3. 3
100+ YEARS OF CHANGE UNTIL NOW
Operator
Switchboards
1880s
Automated
Switching
1940s
Data and
Modems
1980s
Multi-Wavelength
Fiber
1990s
ECI Proprietary
4. 4
AGENTS OF CHANGE TODAY
The Cloud brings surging bandwidth and new traffic patterns
The Internet of Things drives access anywhere anytime
Open Networks enables virtualization and new models for
delivering services
Security now becomes even more complex and important
ECI Proprietary
7. 7
THE CLOUD
• Business flexibility and cost savings driving migration
of applications to the cloud
• Users seeking transparent and always-on experience
ECI Proprietary
8. 8
MOVING TO THE CLOUD
Corporate
VoIP GW
ERP, CRM
Storage, DB
Email, Web, Video
Packet Optical
Transport
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Platform as a Services (PaaS)
DC
DC
DC
BranchBranch
Public
Private
Hybrid
ECI Proprietary
9. 9
CLOUD CONNECTIVITY APPLICATIONS
DCI Backbone
• 10GbE to 100GbE
interfaces
• P2P or network
Cloud Connect
• Private/public/hybrid cloud
access
• 100MbE to 10GbE interfaces
• P2P or network
SAN Connect
• Storage device
connectivity for business
continuity
• GbE and FC interfaces
• P2P
StorageCompute
Data Center
Data Center
ECI Proprietary
10. 10
CLOUD CONNECT
Enterprise access to their
hosted applications in private,
public, or hybrid clouds.
Needs:
User Transparency (high speed with
low latency)
Scalability as communications need
grow
High availability
2014 2018
57
128
PaaS SaaS IaaS
* Industry Sources
The Growing Cloud Technology Demand
WW Public IT Cloud Services Spending by
Segment ($B)
ECI Proprietary
11. 11
SAN CONNECT
Data storage distribution and
synchronization for business
continuity.
Needs:
Connectivity for all FC and GbE interfaces
High bandwidth with low latency for active-
active synchronization
High availability with automatic switchover
High security for very sensitive data
plan to use
cloud storage
23%
currently use
cloud storage
60%
Cloud Storage Usage
* Industry Sources
83%
ECI Proprietary
12. 12
DATA CENTER INTERCONNECT BACKBONE
Service distribution between data
centers, as if within a data center.
Needs:
Low cost bandwidth
Scalability – ease of growth based on
demand
High availability
Flexibility
2013 2018
58
165
22
80
WW Data Center Traffic
(1GB file transfers/hour)
Data Center to End User Data Center to Data Center
80M
245M
* Industry Sources
ECI Proprietary
13. 13
CLOUD OPPORTUNITIES
Superior offering to enterprises for access to hosted applications
Transparent always-on connectivity
Superior offering to data center operators for data center
interconnect
Unlimited flexible bandwidth
ECI Proprietary
15. 15
THE INTERNET OF THINGS
The
networked connection of
people, processes, data
and things so that
“everything”
joins the network
People
DataThings
Processes
ECI Proprietary
16. 16
IOT – KEY ENABLING TECHNOLOGIES
Micro/Personal
Infrastructure
BIG
DATA
Cloud
Computing
LTE
Advanced
Fiber
Optics
Next Gen
Wearables
Micro
Sensors
ECI Proprietary
17. 17
IOT EXAMPLE
Multi-user location
reporting plus big
data analytics
delivers real-time
personalized traffic
routing
ECI Proprietary
18. 18
ANOTHER IOT EXAMPLE
1. Micro-sensors on or in
your body determine you
are having a heart attack
2. Your smart phone relays
your condition and position
to an emergency response
center
3. The nearest
emergency medical
team (EMT) is
dispatched
4. Your insurance company,
which monitors everything
through “big data”, sends
you a text
ECI Proprietary
19. 19
IOT OPPORTUNITIES
Leverage capital investment in new technologies
(e.g. packet-optical integration) to make the
network more efficient
New offering of E2E multi-object management
ECI Proprietary
21. 21
SDN IN DATA CENTERS IS ALREADY A REALITY
Open control
protocols (e.g.
OpenFlow)
Data Center Traffic Flow Problem:
Complexity
Inconsistent policies
Inability to scale
Vendor dependence
Cost
SDN Solution:
Decoupling of control plane from data plane
Broadly deployed today in data centers
Vendor Specific Protocol SNMP
Control Plane
Control Plane
Control Plane
Control Plane
Data Plane
Console
Data Plane
SDN Network Controller
App. App.App.
SDN - Abstraction
Logical controller programs the global network
Data Plane
Data Plane
Data Plane
1GE 1GE
Data Plane
Data Plane
1GE1GE
Data Plane
ECI Proprietary
22. 22
WHY SDN IN THE WAN?
