa*ple
Sa*pleSa*ple
Sa*ple
 
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected EraWhite Box Hardware Challenges in the 5G & IoT Hyperconnected Era
White Box Hardware Challenges in the 5G & IoT Hyperconnected Era
 
Places in the network (featuring policy)
Places in the network (featuring policy)Places in the network (featuring policy)
Places in the network (featuring policy)
 
cisco-air-cap3602i-t-k9-datasheet.pdf
cisco-air-cap3602i-t-k9-datasheet.pdfcisco-air-cap3602i-t-k9-datasheet.pdf
cisco-air-cap3602i-t-k9-datasheet.pdf
 
remoteEye Preview
remoteEye PreviewremoteEye Preview
remoteEye Preview
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
Cisco io t part cisco industrial ethernet 4000 switches, designed for harsh c...
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
 
cisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdfcisco-air-cap3602i-e-k9-datasheet.pdf
cisco-air-cap3602i-e-k9-datasheet.pdf
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
cisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdfcisco-air-cap3602i-s-k9-datasheet.pdf
cisco-air-cap3602i-s-k9-datasheet.pdf
 
cisco-air-cap3602i-q-k9-datasheet.pdf
cisco-air-cap3602i-q-k9-datasheet.pdfcisco-air-cap3602i-q-k9-datasheet.pdf
cisco-air-cap3602i-q-k9-datasheet.pdf
 
cisco-air-cap3602i-a-k9-datasheet.pdf
cisco-air-cap3602i-a-k9-datasheet.pdfcisco-air-cap3602i-a-k9-datasheet.pdf
cisco-air-cap3602i-a-k9-datasheet.pdf
 
[Advantech] ADAM-3600 training kit and Taglink
[Advantech]  ADAM-3600 training kit and Taglink[Advantech]  ADAM-3600 training kit and Taglink
[Advantech] ADAM-3600 training kit and Taglink
 
PrasadResume
PrasadResumePrasadResume
PrasadResume
 

Plus de Jeff Green

Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
Jeff Green
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
Jeff Green
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
Jeff Green
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
Jeff Green
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabric
Jeff Green
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
Jeff Green
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
Jeff Green
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
Jeff Green
 

Plus de Jeff Green (20)

Where is the beef with 6 e
Where is the beef with 6 eWhere is the beef with 6 e
Where is the beef with 6 e
 
Where is the beef
Where is the beefWhere is the beef
Where is the beef
 
6 e security
6 e security6 e security
6 e security
 
Where is the 6 GHz beef?
Where is the 6 GHz beef?Where is the 6 GHz beef?
Where is the 6 GHz beef?
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)The next generation ethernet gangster (part 1)
The next generation ethernet gangster (part 1)
 
The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)The next generation ethernet gangster (part 3)
The next generation ethernet gangster (part 3)
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 
Elephant & mice flows
Elephant & mice flowsElephant & mice flows
Elephant & mice flows
 
Fortinet ngf w extreme policy
Fortinet ngf w extreme policyFortinet ngf w extreme policy
Fortinet ngf w extreme policy
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
Data center pov 2017 v3
Data center pov 2017 v3Data center pov 2017 v3
Data center pov 2017 v3
 
Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)Audio video ethernet (avb cobra net dante)
Audio video ethernet (avb cobra net dante)
 
Avb pov 2017 v2
Avb pov 2017 v2Avb pov 2017 v2
Avb pov 2017 v2
 
Layer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabricLayer 2 forwarding on an spb fabric
Layer 2 forwarding on an spb fabric
 
8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)8.) xo s as a platform (on off premise)
8.) xo s as a platform (on off premise)
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
 
10.) vxlan
10.) vxlan10.) vxlan
10.) vxlan
 
4.) switch performance (w features)
4.) switch performance (w features)4.) switch performance (w features)
4.) switch performance (w features)
 

