SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Copyright CohesiveFT - 1/20/15
OpenFlow is SDN,
SDN is not only OpenFlow
CloudExpo East - SDN & Networking Innovations Track
June 10 2013
Patrick Kerpan, CEO

CohesiveFT
1
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Agenda
•Company Background
•SDN in the News
•The Application Layer of Cloud
•OpenFlow and Definitions
•“BigTent”Thinking
•CohesiveFT’s Answer to SDN Needs
•SDN and the Future of Networking
•Contact Information
2
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
What We DoWho We Are
Company Background
• Cohesive FlexibleTechnologies Corp.
(CohesiveFT)
• Founded in 2006 by IT and capital
markets professionals with experience
in operations, enterprise software and
client-facing services
• First SDN product launched in 2007,
followup products in 2008 and 2011
• Cloud, vendor, and standards neutral
for greater customization and control
• Enable enterprises to run business
operations via the cloud
• Customers have 50M virtual device
hours in public, private, & hybrid clouds
secured byVNS3
• Only company to promote
comprehensive cloud container
solution for migration, deployment and
control
• First Application SDN product in IBM’s
SCE and SCE+
3
Copyright CohesiveFT - 1/20/15
Experience: Customers &Verticals
4
ISV SaaS Integrators Self Service Enterprise
Copyright CohesiveFT - 1/20/15
• 36M virtual device hours in public,
private, & hybrid clouds secured by
VNS3
• Over 8,000 users built, imported,
transformed and delivered 33K+
virtual server templates with Server3
• Numerous enterprises migrated
complex applications to the cloud with
Context3
• 18+ Industry and Cloud partners
Customers Include:
• Global Mutual Fund Company
• Global ERP provider
• Global BPMS provider
• Global Cloud-basedThreat
Detection
• Global Fashion Brand
• GlobalToy Manufacturer
• US National Sports Association
• and many more global, transnational
and local customers
AchievementsOur Clients
EMAILVERSION
5
Copyright CohesiveFT - 1/20/15
UserControlProviderControl
Compute Storage Network
Virtualization
Layer
Web Server Runtime
IaaS
PaaS
Layer 0
Layer 4
Layer 3
Layer 2
Layer 1
Layer 5
Layer 7
Layer 6
Limits of access, control, & visibility
DeveloperTools
The Application Layer Of Cloud
6
Application
Layer
Hardware
Ownership

Layer
Copyright CohesiveFT - 1/20/15
Separte Provider and App Layer Concerns
7
Hardware


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
PhysicalLayer
SDN Market can be divided into 2 segments
1. Application Controlled
• CohesiveFTVNS3
• Cisco Cloud Service Router
• Citrix CloudBridge



2. Provider Controlled
• Nicira/VMware
• Open vSwitch
• Cisco Nexus 1000v
• IBM
• Cisco
• Juniper
VirtualLayerApplicationLayer
Cloud Instance
OS
App Stack
ProviderControlled
Hypervisor
Hardware
Compute
Storage
Network
Multiplexed access to:
AppControlled
} OpenFlow
Layer 0
Layer 4
Layer 3
Layer 2
Layer 1
Layer 5
Layer 7
Layer 6
Perimeter of access, control, & visibility
Copyright CohesiveFT - 1/20/15 8
Hardware
Separte Provider and App Layer Concerns
PhysicalLayer
SDN Market can be divided into 2 segments
1. Application Controlled
• CohesiveFTVNS3
• Cisco Cloud Service Router
• Citrix CloudBridge



2. Provider Controlled
• Nicira/VMware
• Open vSwitch
• Cisco Nexus 1000v
• IBM
• Cisco
• Juniper
VirtualLayerApplicationLayer
Cloud Instance
OS
App Stack
ProviderControlled
Hypervisor
Hardware
Compute
Storage
Network
Multiplexed access to:
AppControlled
} OpenFlow
Layer 0
Layer 4
Layer 3
Layer 2
Layer 1
Layer 5
Layer 7
Layer 6
CURRENT VISION - OpenFlow Stops Here


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
OpenFlow - Early SDN definition
The authors of the original ONF paper 

outlined 5 dimensions that need to be 

considered for a virtualized network:
It is only the last of these, 

forwarding tables, that begins 

to imply a solution to these

challenges.
9
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
...
Bandwidth
Topology Device CPU
Traffic
Forwarding
Tables
Copyright CohesiveFT - 1/20/15
Stepping though Nicira’s Definition of SDN
10
Nicira founders defined the 7 Properties of network virtualization as:
1. Independence from network hardware
2. Faithful reproduction of the physical 

network service model
3. Follow operational model of compute 

virtualization
4. Compatible with any hypervisor platform
5. Secure isolation between virtual networks, 

the physical network, and the control 

plane
6. Cloud performance and scale
7. Programmatic networking provisioning and

control


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Independence from network hardware
11
1. Independence from network hardware
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Reproduction of physical network model
12
2. Faithful reproduction of the physical network service model
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Follow op. model of compute virtualization
13
3. Follow operational model of compute virtualization