Seamless inter-data center communication to create the
Cloud (virtualized LAN connectivity)
Vendor interoperability to lessen dependence on closed
vendor solutions
Facilitate building overlay networks
Fast creation of connectivity applications
ECI Proprietary
23. 23
CHALLENGES FOR SDN IN THE WAN
Main factor in resolving these challenges is TIME
Need for orchestration to scale
across multiple SDN
controllers
Dealing with multiple WAN
routing protocols (e.g. VXLAN,
GRE, GRE IPsec, Geneve)
Open standards agreements
Legacy equipment
Critical mass
Network
Element
SDN Network Controller
Apps Apps
Southbound APIs (Vendor-neutral)
Network
Element
Network
Element
Routers
SDN Network Controller
Apps Apps
Southbound APIs (Vendor-neutral)
Routers Routers
Southbound APIs (REST, JSON, XML)
SDN Orchestration
Apps Apps Apps Apps
ECI Proprietary
24. 24
SDN OPPORTUNITIES
Start assessing today how to evolve
your particular network to SDN
Network optimization
New revenue opportunities
ECI Proprietary
26. 26
SECURITY CONCERNS
Corporate
VoIP GW
ERP, CRM
Storage, DB
Email, Web, Video
Packet Optical
Transport DC
DC
DC
BranchBranch
Data
Interception
System
Infiltration
Data
Exfiltration
ECI Proprietary
27. 27
MULTI-LAYER ENCRYPTION
Physical
OSI Layer
Data link
Network
Transport
Application
Presentation
Session
DWDM
1
2
3
4
5-7
IPsec
SSL
MAC
L1OE
Payload
TCP
Header
Payload
TCP
Header
IP/MPLS
Header
Payload
TCP
Header
IP/MPLS
Header
MAC
Header
Encrypted
Encrypted
Encrypted
Payload
TCP
Header
IP/MPLS
Header
MAC
Header
Encrypted
Increasinginformationencrypted
Only layer 1 OPTICAL ENCRYPTION (L1OE)
PROTECTS ALL message payload and addressing information
ECI Proprietary
28. 28
WHY L1OE – BECAUSE YOUR FIBER IS NOT SAFE
From using off-the-shelf clip-on devices
to multi-billion dollar submarines
it is possible to tap a fraction of light from
fibers without interruption
and intercept full communications
The ONLY DEFENSE
against fiber tapping is
layer 1 optical encryption
ECI Proprietary
29. 29
L1 OPTICAL ENCRYPTION IMPLEMENTATION
Apollo NE-A
NE-A
Private
Key
Apollo NE-B
NE-B
Private
Key
Network Key Manager used
by Enterprise customer to
administer encryption of
and monitor their links
Enterprise IT Admin
All management
links protected by
TLS/SSL
Encrypted Optical Link
Cloud-based
applications
Enterprise office
Client agnostic
10G and 100G links
No overhead, wire speed
Diffie-Hellman key exchange
AES-256 encryption with GCM extensions
X.509 Authentication with third-party
administration option
Intercepted data is
indecipherable
ECI Proprietary
30. 30
Security Functions:
Payload HeaderPayload Header Payload Header
… Payload Header
Security
Applications
Public Domain Private Domain
Events
database
Inspects the packet
header and
sometimes the
payload
Used to construct• Inspect
• Pass
• Reject
• Alert
• Flag
• Record
• Investigate
CYBER SECURITY BASICS
ECI Proprietary
31. CYBER SECURITY SUITE
Big Data Analytics6
Network Anomaly Detection5
L1 – L3 Encryption1
Secured Site GW (UTM)2
Strong Authentication3
Unidirectional Secure GW4
Viewer
Public
Domain
ECI Proprietary
33. 33
SECURITY OPPORTUNITIES
Increasing awareness of this pervasive threat is
creating an opportunity to offer Enterprises
value-added services
Encryption
Holistic Cyber protection
ECI Proprietary
34. YOU NEED TO BE
ELASTIC
ECI brings you ELASTIC networks so
that YOU can quickly and seamlessly
adapt to the rapidly evolving market.
ECI Proprietary 34
35. ECI Telecom Proprietary and Confidential 35
ELASTIC
NETWORKS
MEAN:
Controlling your network in real time
Quickly introducing new services and
innovation
Seamlessly operating in multi-vendor
environments
ECI Proprietary 35
36. ECI Telecom Proprietary and Confidential 36
UNLIMITED
Cloud brings surging bandwidth
and new traffic patterns
EFFICIENT
Mobile and the “Internet of things”
drive access anywhere anytime
OPEN
New revenue sources,
new applications
SECURE
Security for open and
programmable networks
DRIVEN BY
THE NEEDS OF
TOMORROW
ECI Proprietary
37. ECI Telecom Proprietary and Confidential 37
SMARTLIGHT™
FRAMEWORK
Neptune
Apollo
LightSoft
NMS
LightControl
SDN Controller
LightSaver
LightInsight
LightWays
LightConnect
LightTime
LightAction
Control TransportAppsSecurity
ECI Proprietary 37
LightSec
FOUR
INTERCONNECTED
LAYERS BRING OUR
ELASTIC NETWORKS
TO LIFE
Over the past 100+ years there have been many changes in the communications industry. To point out a few significant milestone examples:
Starting in the 1880’s, customers wanting to talk with other customers were assisted by operator switchboards who manually connected each customer.