Dernier

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 

Dernier (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

Manufacturing pov jeff green 2016 v2

  • 1. Multi-Rate1,2.5,5,10GigabitEdgePoE++ Multi-RateSpineLeafDesign(10,25,40,50,100Gigabit) X440-G2 (L3 - Value 1G to 10G) PoE Fiber DC Policy  SummitStack-V (WITHOUT any additional license required).  Upgradeable 10GbE (PN 16542 or 16543).  Policy built-in (simplicity with multi-auth). EXOS 21.1 or higher Value with Automation First Extreme Switch to support Cloud Value X460-G2 (Advanced L3 1-40G) Multirate Option PoE Fiber DC Policy Fit The Swiss Army Knife of Switches Half Duplex ½ & ½ 3 Models This is where: 10G on existing copper Cat5e and Cat6 extend the life of the installed cable plant. Great for 1:N Convergence. X620 (1OG Copper or Fiber) Speed Next Gen Edge Lowered TCO via Limited Lifetime Warrantee Wallplate AP AP + Camera Outdoor Wave 2 Multi-Gigabit Wireless High Density -pack or Wedge Facebook ExtremeSupport XoS Platform Config L2/L3 Analytics Any OS Any Bare Metal Switch Policy Disaggregated Switch CAPEX or OPEX (you choose)? Reduced Risk (just witness or take action) Time is the critical Factor with XYZ Account Services... Infrastructure Businessmodel Ownership Considerations Management Location  32 x 100Gb  64 x 50Gb  128 x 25Gb  128 x 10Gb  32 x 40Gb 96 x 10GbE Ports (via4x10Gb breakout) 8 x 10/25/40/ 50/100G 10G Next Gen: Spine Leaf X670 & X770 - Hyper Ethernet Common Features  Data Center Bridging (DCB) features  Low ~600 nsec chipset latency in cut through mode.  Same PSUs and Fans as X670s (Front to back or Back to Front) AC or DC. X670-G2 -72X (10GbE Spine Leaf) 72 10GbE X670-48x-4q (10GbE Spine Leaf) 48 10GbE & 4 QSFP+ QSFP+ 40G DAC Extreme Feature Packs Core Edge AVB OpenFlow Advance Edge 1588 PTP MPLS Direct Attach Optics License Extreme Switches include the license they normally need. Like any other software platform you have an upgrade path. QSPF28 100G DAC Thin & Crunchy XoS Platform with one track of software. Speed with Features (Simple). Metro Functionality like ATM or SONET Flexible Horizontal or Vertical stacking Purposed for Broadcom (ASICs) So What, Who cares? Deliver XYZ Account, the value of HP with the feature function of Cisco. XYZ Account Business Value WhyExtreme? Summit Summit Policy delivers automation.. Thick & Chewy Know and control the who, what, when, where and the user experience across your XYZ Account Network. Control with insight... WhyEnterasys? XYZ Account Strategic Asset Custom ASICs S & K Series Chantry Motorola Air Defense So What, Who cares? Flow Based Switching Simplicity w Policy Wired and Wireless 100% insourced support Today you get both Control So What, Who cares? Fit Speed Unique Value Unique Control Summit G2 Yesterday - Cabletron Changed the game w Structured wiring (remember Vampire taps, Coax ethernet ect.) Today - Extreme Delivers Structured networking Policy Summit Who? Where? When? Whatdevice? How? QuarantineRemediate Allow Authentication NAC Server Summit Netsite Advanced NAC Client Joe Smith XYZ Account Access Controlled Subnet Enforcement Point Network Access Control This is where if X + Y, then Z...  LLDP-MED  CDPv2  ELRP  ZTP If user matches a defined attribute value ACL QoS Then place user into a defined ROLE A port is what it is because?This is where you easily Identify the impact and Source of Interference Problems. Detailed Forensic Analysis  Device, Threats, Associations, Traffic, Signal and Location Trends  Record of Wireless Issues Network Trend Analysis  Historical Analysis of Intermittent Wireless Problems  Performance Trends a Spectrum Analysis for Interference Detection  Real-time Spectrograms  Proactive Detection of Application Impacting Interference Visualize RF Coverage  Real-time RF Visualizations  Proactive Monitoring and Alerting of Coverage Problem ADSP for faster Root Cause Forensic Analysis for SECURITY & COMPLIANCE. Event Sequence Classify Interference Sources Side-by-side Comparative Analysis Air Defense Application Experience FullContext App App Analytics App Stop the finger-pointing Application Network Response. Flow or Bit Bucket Collector 3 million Flows Sensors X460 IPFix 4000 Flows (2048 ingress, 2048 egress) Sensor PV-FC-180, S or K Series (Core Flow 2/ 1 Million Flows) Flow-based Access Points From the controller (8K Flows per AP or C35 is 24K Flows) Flows Why not do this in the network? 10110111011101110 101101110111011101 6 million Flows Business Value Context BW IP HTTP:// Apps Platform Automation Control Experience Solution Framework Is your network faster today than it was 3 years ago? Going forward it should deliver more, faster, different X430-G2 (L2 - 1G to 10G) PoE Distribute content from a single source to hundreds of displays Ethernet as a Utility (PoE) Injectors Up to 75 Watts XYZ AccountXYZ Account XYZ Account Network services delivering Converged Plant wide Ethernet Architectures for manufacturing and industrial environments  Physical Security - limit physical access to authorized personnel: areas, control panels, devices, cabling, and control room - escort and track visitors.  End-point Hardening - patch management, antivirus software as well as removal of unused applications, protocols, and services (IP or MAC-based Access Control).  Device Hardening - change management and restrictive access (IEEE802.1x Access Control, RADIUS and TACACS+). Hardened Ethernet 4- 1G SFP 8- 10/100/1000 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget All Ports Active Simultaneously -20 to + 70°C temperature range Fan-less Free Air Convection XYZ Account Network services delivering Converged Plant wide Ethernet Architectures for manufacturing and industrial environments  Physical Security - limit physical access to authorized personnel: areas, control panels, devices, cabling, and control room - escort and track visitors.  End-point Hardening - patch management, antivirus software as well as removal of unused applications, protocols, and services (IP or MAC-based Access Control).  Device Hardening - change management and restrictive access (IEEE802.1x Access Control, RADIUS and TACACS+). Hardened Ethernet 4- 1G SFP 8- 10/100/1000 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget All Ports Active Simultaneously -20 to + 70°C temperature range Fan-less Free Air Convection Old School Manufacturing Net (MAP) Token bus was standardized by IEEE standard 802.4. It was mainly used for industrial applications.  Token bus was used by General Motors for their Manufacturing Automation Protocol (MAP).  This is an application of the concepts used in token ring networks. The main difference is that the endpoints of the bus do not meet to form a physical ring.  The IEEE 802.4 Working Group is disbanded and the standard has been withdrawn by the IEEE. Old School Manufacturing Net (MAP) Token bus was standardized by IEEE standard 802.4. It was mainly used for industrial applications.  Token bus was used by General Motors for their Manufacturing Automation Protocol (MAP).  This is an application of the concepts used in token ring networks. The main difference is that the endpoints of the bus do not meet to form a physical ring.  The IEEE 802.4 Working Group is disbanded and the standard has been withdrawn by the IEEE. Networking Technologies in Manufacturing The US market is dominated by the CIP networks where Ethernet/IP is overtaking Device Net in terms of market shares. Runners-up are PROFIBUS and Ether CAT  Fieldbuses most widely used type of network with 66% of the market. Industrial Ethernet networks - 34%  Machine-to-machine (M2M) — essential for smart factories and the largest value driver for manufacturers.  Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion, Cisco white paper, February 2013. – HMS Industrial Networks Networking Technologies in Manufacturing The US market is dominated by the CIP networks where Ethernet/IP is overtaking Device Net in terms of market shares. Runners-up are PROFIBUS and Ether CAT  Fieldbuses most widely used type of network with 66% of the market. Industrial Ethernet networks - 34%  Machine-to-machine (M2M) — essential for smart factories and the largest value driver for manufacturers.  Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion, Cisco white paper, February 2013. – HMS Industrial Networks Automation on the Factory Floor This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts as the technology enabler for the convergence of industrial and enterprise networks.  KPIs - By gaining timely access to key performance indicators (KPIs) make business decisions from real time information.  Ethernet-to-the-Factory, provide users with the foundation for success to deploy the latest technology.  Recognize - There are cultural and technical challenges to network convergence. Automation on the Factory Floor This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts as the technology enabler for the convergence of industrial and enterprise networks.  KPIs - By gaining timely access to key performance indicators (KPIs) make business decisions from real time information.  Ethernet-to-the-Factory, provide users with the foundation for success to deploy the latest technology.  Recognize - There are cultural and technical challenges to network convergence. SCADA / PLCs (Plant Floor Challenges) Where is SCADA used? When you move from a 3 tier network - Device / Control / Info network – to converged network – there are many variables  When moving to a plant-wide Ethernet network, more considerations (ie. Isolate or Segment traffic – security, QOS Contain traffic in one area).  Sustaining Availability (keep the automation and control systems operational) and Integrity - protects data and systems from intentional or accidental alteration.  Customer Examples include Water and Wastewater, Power, Oil and Gas, Research facilities, Transportation, Security systems, Siren systems, Irrigation, Communication control SCADA / PLCs (Plant Floor Challenges) Where is SCADA used? When you move from a 3 tier network - Device / Control / Info network – to converged network – there are many variables  When moving to a plant-wide Ethernet network, more considerations (ie. Isolate or Segment traffic – security, QOS Contain traffic in one area).  Sustaining Availability (keep the automation and control systems operational) and Integrity - protects data and systems from intentional or accidental alteration.  Customer Examples include Water and Wastewater, Power, Oil and Gas, Research facilities, Transportation, Security systems, Siren systems, Irrigation, Communication control Manufacturing Technology Vendors Adoption of standards-based technologies that eliminate the need to support separate, closed, factory floor- networks plus delivers an increase in plant flexibility and accelerate moves, adds, and changes  Schneider Electric, ABB, Legrand, Omron, Siemens, Eaton, Cisco/Rockwell.  Schneider Electric/Invensys is Extreme s biggest customer in this vertical  Extreme provides switches to Schneider for their internal networks, and they bundle our switches for them to OEM in their PLC (Programmable Logic Controller) offerings to sell through distribution to their integrators Manufacturing Technology Vendors Adoption of standards-based technologies that eliminate the need to support separate, closed, factory floor- networks plus delivers an increase in plant flexibility and accelerate moves, adds, and changes  Schneider Electric, ABB, Legrand, Omron, Siemens, Eaton, Cisco/Rockwell.  Schneider Electric/Invensys is Extreme s biggest customer in this vertical  Extreme provides switches to Schneider for their internal networks, and they bundle our switches for them to OEM in their PLC (Programmable Logic Controller) offerings to sell through distribution to their integrators This is where, XYZ Account can segmenting plant floor networks from company wide networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate the network level between the Industrial and Enterprise Zones.  Extreme automated security policy for helping secure manufacturing assets.  IAM for defense-in-depth security approach that addresses internal security threats with support for both wired and wireless access methods.  Availability with 50 ms failover through Ethernet Rings with QoS buckets needs to be applied as a service Ethernet like a MUX Industrial Demilitarized Zone (IDMZ) B D E C A B D E C A X Spanning Tree Root Node Or EAPS Master FAILURE B D E C A B D E C A B D E C A Spanning Tree Re- Convergence Messages  Complex & Slow  Exponentially worse as more nodes added Recovered Network Healthy Network EAPS Re- Convergence Messages  Deterministic & Fast  Simple scaling as more nodes added Failure Re-convergence Recovery EAPS: Simpler, faster Ethernet Rings (without STP) SONET like Ethernet Bus Looks like DMZ VOIP Guest WiFi VoIP DMZ WiFi Guest Guest WiFi VoIP Guest WiFi VoIP WiFi VoIP IP or MAC IP or MAC IP or MAC IP or MAC This is where, XYZ Account can segmenting plant floor networks from company wide networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate the network level between the Industrial and Enterprise Zones.  