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
4. Compatible with any hypervisor platform
14
4. Compatible with any hypervisor platform


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Secure isolation
15
5. Secure isolation between virtual networks, the physical network, and
the control plane
@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
ONF
Copyright CohesiveFT - 1/20/15
Cloud performance and scale
16
6. Cloud performance and scale


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Programmatic networking provisioning & control
17
7. Programmatic networking provisioning and control


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
“Big Tent” Thinking within SDN Conversation
18
Two distinct Cloud Constituencies Remain:
• Cloud Service Providers
• Cloud Applications
The SDN conversation must address concerns of 

both Providers and Applications to answer the future 

concerns of:
• Who “owns” and “controls” each aspect of the application?
• How can you move L2 / L3 networking among data centers

driven by the customer, without provider interaction?
• How do you use OpenFlow in existing implementations?
• How do you improve tunneling approaches?
• How do you do encryption throughout?
Tweet it live:

@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
Overlay networks solve common pain points:
19
Attest to data in motion encryption
Capacity expansion into public cloud
Cloud WAN / connect to customer &
partner networks
Federate common, shared infrastructure
Control in 3rd party infrastructure
Disaster recovery / readiness


@cohesiveFT #SDN talk at
@CloudExpo #cloudExpoNYC
Copyright CohesiveFT - 1/20/15
CohesiveFT founders believedVirtual Networking and the ONF definition can benefit
from additional application-centric focus on:
• Self-service
• Mass Customization for enterprise
• Journeyman Experience for end users
The difference is service providers start at the bottom 

with the "device" and network flows. We begin at the 

top with the enterprise application, its owner and their collective technical and
organizational demands.
CohesiveFT’s Answer to SDN Needs: VNS3
20
Provider Owned/Provider Controlled
Provider Owned/User Controlled
VNS3 - User Owned/User Controlled
User Owned/User Controlled
Copyright CohesiveFT - 1/20/15
Insights revealed the need for integration, 

governance and security in the app layer.
Enterprises need to control addressing, 

protocol, topology and security 

across federated clouds.
Cloud Providers must meet the enterprise

app needs to extend networks to the cloud.
• Federate across cloud targets
• Reuse existing IT resources and skills
• Compatibility with any vendor, OS, cloud
CohesiveFT’s Answer to SDN Needs: VNS3
21
As we put our own systems into the cloud, we were uncomfortable
with the implied trust, and explicit loss of control of our network.
Copyright CohesiveFT - 1/20/15
Application Use Case: Look like a Telco
• Customer:African mobile application technology company
• Challenge: Mobile users need to connect to SMS with users on other
networks in a market with a patchwork of carriers
• What do you need to do this (in Lagos, Nigeria)
• Telcos require me to have a “data center” of public IP addresses used in my private LAN
• Also, of course require me to have real public IP endpoint addresses
• Any form of connectivity like IPsec, BGP Peering, GRE, etc..
• Of course redundant servers on reliable raised floor
• Cloud handles the raised floor, but how do you do the network piece
without virtualized network looking like the network the telco wants.
• This would have cost hundreds of thousands of dollars pre-cloud, tens of
hundreds worst case with the cloud combined with network virtualization.
22
Copyright CohesiveFT - 1/20/15
• Service provider with innovative mobile management solution.
• Like other “born in the cloud” companies - the software gains
tremendous leverage out of the cloud for the compute and storage
elements. How to get the same leverage from networking?
• Each customer requires an almost identical, secure, encrypted network
that not only keeps others out, but keeps the information in.
• Just useVLANS?
• VLANS don’t span datacenters in the cloud
• VLANS don’t span vendors; doesn’t allow use of clouds as “points of presence”
• VLANS aren’t encrypted throughout the cloud
• VLANS usually don’t allow UDP multicast
• VLANS don’t separate network location from identity
• Customer is running 125+ dynamic network bubbles (and adding more
weekly) that can be moved from cloud to cloud as necessary.
Application Use Case: Network Reproducibility
23
C O H E S I V E
FLEXIBLETECHNOLOGIES
Confidential - CohesiveFT 2012
Application Use Case: Network Zones
24
PhysicalLayer
Virtual
Layer
Perimeter of access, control, & visibility
ProviderControlled
Series of Hypervisors
Compute Storage Network
Multiplexed access to:
Customer 1 -Topology 2
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 1 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 2 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
C O H E S I V E
FLEXIBLETECHNOLOGIES
Confidential - CohesiveFT 2012
Application Use Case: Network Zones
25
5
PhysicalLayerVirtual
Layer
Series of Hypervisors
Compute Storage Network
Multiplexed access to: Customer 1 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 2 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 1 -Topology 2
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Green
Zone
5PhysicalLayerVirtual
Layer
Series of Hypervisors
Compute Storage Network
Multiplexed access to:
Yellow
Zone
5
PhysicalLayerVirtual
Layer
Series of Hypervisors
Compute Storage Network
Multiplexed access to:
Red
Zone
C O H E S I V E
FLEXIBLETECHNOLOGIES
Confidential - CohesiveFT 2012
Application Use Case: Virtual Network Zones
26
5
PhysicalLayerVirtual
Layer
Series of Hypervisors
Compute Storage Network
Multiplexed access to:
Customer 1 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 2 -Topology 1
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
Customer 1 -Topology 2
Cloud instance 1
App Stack
OS
Cloud instance 2
App Stack
OS
Cloud instance 3
App Stack
OS
One “flat” infrastructure with network connectivity throughout.
Virtual networks are created with “green”,“yellow” and “red” properties
• Green Properties
• Connections allowed from netmask representing internal
ingress/egress
• Connections from virtual network clients
• Connections allowed from cryptographically recognized
virtual network managers
• Security lattice incorporating host firewall and hypervisor
firewall
• No IPsec connectivity