In the 1940’s, as traffic grew, switching was greatly improved using automated switching with cross-bar type switches. Of course the advantage of crossbar switching was that it allowed multiple input and output lines to connect vs. manual patching each line.
In 1980’s data modems, or modulator-demodulator, devices using acoustical couplers were used to encode digital information
Then in the 1990’s fiber optical cable using Wavelength-Division Multiplexing (WDM) technology to allow providers to multiplex a number of optical carrier signals onto a single optical fiber with the use of different wavelengths.
So lets talk about what are the ‘Agents of Change Today’:
I’d like to point out four areas:
For many CSP’s cloud based service represents a new way to do the same old things. However Hybrid, private and public cloud solution dynamics bring surging bandwidth and new traffic patterns for CSP’s .
The Internet of Things or Machine 2 Machine (M2M) service means traffic can now be accessible anywhere any time.
Open Networks enable virtualization and new models for delivering services
Finally Security is even more complex and important.
Simply put, cloud computing is computing based on the internet. In the past people ran applications and programs from downloaded software on a physical computer or server they owned or in their building. Cloud computing allows everyone with an Internet connection access the those and many other applications thru the Internet.
With that in mind cloud computing offers increased efficiency and flexibility, while improving cash flow (I.e. equipment and resources). Depending on the choice of cloud computing this is accomplished by providing:
Flexibility – many types of services for cloud computing platforms like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) on public, private and hybrid clouds.
Disaster recovery – No more backups as this can be automated by the cloud
Automated updates – Always using the most current version and supporting hardware as all that is needed is an Internet connection.
Cap-Ex free – no equipment costs
Increased collaboration – Customers can be virtually anywhere and time and share resources.
Work from anywhere – All that is need is an Internet connection
Security – Various levels for secure transmission of traffic
Competitiveness – The cloud provides access to enterprise-class technology.
Environmentally friendly – Again all that is need is an internet connection.
So everything/one is moving or moved to the cloud these days.
Servers, data is stored, applications and services are hosted from the cloud. Moving servers and storage to the cloud allows ubiquitous access, simplify management and administration and enable businesses to operate more efficiently while cutting costs.
Sounds like utopia right? Well you need to decided where you’re cloud services are best served. For example Infrastructure as a Service (IaaS) is used to create cost effective, scalable IT solutions without adding the expense of managing or complexity of hardware. This allows customers to expand or reduce and scale as need without having to purchase, install and integrate hardware. IaaS can be either a public, private and hybrid cloud service.
Platform as a Service (PaaS) provides a platform and environment to allow developers to build app’s and services over the Internet. The cloud hosts PaaS services using a web browser. PaaS tools allow customers to create or select preconfigured service features allowing customers to determine what they need of don’t need and are generally paid by client subscription(s).
Software as a Service (SaaS) is any cloud service where customers use software applications hosted over the Internet. Hosted cloud applications can be done by individuals and organizations. Google, Twitter, Facebook are all examples of SaaS allowing users access to services with their internet enable device. SaaS is software-on-demand and rentable. Typically customers purchase software app’s as a package, install them based on the number of users, devices and licenses. SaaS subscribe to software rather then purchase it – typically on an per month basis and used online with files saved to the cloud vs on individual computer.
There are various means for applications to connect to the cloud:
Storage Area Network (SAN) organizes storage devices into a single storage resource allowing provisioning, allocation and enterprise management. Each switch and storage system on the SAN must be interconnected using fiber optic or copper cabling using FC and GbE.
93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster according to National Archives & Records Administration in Washington.
Data Center Interconnect backbone allows connection of Data Center to Data Center and Data Center to End user. According to Cisco CNI, its expected to grow tremendously with the largest growth in DC to DC area.
For CSP’s there are many cloud opportunities, including:
The Internet of Things, is pretty much any physical object or ‘thing’ embedded with software and/or hardware connected to the Internet.
Each ‘thing’ is uniquely identifiable by its internet enabled computing systems.
IoT offers connectivity of devices, systems and services beyond Machine-to-Machine or M2M while providing many protocols, domains and applications.
Advanced devices or smart objects will provide automation at a grand scale across multiple verticals, fields and applications (I.e. Smart Grid, traffic flow, etc.)
The Key enabling technologies that make up the IoT:
IPv6 allows the billions and billions of IoT devices to be addressable. Devices like RFiD, micro-sensors and next Gen wearables. While cloud computing , Big Data, wireless LTE and fiber optic cable provide scalable infrastructure to allow safe and secure transmission.