Extreme automated security policy for helping secure manufacturing assets.  IAM for defense-in-depth security approach that addresses internal security threats with support for both wired and wireless access methods.  Availability with 50 ms failover through Ethernet Rings with QoS buckets needs to be applied as a service Ethernet like a MUX Industrial Demilitarized Zone (IDMZ) B D E C A B D E C A X Spanning Tree Root Node Or EAPS Master FAILURE B D E C A B D E C A B D E C A Spanning Tree Re- Convergence Messages  Complex & Slow  Exponentially worse as more nodes added Recovered Network Healthy Network EAPS Re- Convergence Messages  Deterministic & Fast  Simple scaling as more nodes added Failure Re-convergence Recovery EAPS: Simpler, faster Ethernet Rings (without STP) SONET like Ethernet Bus Looks like DMZ VOIP Guest WiFi VoIP DMZ WiFi Guest Guest WiFi VoIP Guest WiFi VoIP WiFi VoIP IP or MAC IP or MAC IP or MAC IP or MAC Multi-discipline Industrial Network Convergence. Ethernet with ATM like QoS delivers toll- quality voice even under adverse congestion conditions...  low latency (.1ms),  low jitter (.01ms)  zero packet loss Disparate V Single Technology Vertically To Horizontally VoiceVideo Sensor PlantSiteNetwork I/ONetwork SafetyNetwork DriveNetwork Switching & Routing Enhanced Services Performance w features turned on. L2 SONET Like convergence Multi-discipline Industrial Network Convergence. Ethernet with ATM like QoS delivers toll- quality voice even under adverse congestion conditions...  low latency (.1ms),  low jitter (.01ms)  zero packet loss Disparate V Single Technology Vertically To Horizontally VoiceVideo Sensor PlantSiteNetwork I/ONetwork SafetyNetwork DriveNetwork Switching & Routing Enhanced Services Performance w features turned on. L2 SONET Like convergence Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588 precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded switch technology - Transparent Clock - Ring and Linear topologies  Real-time updates and alerts & Schedule/event triggers  Interactive venue maps & Point of interest filters  Wayfinding or Guest location discovery 1588 precision time protocol (PTP): BEACONS WI-FI GPS Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588 precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded switch technology - Transparent Clock - Ring and Linear topologies  Real-time updates and alerts & Schedule/event triggers  Interactive venue maps & Point of interest filters  Wayfinding or Guest location discovery 1588 precision time protocol (PTP): BEACONS WI-FI GPS In a plant, it is not just about data... Extreme becomes an enabler with open secure Infrastructure with integrated control and information. Industrial Networks Needs  Better asset utilization - lean initiatives (training, support, and inventory)Capture & Record every application flow network-wide >100M Sessions (Quickly Identify Network vs. Application Performance Problems).  One Common network through converged Extreme technologies (information sharing, common design).  Mobility - Measure and Trend Application Behavior to maximize investments and minimize risks Status updates from the cloud Everything has a URL Cameras Energy Control Sensors Zero Config Mobility Automated alerts In a plant, it is not just about data... Extreme becomes an enabler with open secure Infrastructure with integrated control and information. Industrial Networks Needs  Better asset utilization - lean initiatives (training, support, and inventory)Capture & Record every application flow network-wide >100M Sessions (Quickly Identify Network vs. Application Performance Problems).  One Common network through converged Extreme technologies (information sharing, common design).  Mobility - Measure and Trend Application Behavior to maximize investments and minimize risks Status updates from the cloud Everything has a URL Cameras Energy Control Sensors Zero Config Mobility Automated alerts XYZ Account Network services delivering Converged Plant wide Ethernet Architectures for manufacturing and industrial environments  Physical Security - limit physical access to authorized personnel: areas, control panels, devices, cabling, and control room - escort and track visitors.  End-point Hardening - patch management, antivirus software as well as removal of unused applications, protocols, and services (IP or MAC-based Access Control).  Device Hardening - change management and restrictive access (IEEE802.1x Access Control, RADIUS and TACACS+). Hardened Ethernet 4- 1G SFP 8- 10/100/1000 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget All Ports Active Simultaneously -20 to + 70°C temperature range Fan-less Free Air Convection Old School Manufacturing Net (MAP) Token bus was standardized by IEEE standard 802.4. It was mainly used for industrial applications.  Token bus was used by General Motors for their Manufacturing Automation Protocol (MAP).  This is an application of the concepts used in token ring networks. The main difference is that the endpoints of the bus do not meet to form a physical ring.  The IEEE 802.4 Working Group is disbanded and the standard has been withdrawn by the IEEE. Networking Technologies in Manufacturing The US market is dominated by the CIP networks where Ethernet/IP is overtaking Device Net in terms of market shares. Runners-up are PROFIBUS and Ether CAT  Fieldbuses most widely used type of network with 66% of the market. Industrial Ethernet networks - 34%  Machine-to-machine (M2M) — essential for smart factories and the largest value driver for manufacturers.  Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion, Cisco white paper, February 2013. – HMS Industrial Networks Automation on the Factory Floor This is where, Proximity + Identity + Time = Contextual Insight. This deployment acts as the technology enabler for the convergence of industrial and enterprise networks.  KPIs - By gaining timely access to key performance indicators (KPIs) make business decisions from real time information.  Ethernet-to-the-Factory, provide users with the foundation for success to deploy the latest technology.  Recognize - There are cultural and technical challenges to network convergence. SCADA / PLCs (Plant Floor Challenges) Where is SCADA used? When you move from a 3 tier network - Device / Control / Info network – to converged network – there are many variables  When moving to a plant-wide Ethernet network, more considerations (ie. Isolate or Segment traffic – security, QOS Contain traffic in one area).  Sustaining Availability (keep the automation and control systems operational) and Integrity - protects data and systems from intentional or accidental alteration.  Customer Examples include Water and Wastewater, Power, Oil and Gas, Research facilities, Transportation, Security systems, Siren systems, Irrigation, Communication control Manufacturing Technology Vendors Adoption of standards-based technologies that eliminate the need to support separate, closed, factory floor- networks plus delivers an increase in plant flexibility and accelerate moves, adds, and changes  Schneider Electric, ABB, Legrand, Omron, Siemens, Eaton, Cisco/Rockwell.  Schneider Electric/Invensys is Extreme s biggest customer in this vertical  Extreme provides switches to Schneider for their internal networks, and they bundle our switches for them to OEM in their PLC (Programmable Logic Controller) offerings to sell through distribution to their integrators This is where, XYZ Account can segmenting plant floor networks from company wide networks by using built-in VRs as an Industrial Demilitarized Zone (IDMZ) to separate the network level between the Industrial and Enterprise Zones.  Extreme automated security policy for helping secure manufacturing assets.  IAM for defense-in-depth security approach that addresses internal security threats with support for both wired and wireless access methods.  Availability with 50 ms failover through Ethernet Rings with QoS buckets needs to be applied as a service Ethernet like a MUX Industrial Demilitarized Zone (IDMZ) B D E C A B D E C A X Spanning Tree Root Node Or EAPS Master FAILURE B D E C A B D E C A B D E C A Spanning Tree Re- Convergence Messages  Complex & Slow  Exponentially worse as more nodes added Recovered Network Healthy Network EAPS Re- Convergence Messages  Deterministic & Fast  Simple scaling as more nodes added Failure Re-convergence Recovery EAPS: Simpler, faster Ethernet Rings (without STP) SONET like Ethernet Bus Looks like DMZ VOIP Guest WiFi VoIP DMZ WiFi Guest Guest WiFi VoIP Guest WiFi VoIP WiFi VoIP IP or MAC IP or MAC IP or MAC IP or MAC Multi-discipline Industrial Network Convergence. Ethernet with ATM like QoS delivers toll- quality voice even under adverse congestion conditions...  low latency (.1ms),  low jitter (.01ms)  zero packet loss Disparate V Single Technology Vertically To Horizontally VoiceVideo Sensor PlantSiteNetwork I/ONetwork SafetyNetwork DriveNetwork Switching & Routing Enhanced Services Performance w features turned on. L2 SONET Like convergence Implementing CIP Sync time synchronization on Ethernet/IP utilizing 1EEE 1588 precision time protocol (PTP): Transparent Clock and Boundary Clock Embedded switch technology - Transparent Clock - Ring and Linear topologies  Real-time updates and alerts & Schedule/event triggers  Interactive venue maps & Point of interest filters  Wayfinding or Guest location discovery 1588 precision time protocol (PTP): BEACONS WI-FI GPS In a plant, it is not just about data... Extreme becomes an enabler with open secure Infrastructure with integrated control and information. Industrial Networks Needs  Better asset utilization - lean initiatives (training, support, and inventory)Capture & Record every application flow network-wide >100M Sessions (Quickly Identify Network vs. Application Performance Problems).  One Common network through converged Extreme technologies (information sharing, common design).  Mobility - Measure and Trend Application Behavior to maximize investments and minimize risks Status updates from the cloud Everything has a URL Cameras Energy Control Sensors Zero Config Mobility Automated alerts
  • 2. Heading XYZ Account 2016 DesignExtremeEdgePoE ExtremeCore10G 2016 Design 1G 2.5G/5G 10G 40G Jeff Green 2016 Rev. 1 Florida Legend Legend PoE 802.3at (PoE+) Cat5e 30W 30W30W 60W UPOE No Cabling Change from PoE+ Cat5e NBASE-T Alliance Copper Max Distances Cat 7 Shielded 100 m Cat 6a Shielded 100 m Cat 6a Unshielded 100 m Cat 6 Shielded** 100 m Cat 6 Unshielded** 55 m Need Correct UTP, Patch Panel and Adapter. known as IEEE 802.3bz Greenfield - Cat 6a (2.5, 5G & 10G) 100m Cat 6 (2.5G, 5G & 10G) 55m Brownfield - Cat 5e (2.5&5G) 100M Requires X620 or X460 Switch for Multi-rate Support plus Client that supports Multi-rate. 10G Passive (PN 10306 ~ 5m, 10307~ 10M) 10G SFP+ Active copper cable (upto 100m) 40G Passive (PN 10321 ~3m, 10323~ 5m) 40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m) 40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4- F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, ) 10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m) SFP+ DAC Cables QSFP+ DAC Cables 10 LRM 220m (720ft/plus mode conditioning) (PN 10303) 10GBASE-T over Class E Cat 6 (55M) (10G) 10GBASE-T over Class E Cat 6a or 7 (100M) (10G) 10 SR over OM3 (300M) or OM4 (400M) (PN 10301) 10 LR over single mode (10KM) 1310nm (PN 10302) 10 ER over single mode (40KM) 1550nm (PN 10309) 10 ZR over single mode (80KM) 1550nm (PN 10310) 802.3bz 10GBASE-T (100M) for Cat 6 (5G) 10G Fiber 10G Copper 802.3bz 10GBASE-T (100M) for Cat 5e (2.5G) OM3 50 µm (550m/SX) Laser, LC (PN 10051H) OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H) OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H) OM4 50 µm (550m/SX) 2Km, LC (PN 10051H) 1G Fiber (50 µm) 1G Fiber (62.5 µm) Single-fiber transmission uses only one strand of fiber for both transmit and receive (1310nm and 1490nm for 1Gbps; 1310nm and 1550nm for 100Mbps) LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H) ZX SMF 70km, LC (PN 10053H) 10/100/1000 (UTP to 100m) SFP (PN 1070H) SR4 at least 100 m OM3 MMF (PN 10319) SR4 at least 125 m OM4 MMF (PN 10319) LR4 at least 10 km SMF, LC (PN 10320) LM4 140m MMF or 1kM SMF, LC (PN 10334) Optics Optics + Fan-out Fiber Cable QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter ER4 40km SMF, LC (PN 10335) Internal CWDM transits four wavelengths over single fiber. MPO to 4 x LC Fanout 10m (PN 10327) for use with (PN 10326) MPO to 4 x LC duplex connectors, SMF LR4 Parallel SM, 10km SMF, MPO (PN 10326) 25/50/100G CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M)) SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M)) SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center) LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus) ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro) Optics and DAC Cables Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments, unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration. Proprietary got you Keyed Optics ModelNumber Description 10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC 10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC 10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC 10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux MUX-RACK-01 Rack mount kit for MUX-CWDM-01 40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC CWDM MUX-CWDM-01 DACs Notes: Collapsed (1-tier) Spine Summit Summit Spine Leaf Storage Summit Management Storage Summit Storage Summit Storage Summit Storage Summit Storage Summit Summit Summit 4 x 72 =248 10Gs Preparation Netsite Operation Motion Each network-tier adds another two hops, which adds latency. Latency can impact system performance and CPU cycles. FCOE looks like legacy Fibre Channel and eliminates the processing overhead associated w TCP/IP. Ultralow Latency Non-Blocking, Lossless Fabric, Lossless Ethernet, Virtualization, Convergence 2.0 (Microseconds') Collapsed (1-tier) Spine Summit Summit Spine Leaf Storage Summit Management Storage Summit Storage Summit Storage Summit Storage Summit Storage Summit Summit Summit 4 x 72 =248 10Gs Preparation Netsite Operation Motion Each network-tier adds another two hops, which adds latency. Latency can impact system performance and CPU cycles. FCOE looks like legacy Fibre Channel and eliminates the processing overhead associated w TCP/IP. Ultralow Latency Non-Blocking, Lossless Fabric, Lossless Ethernet, Virtualization, Convergence 2.0 (Microseconds') Traditional control LDAP NAC DHCP Radius Captive Portal DNS MDMLDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control LDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control NAC Analytics Netsite Extreme (Wired and wireless) Control Cloud Based control On-prim / off-prim Traditional control LDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control NAC Analytics Netsite Extreme (Wired and wireless) Control Cloud Based control On-prim / off-prim Extreme and selected microwave gear In the Extreme Networks microwave transportation implementation, there were several options for the L2 hello protocol that would satisfy the reliability requirements. The two primary options considered were 802.1AG Continuity Check Messages (CCM) and Extreme Link Status Monitoring (ELSM). The architecture of the microwave radios and the virtual chassis at each location is critical so that no single point of failure can impact the mission.  Flap Timers: The Extreme Networks implementation of G.8032 incorporates flap-timers to mitigate the network impact of high-speed failure/recovery operations within the network. For example, if a crane were to spin around near to a roof-top microwave transmitter, the link might fluctuate as the crane spun into and out of the microwave signal. In a lesser network design the link would flap which means it would fail and restore constantly and might potentially cause an interruption of service each time the link flapped.  Spanning Tree to Slow: In implementations such as spanning tree convergence might be slow enough that the network would remain out of service as the link fluctuated. After some engineering discussion it was determined to set the programmable G.8032 wait-to-restore timer to five seconds.  Hello Protocols: Since microwave link failures can find their origin in thunderstorms, fog, ice, intermediate transport domain failures, or even moving machinery, each link in the network must have a hello protocol implemented which enables the detection of logical faults. On a LAG port, these hello timers must operate on each link of the LAG. This means that the link is now intelligent enough to wait until the physical link has been stable for 5000ms before moving traffic onto it. By the way, this is why G.8032 restorals are so lightning fast. Extreme and selected microwave gear In the Extreme Networks microwave transportation implementation, there were several options for the L2 hello protocol that would satisfy the reliability requirements. The two primary options considered were 802.1AG Continuity Check Messages (CCM) and Extreme Link Status Monitoring (ELSM). The architecture of the microwave radios and the virtual chassis at each location is critical so that no single point of failure can impact the mission.  Flap Timers: The Extreme Networks implementation of G.8032 incorporates flap-timers to mitigate the network impact of high-speed failure/recovery operations within the network. For example, if a crane were to spin around near to a roof-top microwave transmitter, the link might fluctuate as the crane spun into and out of the microwave signal. In a lesser network design the link would flap which means it would fail and restore constantly and might potentially cause an interruption of service each time the link flapped.  Spanning Tree to Slow: In implementations such as spanning tree convergence might be slow enough that the network would remain out of service as the link fluctuated. After some engineering discussion it was determined to set the programmable G.8032 wait-to-restore timer to five seconds.  Hello Protocols: Since microwave link failures can find their origin in thunderstorms, fog, ice, intermediate transport domain failures, or even moving machinery, each link in the network must have a hello protocol implemented which enables the detection of logical faults. On a LAG port, these hello timers must operate on each link of the LAG. This means that the link is now intelligent enough to wait until the physical link has been stable for 5000ms before moving traffic onto it. By the way, this is why G.8032 restorals are so lightning fast. CJIS & FIPS-140 RELIABILITY TO GO: NETMOTION WIRELESS MOBILITY XE MOBILE VPN Introduce a separate control plane to Ensure that users are authorized is of greater concern in a mobile deployment where devices can more easily be misplaced, lost or stolen.  CJIS Authentication -Law enforcement agencies face increasingly stringent requirements for authentication, which is required to access federal criminal databases  FIPS 140-2 validated AES encryption secures data sessions as devices traverse networks.  Persistence through coverage gaps, areas of weak signal strength, or when users suspend their devices; applications pause, then resume when a connection returns. CJIS & FIPS-140 RELIABILITY TO GO: NETMOTION WIRELESS MOBILITY XE MOBILE VPN Introduce a separate control plane to Ensure that users are authorized is of greater concern in a mobile deployment where devices can more easily be misplaced, lost or stolen.  CJIS Authentication -Law enforcement agencies face increasingly stringent requirements for authentication, which is required to access federal criminal databases  FIPS 140-2 validated AES encryption secures data sessions as devices traverse networks.  Persistence through coverage gaps, areas of weak signal strength, or when users suspend their devices; applications pause, then resume when a connection returns. Video Arraignment Why Extreme for Smart City? Every WLAN We Design Must Support Real-Time Applications delivering more real-time access to information, better collaboration & enhanced situational awareness.  Increase security for Public safety with built-in NAC perimeter control.  Decrease operational expense through policy automation Implement interoperability among agencies  Better control City infrastructure upgrades, featuring L2 failover and hardening for emergency/disaster readiness Legislative / Courts Infrastructure Video Arraignment Why Extreme for Smart City? Every WLAN We Design Must Support Real-Time Applications delivering more real-time access to information, better collaboration & enhanced situational awareness.  Increase security for Public safety with built-in NAC perimeter control.  Decrease operational expense through policy automation Implement interoperability among agencies  Better control City infrastructure upgrades, featuring L2 failover and hardening for emergency/disaster readiness Legislative / Courts Infrastructure
  • 3. Heading XYZ Account 2016 DesignExtremeEdgePoE ExtremeCore10G 2016 Design 1G 2.5G/5G 10G 40G Jeff Green 2016 Rev. 1 Florida Legend Legend PoE 802.3at (PoE+) Cat5e 30W 30W30W 60W UPOE No Cabling Change from PoE+ Cat5e NBASE-T Alliance Copper Max Distances Cat 7 Shielded 100 m Cat 6a Shielded 100 m Cat 6a Unshielded 100 m Cat 6 Shielded** 100 m Cat 6 Unshielded** 55 m Need Correct UTP, Patch Panel and Adapter. known as IEEE 802.3bz Greenfield - Cat 6a (2.5, 5G & 10G) 100m Cat 6 (2.5G, 5G & 10G) 55m Brownfield - Cat 5e (2.5&5G) 100M Requires X620 or X460 Switch for Multi-rate Support plus Client that supports Multi-rate. 10G Passive (PN 10306 ~ 5m, 10307~ 10M) 10G SFP+ Active copper cable (upto 100m) 40G Passive (PN 10321 ~3m, 10323~ 5m) 40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m) 40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4- F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, ) 10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m) SFP+ DAC Cables QSFP+ DAC Cables 10 LRM 220m (720ft/plus mode conditioning) (PN 10303) 10GBASE-T over Class E Cat 6 (55M) (10G) 10GBASE-T over Class E Cat 6a or 7 (100M) (10G) 10 SR over OM3 (300M) or OM4 (400M) (PN 10301) 10 LR over single mode (10KM) 1310nm (PN 10302) 10 ER over single mode (40KM) 1550nm (PN 10309) 10 ZR over single mode (80KM) 1550nm (PN 10310) 802.3bz 10GBASE-T (100M) for Cat 6 (5G) 10G Fiber 10G Copper 802.3bz 10GBASE-T (100M) for Cat 5e (2.5G) OM3 50 µm (550m/SX) Laser, LC (PN 10051H) OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H) OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H) OM4 50 µm (550m/SX) 2Km, LC (PN 10051H) 1G Fiber (50 µm) 1G Fiber (62.5 µm) Single-fiber transmission uses only one strand of fiber for both transmit and receive (1310nm and 1490nm for 1Gbps; 1310nm and 1550nm for 100Mbps) LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H) ZX SMF 70km, LC (PN 10053H) 10/100/1000 (UTP to 100m) SFP (PN 1070H) SR4 at least 100 m OM3 MMF (PN 10319) SR4 at least 125 m OM4 MMF (PN 10319) LR4 at least 10 km SMF, LC (PN 10320) LM4 140m MMF or 1kM SMF, LC (PN 10334) Optics Optics + Fan-out Fiber Cable QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter ER4 40km SMF, LC (PN 10335) Internal CWDM transits four wavelengths over single fiber. MPO to 4 x LC Fanout 10m (PN 10327) for use with (PN 10326) MPO to 4 x LC duplex connectors, SMF LR4 Parallel SM, 10km SMF, MPO (PN 10326) 25/50/100G CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M)) SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M)) SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center) LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus) ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro) Optics and DAC Cables Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments, unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration. Proprietary got you Keyed Optics ModelNumber Description 10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC 10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC 10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC 10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux MUX-RACK-01 Rack mount kit for MUX-CWDM-01 40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC CWDM MUX-CWDM-01 DACs Notes: vMAN untagged vMAN Tagged I/O I/OPort Port Content Two Scheduling Algorithms  Strict Priority  CIR/PR bandwidth based control Packet Classification  Any data field could be used to classify the packet  Classify all packet types: untagged, single-tagged or double tagged Carrier-Class Availability  H/W: 1:1 MSM  S/W: Hitless Failover/Upgrades  Network: EAPS Flexible VLAN/vMAN handling (remapping/ translation) functionality  Ingress remapping  Egress translation  NNI translation Video Source Video Source HD TV TVoD, VoD Video Source Video Source Voice gateway Voice/Video Telephony Data Center Backup, ERP Internet Video Source Video Source HD TV TVoD, VoD Video Source Video Source Voice gateway Voice/Video Telephony Data Center Backup, ERP Internet Simplicity may enable XYZ Account s next killer app Today no single technology can drive this trillion dollar market forward However, today s complex network environments delay the deployment of new technology while inflicting more and more support cost each year. The world is converging on IP & Ethernet. After all technology convergence should produce simplicity. Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Multi-Switch LAG MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking solution tp meet today s requirements of time, cost, security and service level?  Combine ports on two switches to form a single logical connection  The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).  Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC) Service 1 Service 2 ISCISCSwitch 1 Switch 2 XYZ Account Services anywhere... Multi-Switch LAG MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking solution tp meet today s requirements of time, cost, security and service level?  Combine ports on two switches to form a single logical connection  The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).  Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC) Service 1 Service 2 ISCSwitch 1 Switch 2 XYZ Account Services anywhere... LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAGLAGLAGLAGLAGLAGLAGLAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAG LAGLAGLAGLAGLAGLAGLAGLAGLAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG L2 L3 L2 L3 L2 L3 L2 L3 XYZ Account Design Requirements  Ensure business and operational continuity (Ensure long term consistency).  Reduce overall costs (Ensure long term investment protection).  Minimize transformation risks (Improve level of service). Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Remote Server Single SSID Multi-Switch LAG MLAG Operation – Looks like one big switch to remote sites. Extreme can deliver XYZ Account a networking solution tp meet today s requirements of time, cost, security and service level?  Combine ports on two switches to form a single logical connection  The remote end of the connection can be either a server or a switch. Configured with a regular LAG (or appropriate server port teaming) to form the port aggregation (e.g. no STP type of port blocking).  Basic operation requires 2 ExtremeXOS switches interconnected by an Inter-Switch connection (ISC) Service 1 Service 2 ISCSwitch 1 Switch 2 XYZ Account Services anywhere... LAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAG LAGLAGLAGLAG L2 L3 L2 L3 XYZ Account Design Requirements  Ensure business and operational continuity (Ensure long term consistency).  Reduce overall costs (Ensure long term investment protection).  Minimize transformation risks (Improve level of service). Single SSID 10GbE Link SummitStack-160SummitStack-160 This is where, X460s will be connected QSPF Direct Attach Cables (DAC) for a total of 160GbE of stacking.  Each switch would have a single 10GbE fiber connection using either LR (10Km or less), ER (40Km or less), or ZR (80Km or less) for ring redundancy. A total of two (2) 10GbE links per school built on a ring topology.  The X460-G2-10G supports IEEE 802.1 Audio Video Bridging to enable reliable, real-time audio/ video transmission over Ethernet. AVB technology delivers the quality of service required for today s high-definition and time-sensitive multimedia streams.  7The Summit X460-G2-10G supports SDN Openflow in addition to NetFlow and IPFix. Single SSID 10GbE Link SummitStack-160 This is where, X460s will be connected QSPF Direct Attach Cables (DAC) for a total of 160GbE of stacking.  Each switch would have a single 10GbE fiber connection using either LR (10Km or less), ER (40Km or less), or ZR (80Km or less) for ring redundancy. A total of two (2) 10GbE links per school built on a ring topology.  The X460-G2-10G supports IEEE 802.1 Audio Video Bridging to enable reliable, real-time audio/ video transmission over Ethernet. AVB technology delivers the quality of service required for today s high-definition and time-sensitive multimedia streams.  7The Summit X460-G2-10G supports SDN Openflow in addition to NetFlow and IPFix. X460 Analytics lite Option 1) Single SSID 10GbE Link SummitStack-160 This is where, X460s will be connected QSPF Direct Attach Cables (DAC) for a total of 160GbE of stacking.  Each switch would have a single 10GbE fiber connection using either LR (10Km or less), ER (40Km or less), or ZR (80Km or less) for ring redundancy. A total of two (2) 10GbE links per school built on a ring topology.  The X460-G2-10G supports IEEE 802.1 Audio Video Bridging to enable reliable, real-time audio/ video transmission over Ethernet. AVB technology delivers the quality of service required for today s high-definition and time-sensitive multimedia streams.  7The Summit X460-G2-10G supports SDN Openflow in addition to NetFlow and IPFix. X460 Analytics lite Option 1) Single SSIDSingle SSID SSA Analytics (Option 2) 2-10GbE VSB Links 10GbE Link  Virtual Switch Bonding (VSB) for Redundancy at the Edge. Advanced Routing featuring LSNAT (Load Sharing Network Address Translation) for load balancing of clustered assets.  1 Million Flows of Unsampled NetFlow for Data Analytics collection.  MACsec Encryption to maintain confidentiality of transmitted data and to take measures against frames transmitted or modified by unauthorized devices. SSA-180 at the XYZ Account Edge... Single SSID SSA Analytics (Option 2) 2-10GbE VSB Links 10GbE Link  Virtual Switch Bonding (VSB) for Redundancy at the Edge. Advanced Routing featuring LSNAT (Load Sharing Network Address Translation) for load balancing of clustered assets.  1 Million Flows of Unsampled NetFlow for Data Analytics collection.  MACsec Encryption to maintain confidentiality of transmitted data and to take measures against frames transmitted or modified by unauthorized devices. SSA-180 at the XYZ Account Edge... Single SSID Industrial Edge w PoE (Option 3) 4- 1G SFP 8- 10/100 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget Single SSID Industrial Edge w PoE (Option 3) 4- 1G SFP 8- 10/100 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget Single SSID Wave 2 Multirate Edge w PoE++ (Option 4) This is where: 10G on existing copper Cat5e and Cat6 extend the life of the installed cable plant. Great for 1:N Convergence. X620 (1OG Copper or Fiber) Speed Next Gen Edge Lowered TCO via Limited Lifetime Warrantee Single SSID Wave 2 Multirate Edge w PoE++ (Option 4) This is where: 10G on existing copper Cat5e and Cat6 extend the life of the installed cable plant. Great for 1:N Convergence. X620 (1OG Copper or Fiber) Speed Next Gen Edge Lowered TCO via Limited Lifetime Warrantee Single SSID 10GbE Link SummitStack-160 This is where, X460s will be connected QSPF Direct Attach Cables (DAC) for a total of 160GbE of stacking.  Each switch would have a single 10GbE fiber connection using either LR (10Km or less), ER (40Km or less), or ZR (80Km or less) for ring redundancy. A total of two (2) 10GbE links per school built on a ring topology.  The X460-G2-10G supports IEEE 802.1 Audio Video Bridging to enable reliable, real-time audio/ video transmission over Ethernet. AVB technology delivers the quality of service required for today s high-definition and time-sensitive multimedia streams.  7The Summit X460-G2-10G supports SDN Openflow in addition to NetFlow and IPFix. X460 Analytics lite Option 1) Single SSID SSA Analytics (Option 2) 2-10GbE VSB Links 10GbE Link  Virtual Switch Bonding (VSB) for Redundancy at the Edge. Advanced Routing featuring LSNAT (Load Sharing Network Address Translation) for load balancing of clustered assets.  1 Million Flows of Unsampled NetFlow for Data Analytics collection.  MACsec Encryption to maintain confidentiality of transmitted data and to take measures against frames transmitted or modified by unauthorized devices. SSA-180 at the XYZ Account Edge... Single SSID Industrial Edge w PoE (Option 3) 4- 1G SFP 8- 10/100 RJ-45 POE+ 12 Port Switch 240 Watt PoE Budget Single SSID Wave 2 Multirate Edge w PoE++ (Option 4) This is where: 10G on existing copper Cat5e and Cat6 extend the life of the installed cable plant. Great for 1:N Convergence. X620 (1OG Copper or Fiber) Speed Next Gen Edge Lowered TCO via Limited Lifetime Warrantee Policies:  QoS,  VLAN,  802.1X  LLDP,  CDPv2 PBX L3 EAPS XYZ Account Preparation XYZ Account Operation Convergence 1.0 (Milliseconds) Ethernet w ATM like QoS  low latency (.1ms),  low jitter (.01ms)  zero packet loss Performance with features turned on (L3 built-in). Direct Ethernet Provider connects to Customer in POP FTTH, DSL, Cable Customer Equipment Customer Edge Provider Edge Provider Core M/C CPE PE M/C M/C M/C PC M/C Loop Detection: ELRP CLI Summit SwitchD SpanningTreeProtocol Summit Summit STP the Algorithm to avoid I'm the Root Because MY ID is Lesser I’m the root? No, I’m the root No, I’m the root? How will the loop converge? Block here! Timing associatedwith STP: Blocking - 20 Sec Or No Limits Listening - 15 Sec. Learning - 15Sec. Forwarding - No Limits. MasterNode DataTraffic ControlTraffic 10GEAPS Summit Summit SummitSummit Summit Summit SummitSummit Sub50msRestoration Scalefrom1to40GEthernetSummit Summit Fiber Fiber Fiber Fiber Metro Demarcation LAG EAPS Blocked EAPS RFC3619 Ethernet Ring Protection Switching (ERPS) is an effort at ITU-T under G.8032 Recommendation to provide sub-50ms protection and recovery switching for Ethernet traffic in a Ring topology and at the same time ensuring that there are no loops formed at the Ethernet Layer.  G.8032v1 supports a single ring topology.  G.8032v2 supports multiple rings/ladder topology. XYZ Account Design challenges  Pervasive connectivity (Service elasticity with a future requirement for IPv6 support).  Explosion of interconnections (Support growth of virtual environment).  Converged, automated infrastructure (Security and compliance).
  • 4. Heading XYZ Account 2016 DesignExtremeEdgePoE ExtremeCore10G 2016 Design 1G 2.5G/5G 10G 40G Jeff Green 2016 Rev. 1 Florida Legend Legend PoE 802.3at (PoE+) Cat5e 30W 30W30W 60W UPOE No Cabling Change from PoE+ Cat5e NBASE-T Alliance Copper Max Distances Cat 7 Shielded 100 m Cat 6a Shielded 100 m Cat 6a Unshielded 100 m Cat 6 Shielded** 100 m Cat 6 Unshielded** 55 m Need Correct UTP, Patch Panel and Adapter. known as IEEE 802.3bz Greenfield - Cat 6a (2.5, 5G & 10G) 100m Cat 6 (2.5G, 5G & 10G) 55m Brownfield - Cat 5e (2.5&5G) 100M Requires X620 or X460 Switch for Multi-rate Support plus Client that supports Multi-rate. 10G Passive (PN 10306 ~ 5m, 10307~ 10M) 10G SFP+ Active copper cable (upto 100m) 40G Passive (PN 10321 ~3m, 10323~ 5m) 40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m) 40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4- F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, ) 10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m) SFP+ DAC Cables QSFP+ DAC Cables 10 LRM 220m (720ft/plus mode conditioning) (PN 10303) 10GBASE-T over Class E Cat 6 (55M) (10G) 10GBASE-T over Class E Cat 6a or 7 (100M) (10G) 10 SR over OM3 (300M) or OM4 (400M) (PN 10301) 10 LR over single mode (10KM) 1310nm (PN 10302) 10 ER over single mode (40KM) 1550nm (PN 10309) 10 ZR over single mode (80KM) 1550nm (PN 10310) 802.3bz 10GBASE-T (100M) for Cat 6 (5G) 10G Fiber 10G Copper 802.3bz 10GBASE-T (100M) for Cat 5e (2.5G) OM3 50 µm (550m/SX) Laser, LC (PN 10051H) OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H) OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H) OM4 50 µm (550m/SX) 2Km, LC (PN 10051H) 1G Fiber (50 µm) 1G Fiber (62.5 µm) Single-fiber transmission uses only one strand of fiber for both transmit and receive (1310nm and 1490nm for 1Gbps; 1310nm and 1550nm for 100Mbps) LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H) ZX SMF 70km, LC (PN 10053H) 10/100/1000 (UTP to 100m) SFP (PN 1070H) SR4 at least 100 m OM3 MMF (PN 10319) SR4 at least 125 m OM4 MMF (PN 10319) LR4 at least 10 km SMF, LC (PN 10320) LM4 140m MMF or 1kM SMF, LC (PN 10334) Optics Optics + Fan-out Fiber Cable QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter ER4 40km SMF, LC (PN 10335) Internal CWDM transits four wavelengths over single fiber. MPO to 4 x LC Fanout 10m (PN 10327) for use with (PN 10326) MPO to 4 x LC duplex connectors, SMF LR4 Parallel SM, 10km SMF, MPO (PN 10326) 25/50/100G CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M)) SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M)) SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center) LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus) ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro) Optics and DAC Cables Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments, unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration. Proprietary got you Keyed Optics ModelNumber Description 10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC 10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC 10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC 10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux MUX-RACK-01 Rack mount kit for MUX-CWDM-01 40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC CWDM MUX-CWDM-01 DACs Notes: Managed Services WAN (Cat 1 Spending) SSA-180 at the XYZ Account Edge... Preparation Netsite Operation XYZ Account architectural models Example of Extreme simplified architecture. wire-speed non- blocking, ultra low latency 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link XYZ Account Next generation design  Full or almost full network virtualization (Automation of vMotion across DC). SAN synchronization over Ethernet connections, removing the requirement for separate infrastructures for example Ethernet switches and FC switches.  Collapsed (1- or 2- tier L2 designs) No distribution layer, no STP.  VxLAN logical switching (Create a platform for advanced service management Optimize for cloud and virtualized environments). XYZ Account Simplified architecture  1- or 2- tier architecture with broad simplification and virtualization (Automation of moving of virtual servers to underutilized hardware in other data centers to balance power and cooling requirements).  Reduced number of network devices, Balanced between legacy (optimized and next generation).  Partial but relevant virtualization, reduced physical constraints (virtualization creates uniform virtual hardware profiles irrespective of server hardware). Preparation Netsite Operation XYZ Account architectural models Example of Extreme simplified architecture. wire-speed non- blocking, ultra low latency 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link XYZ Account Next generation design  Full or almost full network virtualization (Automation of vMotion across DC). SAN synchronization over Ethernet connections, removing the requirement for separate infrastructures for example Ethernet switches and FC switches.  Collapsed (1- or 2- tier L2 designs) No distribution layer, no STP.  VxLAN logical switching (Create a platform for advanced service management Optimize for cloud and virtualized environments). XYZ Account Simplified architecture  1- or 2- tier architecture with broad simplification and virtualization (Automation of moving of virtual servers to underutilized hardware in other data centers to balance power and cooling requirements).  Reduced number of network devices, Balanced between legacy (optimized and next generation).  Partial but relevant virtualization, reduced physical constraints (virtualization creates uniform virtual hardware profiles irrespective of server hardware). Managed Services WAN (Cat 1 Spending) SSA-180 at the XYZ Account Edge... Preparation Netsite Operation XYZ Account architectural models Example of Extreme simplified architecture. wire-speed non- blocking, ultra low latency 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link 2-10GbE VSB Links 10GbE Link XYZ Account Next generation design  Full or almost full network virtualization (Automation of vMotion across DC). SAN synchronization over Ethernet connections, removing the requirement for separate infrastructures for example Ethernet switches and FC switches.  Collapsed (1- or 2- tier L2 designs) No distribution layer, no STP.  VxLAN logical switching (Create a platform for advanced service management Optimize for cloud and virtualized environments). XYZ Account Simplified architecture  1- or 2- tier architecture with broad simplification and virtualization (Automation of moving of virtual servers to underutilized hardware in other data centers to balance power and cooling requirements).  Reduced number of network devices, Balanced between legacy (optimized and next generation).  Partial but relevant virtualization, reduced physical constraints (virtualization creates uniform virtual hardware profiles irrespective of server hardware). Traditional control LDAP NAC DHCP Radius Captive Portal DNS MDMLDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control LDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control NAC Analytics Netsite Extreme (Wired and wireless) Control Cloud Based control On-prim / off-prim Traditional control LDAP NAC DHCP Radius Captive Portal DNS MDM XYZ Account ServicesUser Repositories or Corporate Control NAC Analytics Netsite Extreme (Wired and wireless) Control Cloud Based control On-prim / off-prim XYZ Account (911 LLDP MED Design) XYZ Account Reference Design Notes: 802.1X/Access control – multiple supplicants with Auto-sensing of IP phones (LLDP, LLDP-MED). Create dynamic profiles, Switch applies profiles based on standard LLDP-MED discovery protocols, One Device Profile per port Profile action Deep Rate-limiting with upto 8 queues per port with consistent queue policing  Weighted-round robin  Weight fair queuing  WRED Topology maps are created in OneView with the assistance of link and device discovery protocols (e.g. Link Layer Discovery Protocol) that aid in the creation of these maps by automatically identifying and drawing the physical links between network devices. It is necessary for the link layer protocol to be enabled on each device within the infrastructure for discovery to take place. Once the appropriate devices have been discovered, a network administrator can arrange the corresponding device icons in a logical manner that best represents the network infrastructure. XYZ Account Endpoint move detection and reporting. In this case, Cisco phones must be individually provisioned (through the phone interface) with their voice VLAN information. Both LLDP-MED and Cisco Discovery Protocol support this capability. LLDP-MED provides finer control of the network policy by allowing separate control for signaling and bearer applications. However, from a practical point of view, the critical capability is the VLAN configuration, and it is supported by both Cisco Discovery Protocol and LLDP-MED. XYZ Account VoWLAN management application or an LIS (Location Information Server) programs the location identification into network using SNMP and the LLDP-MED MIB  Every port may advertise a unique coordinate, civic, and/or ELIN location value  Network infrastructure advertise periodic LLDP-MED frames containing location TLV  Endpoint has location information to use immediately in the call setup XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting. Information  Logical Address (if define).  Hostname (given by hostname command).  Hardware Platform.  IOS Version.  Interface Type and Interface Number of local and remote device connected. 1 Cisco VOIP VoIP phone advertise CDP packets Switch responds to phone request with Voice VLAN and QoS info 2  Configure Voice VLAN  Configure QoS  Advertise PoE  CDPv2 for VOIP setup CDP Advertisement are send through all the ports by default. Global CDP information:  Sending CDP packets every 60 seconds  Sending a hold time value of 180 seconds  Advertisement are send via multicast. XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting. Information  Logical Address (if define).  Hostname (given by hostname command).  Hardware Platform.  IOS Version.  Interface Type and Interface Number of local and remote device connected. 1 Cisco VOIP VoIP phone advertise CDP packets Switch responds to phone request with Voice VLAN and QoS info 2  Configure Voice VLAN  Configure QoS  Advertise PoE  CDPv2 for VOIP setup CDP Advertisement are send through all the ports by default. Global CDP information:  Sending CDP packets every 60 seconds  Sending a hold time value of 180 seconds  Advertisement are send via multicast. LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN Location Considerations, For WLAN devices capable of higher accuracy Smart clients could compute relative position, using TOA or triangulation, from nearby APs AP could advertise client specific location using reliable multicasts or via the Presence Parameters information element (11v), in addition to LLDP-MED location Emergency Services, Some Thoughts ...  Wireless client would quickly discover new physical location on roaming  Switches need physical location configuration anyway, to support wired IP phones  AP could auto-discover it s physical location via LLDP from wired network Information Exchanged is in the form of TLVs and includes mandatory and optional information such as:  System name and description  Port name and description  IP management address  VLAN name  System capabilities (switching, routing, etc.)  MAC/PHY information  MDI power  Link aggregation LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN Location Considerations, For WLAN devices capable of higher accuracy Smart clients could compute relative position, using TOA or triangulation, from nearby APs AP could advertise client specific location using reliable multicasts or via the Presence Parameters information element (11v), in addition to LLDP-MED location Emergency Services, Some Thoughts ...  Wireless client would quickly discover new physical location on roaming  Switches need physical location configuration anyway, to support wired IP phones  AP could auto-discover it s physical location via LLDP from wired network Information Exchanged is in the form of TLVs and includes mandatory and optional information such as:  System name and description  Port name and description  IP management address  VLAN name  System capabilities (switching, routing, etc.)  MAC/PHY information  MDI power  Link aggregation Cisco Discovery Protocol - If you have ever worked or studied Cisco on any level you will already be aware of Cisco Discovery Protocol (CDP), and what it is and does. Invented at Cisco by Keith McCloghrie and Dino Farinacci, Cisco Discovery Protocol was initially introduced on Cisco products in 1994. This protocol now operates on tens of millions of Cisco devices throughout the world. It initially supported a limited set of attributes that were used mainly for device discovery. These attributes are based on type, length, and value descriptions, referred to as TLVs XYZ Account (911 LLDP MED Design) XYZ Account Reference Design Notes: 802.1X/Access control – multiple supplicants with Auto-sensing of IP phones (LLDP, LLDP-MED). Create dynamic profiles, Switch applies profiles based on standard LLDP-MED discovery protocols, One Device Profile per port Profile action Deep Rate-limiting with upto 8 queues per port with consistent queue policing  Weighted-round robin  Weight fair queuing  WRED Topology maps are created in OneView with the assistance of link and device discovery protocols (e.g. Link Layer Discovery Protocol) that aid in the creation of these maps by automatically identifying and drawing the physical links between network devices. It is necessary for the link layer protocol to be enabled on each device within the infrastructure for discovery to take place. Once the appropriate devices have been discovered, a network administrator can arrange the corresponding device icons in a logical manner that best represents the network infrastructure. XYZ Account Endpoint move detection and reporting. In this case, Cisco phones must be individually provisioned (through the phone interface) with their voice VLAN information. Both LLDP-MED and Cisco Discovery Protocol support this capability. LLDP-MED provides finer control of the network policy by allowing separate control for signaling and bearer applications. However, from a practical point of view, the critical capability is the VLAN configuration, and it is supported by both Cisco Discovery Protocol and LLDP-MED. XYZ Account VoWLAN management application or an LIS (Location Information Server) programs the location identification into network using SNMP and the LLDP-MED MIB  Every port may advertise a unique coordinate, civic, and/or ELIN location value  Network infrastructure advertise periodic LLDP-MED frames containing location TLV  Endpoint has location information to use immediately in the call setup XYZ Account signaling topology layers (CDPv2) - Once the Layer 1 is Active CDP Sends the information to its neighbor. It can be used for Layer 1, layer 2, layer 3 troubleshooting. Information  Logical Address (if define).  Hostname (given by hostname command).  Hardware Platform.  IOS Version.  Interface Type and Interface Number of local and remote device connected. 1 Cisco VOIP VoIP phone advertise CDP packets Switch responds to phone request with Voice VLAN and QoS info 2  Configure Voice VLAN  Configure QoS  Advertise PoE  CDPv2 for VOIP setup CDP Advertisement are send through all the ports by default. Global CDP information:  Sending CDP packets every 60 seconds  Sending a hold time value of 180 seconds  Advertisement are send via multicast. LLDP-MED provides several technical advantages for XYZ Account ECS location. VoWLAN Location Considerations, For WLAN devices capable of higher accuracy Smart clients could compute relative position, using TOA or triangulation, from nearby APs AP could advertise client specific location using reliable multicasts or via the Presence Parameters information element (11v), in addition to LLDP-MED location Emergency Services, Some Thoughts ...  Wireless client would quickly discover new physical location on roaming  Switches need physical location configuration anyway, to support wired IP phones  AP could auto-discover it s physical location via LLDP from wired network Information Exchanged is in the form of TLVs and includes mandatory and optional information such as:  System name and description  Port name and description  IP management address  VLAN name  System capabilities (switching, routing, etc.)  MAC/PHY information  MDI power  Link aggregation Cisco Discovery Protocol - If you have ever worked or studied Cisco on any level you will already be aware of Cisco Discovery Protocol (CDP), and what it is and does. Invented at Cisco by Keith McCloghrie and Dino Farinacci, Cisco Discovery Protocol was initially introduced on Cisco products in 1994. This protocol now operates on tens of millions of Cisco devices throughout the world. It initially supported a limited set of attributes that were used mainly for device discovery. These attributes are based on type, length, and value descriptions, referred to as TLVs
  • 5. Heading XYZ Account 2016 DesignExtremeEdgePoE ExtremeCore10G 2016 Design 1G 2.5G/5G 10G 40G Jeff Green 2016 Rev. 1 Florida Legend Legend PoE 802.3at (PoE+) Cat5e 30W 30W30W 60W UPOE No Cabling Change from PoE+ Cat5e NBASE-T Alliance Copper Max Distances Cat 7 Shielded 100 m Cat 6a Shielded 100 m Cat 6a Unshielded 100 m Cat 6 Shielded** 100 m Cat 6 Unshielded** 55 m Need Correct UTP, Patch Panel and Adapter. known as IEEE 802.3bz Greenfield - Cat 6a (2.5, 5G & 10G) 100m Cat 6 (2.5G, 5G & 10G) 55m Brownfield - Cat 5e (2.5&5G) 100M Requires X620 or X460 Switch for Multi-rate Support plus Client that supports Multi-rate. 10G Passive (PN 10306 ~ 5m, 10307~ 10M) 10G SFP+ Active copper cable (upto 100m) 40G Passive (PN 10321 ~3m, 10323~ 5m) 40G Active (PN 10315~10M, 10316 ~20m, 10318~ 100m) 40G Fan-out (PN 10321 ~3m, 10322 ~5m, PN 10GB-4- F10-QSFP ~10m, PN 10GB-4-F20-QSFP ~20m, ) 10G Passive (PN 10304 ~1m, 10305~3m, 10306~5m) SFP+ DAC Cables QSFP+ DAC Cables 10 LRM 220m (720ft/plus mode conditioning) (PN 10303) 10GBASE-T over Class E Cat 6 (55M) (10G) 10GBASE-T over Class E Cat 6a or 7 (100M) (10G) 10 SR over OM3 (300M) or OM4 (400M) (PN 10301) 10 LR over single mode (10KM) 1310nm (PN 10302) 10 ER over single mode (40KM) 1550nm (PN 10309) 10 ZR over single mode (80KM) 1550nm (PN 10310) 802.3bz 10GBASE-T (100M) for Cat 6 (5G) 10G Fiber 10G Copper 802.3bz 10GBASE-T (100M) for Cat 5e (2.5G) OM3 50 µm (550m/SX) Laser, LC (PN 10051H) OM1 62.5 µm (FDDI 220m/OM1, LC (PN 10051H) OM2 62.5 µm (ATM 275m/OM2), LC (PN 10051H) OM4 50 µm (550m/SX) 2Km, LC (PN 10051H) 1G Fiber (50 µm) 1G Fiber (62.5 µm) Single-fiber transmission uses only one strand of fiber for both transmit and receive (1310nm and 1490nm for 1Gbps; 1310nm and 1550nm for 100Mbps) LX (MMF 220 & 550m), SMF 10km, LC (PN 10052H) ZX SMF 70km, LC (PN 10053H) 10/100/1000 (UTP to 100m) SFP (PN 1070H) SR4 at least 100 m OM3 MMF (PN 10319) SR4 at least 125 m OM4 MMF (PN 10319) LR4 at least 10 km SMF, LC (PN 10320) LM4 140m MMF or 1kM SMF, LC (PN 10334) Optics Optics + Fan-out Fiber Cable QSFP-SFPP-ADPTQSFP-SFPP-ADPT – QSFP to SFP+ adapter ER4 40km SMF, LC (PN 10335) Internal CWDM transits four wavelengths over single fiber. MPO to 4 x LC Fanout 10m (PN 10327) for use with (PN 10326) MPO to 4 x LC duplex connectors, SMF LR4 Parallel SM, 10km SMF, MPO (PN 10326) 25/50/100G CR10 > 10 m over copper cable (10x10 Gb/s /Twinax (7M)) SR10 > 100 m over OM3 MMF (10x10 Gb/s / Multimode (100M)) SR10 > 125 m over OM4 MMF (10x10 Gb/s/ (100M) Data Center) LR4 > 10 km over SMF (4x25 Gb/s SMF/WDM (10km) Campus) ER4 > 40 km over SMF (4x25 Gb/s SMF/WDM (40km) Metro) Optics and DAC Cables Extreme Networks will restrict the integration of non-qualified 3rd party optical devices within 40G and 100G product environments, unless you purchase the EXOS 3rd Party 40G/100G Optics feature license to allow such integration. Proprietary got you Keyed Optics ModelNumber Description 10GB-LR271-SFPP 10Gb CWDM LR, SM, Channel 1271nm, LC 10GB-LR291-SFPP 10Gb CWDM LR, SM, Channel 1291nm, LC 10GB-LR311-SFPP 10Gb CWDM LR, SM, Channel 1311nm, LC 10GB-LR331-SFPP 10Gb CWDM LR, SM, Channel 1331nm, LC MUX-CWDM-01 4 Channel O-Band CWDM Mux/Demux MUX-RACK-01 Rack mount kit for MUX-CWDM-01 40GB-LR4-QSFP 40Gb 40GBASE-LR4, SM 10Km, LC CWDM MUX-CWDM-01 DACs Notes: Wireless Controllers Elastic virtual Appliance? delivers Scale on demand, V2110 V9 Virtual Wireless Appliance of 8 APs, expandable to 250 (Hyper-V)/525 (VMware) APs in 1 or 16 AP increments – includes 2 free Radar licenses.  This is where, XYZ Account can scale on demand by adjusting resources allocated to virtual machine (*Supported on VMware version only).  Support for 525 APs in standalone and 1050 APs in H/A mode.  Support for 4,096 users in standalone and 8,192 users in H/A mode. Configuration Small (OVA) Medium Large HostResources 2 CPU 1 GB RAM 25 GB HDD 4 CPU 2 GB RAM 25 GB HDD 8 CPU 4 GB HDD 25 GB HDD System Limits AP Capacity 100 500 1050 Local AP High Availability 50 50 250 250 525 525 User Capacity 1024 4096 8192 Standalone Users High Availability 512 512 2048 2048 4096 4096 Max Number Services/VNS 32 128 256 Max Number of Active WLAN services 16 64 128 Max Number Topologies 32 128 256 Max Number Policies/Roles 128 512 1024 Traditional Appliance (30135 or WS-C5210) Elastic Appliance (WS-V2110-9-NAM) Wireless Controllers Elastic virtual Appliance? delivers Scale on demand, V2110 V9 Virtual Wireless Appliance of 8 APs, expandable to 250 (Hyper-V)/525 (VMware) APs in 1 or 16 AP increments – includes 2 free Radar licenses.  This is where, XYZ Account can scale on demand by adjusting resources allocated to virtual machine (*Supported on VMware version only).  Support for 525 APs in standalone and 1050 APs in H/A mode.  Support for 4,096 users in standalone and 8,192 users in H/A mode. Configuration Small (OVA) Medium Large HostResources 2 CPU 1 GB RAM 25 GB HDD 4 CPU 2 GB RAM 25 GB HDD 8 CPU 4 GB HDD 25 GB HDD System Limits AP Capacity 100 500 1050 Local AP High Availability 50 50 250 250 525 525 User Capacity 1024 4096 8192 Standalone Users High Availability 512 512 2048 2048 4096 4096 Max Number Services/VNS 32 128 256 Max Number of Active WLAN services 16 64 128 Max Number Topologies 32 128 256 Max Number Policies/Roles 128 512 1024 Traditional Appliance (30135 or WS-C5210) Elastic Appliance (WS-V2110-9-NAM) Wireless Analytics (Netflow with MirrorN) Physical or Virtual Appliance? Overlay design and deployment in this case, the network switches lack the required capabilities required for unsampled NetFlow. A passive network tap can be used to direct traffic to an out-of-band CoreFlow2 switch that can generate the required unsampled NetFlow stats and traffic mirror. A Massive and Customizable Signature Set – With a library of more than 7,000 applications with over 13,000 fingerprints and growing, and the ability to easily create your own fingerprint, Purview can identify virtually any application. Analytics with Sensor W PV-A-300 Appliance Bundle (PV-50K-SYS-2) Virtual Appliance Bundle (PV-V-50K-SYS-2) PV-FPB-XXX – Purview Flow per Minute license  Up to 25K tracked clients (20 tracked applications/client).  Up to 500K flows in active cache  Up to 1M Flows/Min PV-A-300 Sensor PV-FC-180, S or K Series (Core Flow 2/ 1 Million Flows) Netsite Advance (NMS-ADV-5) 6 Million Flows Wireless Analytics (Netflow with MirrorN) Physical or Virtual Appliance? Overlay design and deployment in this case, the network switches lack the required capabilities required for unsampled NetFlow. A passive network tap can be used to direct traffic to an out-of-band CoreFlow2 switch that can generate the required unsampled NetFlow stats and traffic mirror. A Massive and Customizable Signature Set – With a library of more than 7,000 applications with over 13,000 fingerprints and growing, and the ability to easily create your own fingerprint, Purview can identify virtually any application. Analytics with Sensor W PV-A-300 Appliance Bundle (PV-50K-SYS-2) Virtual Appliance Bundle (PV-V-50K-SYS-2) PV-FPB-XXX – Purview Flow per Minute license  Up to 25K tracked clients (20 tracked applications/client).  Up to 500K flows in active cache  Up to 1M Flows/Min PV-A-300 Sensor PV-FC-180, S or K Series (Core Flow 2/ 1 Million Flows) Netsite Advance (NMS-ADV-5) 6 Million Flows NAC : Who (and What) is on Your Network? Physical or Virtual Appliance? Extreme Networks NAC is upgradable, allowing assessment to be integrated onto a single box with the other NAC functions. The appliances are capable of supporting both network-based and/or agent-based assessment. A virtual appliance is a software image that runs on a virtual machine. The Identity & Access Virtual Appliance is packaged in the .OVA file format defined by VMware and must be deployed on a VMware ESXTM 4.0, 4.1, 5.0, or 5.1 server or ESXiTM 4.0, 4.1, 5.0, or 5.1 server with a vSphere(TM) 4.0, 4.1, 5.0, or 5.1 client. Virtual appliance requires 12 GB of memory, four CPUs, two network adapters, and 40 GB of thick- provisioned hard drive space. IA-ES-1K 1,000 End-system license $7,995 IA-ES-3K 3,000 End-system license $22,495 IA-ES-12K 12,000 End-system license $84,995 IA-PA-3K 3,000 Posture Assessment license $9,995 IA-PA-12K 12,000 Posture Assessment license $39,995 Traditional Appliance (IA-A-20 & IA-A-300) NAC Elastic Appliance (Virtual appliances are included in NetSight Advanced (IA-ES license required)) NAC : Who (and What) is on Your Network? Physical or Virtual Appliance? Extreme Networks NAC is upgradable, allowing assessment to be integrated onto a single box with the other NAC functions. The appliances are capable of supporting both network-based and/or agent-based assessment. A virtual appliance is a software image that runs on a virtual machine. The Identity & Access Virtual Appliance is packaged in the .OVA file format defined by VMware and must be deployed on a VMware ESXTM 4.0, 4.1, 5.0, or 5.1 server or ESXiTM 4.0, 4.1, 5.0, or 5.1 server with a vSphere(TM) 4.0, 4.1, 5.0, or 5.1 client. Virtual appliance requires 12 GB of memory, four CPUs, two network adapters, and 40 GB of thick- provisioned hard drive space. IA-ES-1K 1,000 End-system license $7,995 IA-ES-3K 3,000 End-system license $22,495 IA-ES-12K 12,000 End-system license $84,995 IA-PA-3K 3,000 Posture Assessment license $9,995 IA-PA-12K 12,000 Posture Assessment license $39,995 Traditional Appliance (IA-A-20 & IA-A-300) NAC Elastic Appliance (Virtual appliances are included in NetSight Advanced (IA-ES license required)) Netsite: How is Your Network Being Used? Physical or Virtual Appliance? Understand your network in OneView Third-party devices can be managed via SNMP, SSH, Syslog, or even Secure Copy. OneViewTM supports reporting on about 2,500devices/interfaces in a typical enterprise network which stores: raw data for 7 days with a 15 minute polling interval, hourly rollups for 8 weeks, and daily rollups for 6months. More information on tuning the deployment is available in the OneViewTM Users Guide. Up to 6 Purview Engines Up to 3 Million Flows/Min Up to 50K tracked clients Up to 5K TopN records/hour Up to 20 applications/client (10 TopN, 10 tracked) Up to 600 GB database storage Traditional Appliance (NS-A-20) Elastic Appliance (NMS-ADV-XX ) VM and Cloud Directory PKI Device Mgmt Provisioning Software CMDB Asset Alarm Systems Netsite: How is Your Network Being Used? Physical or Virtual Appliance? Understand your network in OneView Third-party devices can be managed via SNMP, SSH, Syslog, or even Secure Copy. OneViewTM supports reporting on about 2,500devices/interfaces in a typical enterprise network which stores: raw data for 7 days with a 15 minute polling interval, hourly rollups for 8 weeks, and daily rollups for 6months. More information on tuning the deployment is available in the OneViewTM Users Guide. Up to 6 Purview Engines Up to 3 Million Flows/Min Up to 50K tracked clients Up to 5K TopN records/hour Up to 20 applications/client (10 TopN, 10 tracked) Up to 600 GB database storage Traditional Appliance (NS-A-20) Elastic Appliance (NMS-ADV-XX ) VM and Cloud Directory PKI Device Mgmt Provisioning Software CMDB Asset Alarm Systems Integrated RADAR : Wireless Dashboard The wireless dashboard provides an overview of the status and performance of the entire wireless infrastructure. It displays an overview of the availability, load and status of the controllers, the most recent and severe events from the wireless infrastructure and statistics on the most loaded APs. Wireless coverage  Overall  Per channel  Expected data rate  Channel allocation  Location  Current  Over time  Location readiness Integrated RADAR : Wireless Dashboard The wireless dashboard provides an overview of the status and performance of the entire wireless infrastructure. It displays an overview of the availability, load and status of the controllers, the most recent and severe events from the wireless infrastructure and statistics on the most loaded APs. Wireless coverage  Overall  Per channel  Expected data rate  Channel allocation  Location  Current  Over time  Location readiness ADSP : Air Defense Spectrum Control Forensic Summary Association Analysis Protocol Abuse Anomalous Behavior Signature Analysis Policy Manager Noise & Interference Roaming Issues Scanner Printer Connectivity Problems Correlation Engines Context-aware Detection Engines ADSP : Air Defense Spectrum Control Forensic Summary Association Analysis Protocol Abuse Anomalous Behavior Signature Analysis Policy Manager Noise & Interference Roaming Issues Scanner Printer Connectivity Problems Correlation Engines Context-aware Detection Engines XYZ Account Single Site Design Considerations A Single Site deployment of Identity and Access Control (IAC) is typical in small to medium sized environments. The network design generally consists of a core router with collapsed distribution and edge switching. A small datacenter is typically deployed where virtual machines can be used to host services and a dual ISP link is configured through a pair of firewalls. Based on this general architecture, the design for IAC will include a Control Center appliance and at least two IAC Engines in the datacenter. These three appliances can all be virtual, physical, or a combination of both physical and virtual. Depending upon the use case, the wireless controller will also sit in the datacenter with Bridge at AP topologies, Bridge at Controller topologies or a combination of both. For an IAC deployment it's common to see the IAC Engines in the datacenter at the main building. A minimum of two IAC Engines are recommended for redundancy and they can be either virtual or physical. Generally, along with the IAC Engines, the Control Center server and wireless controllers also reside in the datacenter. For the wireless deployment it's common to see Bridge at AP topologies for wireless users within the campus buildings. However, guest services may still tunnel back to the datacenter with a Bridge at Controller topology before accessing network resources. XYZ Account Single Site Design Considerations A Single Site deployment of Identity and Access Control (IAC) is typical in small to medium sized environments. The network design generally consists of a core router with collapsed distribution and edge switching. A small datacenter is typically deployed where virtual machines can be used to host services and a dual ISP link is configured through a pair of firewalls. Based on this general architecture, the design for IAC will include a Control Center appliance and at least two IAC Engines in the datacenter. These three appliances can all be virtual, physical, or a combination of both physical and virtual. Depending upon the use case, the wireless controller will also sit in the datacenter with Bridge at AP topologies, Bridge at Controller topologies or a combination of both. For an IAC deployment it's common to see the IAC Engines in the datacenter at the main building. A minimum of two IAC Engines are recommended for redundancy and they can be either virtual or physical. Generally, along with the IAC Engines, the Control Center server and wireless controllers also reside in the datacenter. For the wireless deployment it's common to see Bridge at AP topologies for wireless users within the campus buildings. However, guest services may still tunnel back to the datacenter with a Bridge at Controller topology before accessing network resources. Unique Purpose-Built Access Points (Opex or CAPEX) Wall-plate AP  2x2:2 11ac Wave 2  Up to 3 pass-through E/N ports with PoE out port  BLE/Zigbee support AP + Camera (AP3916)  2x2:2 SS, Dual band & radio  RF Spectrum Analysis  4x integral antennae MU-MIMO (up to 4) 160 MHz  4 MU-MIMO sessions  2.5/5G Ethernet  BLE/Zigbee support (IoT) Stadiums (3865e)  11ac (3x3:3 MIMO)  Mesh, Policy, QoS  IP67/NEMA6 Unique Purpose-Built Access Points (Opex or CAPEX) Wall-plate AP  2x2:2 11ac Wave 2  Up to 3 pass-through E/N ports with PoE out port  BLE/Zigbee support AP + Camera (AP3916)  2x2:2 SS, Dual band & radio  RF Spectrum Analysis  4x integral antennae MU-MIMO (up to 4) 160 MHz  4 MU-MIMO sessions  2.5/5G Ethernet  BLE/Zigbee support (IoT) Stadiums (3865e)  11ac (3x3:3 MIMO)  Mesh, Policy, QoS  IP67/NEMA6 Separate voice and/or data  32 VNS segments per Controller  Per SSID or WLAN domain (Controller, AP)  QoS, Security, Roaming, No VLAN configuration required Single XYZ Account SSID Separate voice and/or data  32 VNS segments per Controller  Per SSID or WLAN domain (Controller, AP)  QoS, Security, Roaming, No VLAN configuration required Single XYZ Account SSID This is where, XYZ Account maybe familiar with the idea that as chaos or change rates within a particular network go up, so do your costs.  Roles are Business level groupings built to correspond to specific user types.  Rules are policies enforced at the port level to decide what types of traffic XYZ Account wants to allow, deny, rate limit or prioritize (No complicated scripting).  Services are containers of similar Rules. Grouping Rules allows the Administrator to apply rules in groups rather than as individual components. Policy Components (Cost to Chaos Ratio) Roles Faculty Student Guest Rules Allow, deny, rate limit, prioritize. Or contain. Services PoS Oracle Guest if X + Y,= Z then action IT Admin Employee Guest Oracle VPNAdmin. AllowHTTP AllowHTTPS AllowIPSec AllowSAP RateLimit AllowPing AllowTelnet AllowEmail AllowTFTP AllowSNMP AllowOracle DenyBlast then place user into a defined ROLE Looks like a next generation Firewall across your XYZ Account Network. RolesRulesServices This is where, XYZ Account maybe familiar with the idea that as chaos or change rates within a particular network go up, so do your costs.  Roles are Business level groupings built to correspond to specific user types.  Rules are policies enforced at the port level to decide what types of traffic XYZ Account wants to allow, deny, rate limit or prioritize (No complicated scripting).  Services are containers of similar Rules. Grouping Rules allows the Administrator to apply rules in groups rather than as individual components. Policy Components (Cost to Chaos Ratio) Roles Faculty Student Guest Rules Allow, deny, rate limit, prioritize. Or contain. Services PoS Oracle Guest if X + Y,= Z then action IT Admin Employee Guest Oracle VPNAdmin. AllowHTTP AllowHTTPS AllowIPSec AllowSAP RateLimit AllowPing AllowTelnet AllowEmail AllowTFTP AllowSNMP AllowOracle DenyBlast then place user into a defined ROLE Looks like a next generation Firewall across your XYZ Account Network. RolesRulesServices The XYZ Account first line of defense, This is where Increase Safety. Lack of visibility of critical assets is a problem with substantial business impact  Network can facilitate and assist with implementing inpatient, ambulatory, and clinical information systems with security and reliability.  Real-time location services for inventory and asset tracking.  Network analytics to provide real-time tracking of patient status and increase awareness on present patient locations. Asset Visibility Asset Location Wi-Fi Tags and Clients RTLS Location Engine (built-in) Ekahau Positioning Engine AeroScout Engine The XYZ Account first line of defense, This is where Increase Safety. Lack of visibility of critical assets is a problem with substantial business impact  Network can facilitate and assist with implementing inpatient, ambulatory, and clinical information systems with security and reliability.  Real-time location services for inventory and asset tracking.  Network analytics to provide real-time tracking of patient status and increase awareness on present patient locations. Asset Visibility Asset Location Wi-Fi Tags and Clients RTLS Location Engine (built-in) Ekahau Positioning Engine AeroScout Engine Device capabilities (clients),  Constraints = certifications, drivers/software, power, durability, size  Understand protocols/standards and channels supported  Take measurements with device, understand Rx sensitivities Coverage - How much? 2.4GHz or 5GHz? Choose one!  Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal  Always consider environmental elements, SNR & retries  Match AP and Client Tx power; target symmetrical speeds Interference  Channel reuse and cell dimension critical – 20MHz high-density  Static channel assignment to avoid CCI  More power better Wi-Fi Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime  WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?  Target below 50ms  Consider wired network and traffic forwarding (L2/L3, local/centralized) Quality of Service (QoS) - Does the client/application support marking?  Never forget end-to-end QoS, Consider both voice signaling and encoding.  Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.  Use OKC if 802.11r/802.11k not available VoWLAN Design Considerations Device capabilities (clients),  Constraints = certifications, drivers/software, power, durability, size  Understand protocols/standards and channels supported  Take measurements with device, understand Rx sensitivities Coverage - How much? 2.4GHz or 5GHz? Choose one!  Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal  Always consider environmental elements, SNR & retries  Match AP and Client Tx power; target symmetrical speeds Interference  Channel reuse and cell dimension critical – 20MHz high-density  Static channel assignment to avoid CCI  More power better Wi-Fi Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime  WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?  Target below 50ms  Consider wired network and traffic forwarding (L2/L3, local/centralized) Quality of Service (QoS) - Does the client/application support marking?  Never forget end-to-end QoS, Consider both voice signaling and encoding.  Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.  Use OKC if 802.11r/802.11k not available VoWLAN Design Considerations Device capabilities (clients),  Constraints = certifications, drivers/software, power, durability, size  Understand protocols/standards and channels supported  Take measurements with device, understand Rx sensitivities Coverage - How much? 2.4GHz or 5GHz? Choose one!  Recommended target -65dBm to -67dBm - 802.11ac designs likely incorporate stronger signal  Always consider environmental elements, SNR & retries  Match AP and Client Tx power; target symmetrical speeds Interference  Channel reuse and cell dimension critical – 20MHz high-density  Static channel assignment to avoid CCI  More power better Wi-Fi Roaming - How many channels in use? less scans, Active vs. passive client scanning – both consume airtime  WPA2-PSK vs. WPA2-ENT? 802.11r/802.11k?  Target below 50ms  Consider wired network and traffic forwarding (L2/L3, local/centralized) Quality of Service (QoS) - Does the client/application support marking?  Never forget end-to-end QoS, Consider both voice signaling and encoding.  Wireless QoS (WMM/802.11e) + Wired QoS (802.1D/Diffserv) If not, how you will classify the traffic.  Use OKC if 802.11r/802.11k not available VoWLAN Design Considerations Wave 2 XYZ Account Considerations The Edge deployment model is the most frequently used in the IAC solution. This deployment model identifies and controls both wired and wireless devices at the edge of the network with the main requirement being that there is no additional networking equipment downstream of the port where the device is being identified. When identifying devices at the edge of the network a visibility mechanism, typically authentication, needs to be enabled at every entry point to the network. On edge switches, this requires enabling authentication for each port. For wireless, this means enabling authentication on the wireless SSID's. If there are multiple devices attached to a single port of a switch, then multi-user authentication needs to be enabled on the port in order to detect all devices and assign them individual authentication sessions. The VPN Remote Access deployment model allows IAC to identify devices connected to the network through a compatible VPN concentrator. Deployment spectrum recommendations - transmit Power (dBm) 5 GHz: Min 12/Max 15. 5GHz is the preferred Wi-Fi frequency for indoor use More capacity, less interference compared to 2.4GHz. 5GHz should become dominant for your client devices 2.4GHz should be left for Bluetooth, ZigBee and RTLS (M2M). Unlicensed 5GHz spectrum is attractive for service providers. New LTE-U/LAA services are coming; impact currently unknown  Beacon Rate (Mbps) By default lowest For both 802.11a and g radio use 12 or 24.  Multicast rate optimization enabled.  Channels 80 MHz channels can be used in green field deployments. DFS channels must be used when operating on 80 MHz channels (Remove channel 144 from list).  Rogue Devices can be Anywhere on the Network and can be Encrypted. Identify Every Type of Rogue Device Connected to the Network  Track and Identify New Non-Wireless Devices  Track Critical Assets to Identify Removal From Network Wave 2 XYZ Account Considerations The Edge deployment model is the most frequently used in the IAC solution. This deployment model identifies and controls both wired and wireless devices at the edge of the network with the main requirement being that there is no additional networking equipment downstream of the port where the device is being identified. When identifying devices at the edge of the network a visibility mechanism, typically authentication, needs to be enabled at every entry point to the network. On edge switches, this requires enabling authentication for each port. For wireless, this means enabling authentication on the wireless SSID's. If there are multiple devices attached to a single port of a switch, then multi-user authentication needs to be enabled on the port in order to detect all devices and assign them individual authentication sessions. The VPN Remote Access deployment model allows IAC to identify devices connected to the network through a compatible VPN concentrator. Deployment spectrum recommendations - transmit Power (dBm) 5 GHz: Min 12/Max 15. 5GHz is the preferred Wi-Fi frequency for indoor use More capacity, less interference compared to 2.4GHz. 5GHz should become dominant for your client devices 2.4GHz should be left for Bluetooth, ZigBee and RTLS (M2M). Unlicensed 5GHz spectrum is attractive for service providers. New LTE-U/LAA services are coming; impact currently unknown  Beacon Rate (Mbps) By default lowest For both 802.11a and g radio use 12 or 24.  Multicast rate optimization enabled.  Channels 80 MHz channels can be used in green field deployments. DFS channels must be used when operating on 80 MHz channels (Remove channel 144 from list).  Rogue Devices can be Anywhere on the Network and can be Encrypted. Identify Every Type of Rogue Device Connected to the Network  Track and Identify New Non-Wireless Devices  Track Critical Assets to Identify Removal From Network