•Yellow Properties
• Connections allowed from netmask representing internal
ingress/egress
• Connections from virtual network clients
• Connections allowed from cryptographically recognized
virtual network managers
• Security lattice incorporating host firewall and hypervisor
firewall
• IPsec connectivity allowed to virtual net


• Red Properties
• No Connections allowed from netmask representing
internal ingress/egress
• Connections from virtual network clients
• Connections allowed from cryptographically recognized
virtual network managers
• Security lattice incorporating host firewall and hypervisor
firewall
• IPsec connectivity allowed to virtual net (MAYBE)


Copyright CohesiveFT - 1/20/15
OpenFlow TodayApplicationVirtual Network
Application Use Case: Creating theVirtual Net
• Must and does span datacenters
• Must and does span vendors
• Virtual network controllers get
explicitly defined local and public IP
addresses via automation
• Virtual network controllers connect
and peer via cryptographic identity and
checksums
• Application (and its executive owners)
are in control of addressing, protocol,
topology, security
• Application owner can make
attestation of control
• Talking about NOW not what is
possible in the future.
• Mostly within a datacenter
• Does not cross the Internet or
Vendors
• Proposed “How does controller get its
address?” - make DHCP call
• Proposed “How do controllers find
each other?” - do Bonjour broadcasts
• Vendor is in control of addressing,
protocol, topology, security.
• Vendor can make attestation of control
27
Copyright CohesiveFT - 1/20/15
Demo Use Case: Come take a look
28
AWS VPC US-West-2
VPC Subnet: 10.0.0.0/23
Client #2
Public IP: 50.112.160.110
VPC IP: 10.0.1.36
Client #1
Public IP: 50.112.160.109
Overlay IP: 172.31.1.1
VNS3 Manager #1
Public IP: 50.112.160.108
Overlay IP: 172.31.1.250
IPsec Device
Make: Cisco

Model:ASA
Public IP: 63.250.226.147
CohesiveFT Network Lab
Chicago, IL
Remote Subnet: 192.168.3.0/24
Remote Server
LAN IP: 192.168.3.3
IPsec Tunnel
192.168.3.0/24 - 172.31.1.0/24
192.168.3.0/24 - 10.0.1.0/24
VNS3 Overlay
Network
Subnet: 172.31.1.0/24
Client #3
Public IP: 54.251.136.83
Overlay IP: 172.31.1.2
Client Extra
Public IP: 54.251.136.84
VPC IP: 10.0.3.238
AWS VPC Singapore
VPC Subnet: 10.0.2.0/23
IBM SCE
Boulder, CO
Terremark
vCloud Express
Client #4
Public IP: 170.225.97.160
Overlay IP: 172.31.1.3
Client #5
Public IP: 204.51.114.245
Overlay IP: 172.31.1.4
VNS3 Manager #2
Public IP: 54.251.136.82
Overlay IP: 172.31.1.249
VNS3 Manager #3
Public IP: 170.225.96.174
Overlay IP: 172.31.1.248
VNS3 Manager #3
Public IP: 204.51.124.79
Overlay IP: 172.31.1.248
Peered Peered Peered
Copyright CohesiveFT - 1/20/15
ThankYou
Patrick Kerpan, CEO
CohesiveFT Americas
200 S.Wacker Dr.
Suite 1500
Chicago, IL 60606
Chris Purrington, Global Sales Director
CohesiveFT Europe
134 EastbourneTerrace
Paddington London
W2 1BA
29
Public Relations
Heidi Groshelle
groshelle communications
Tel: +1 415.821.1454
heidi@groshelle.com

Weitere ähnliche Inhalte

Was ist angesagt?

Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks
 
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
Luis Lopez
 

Was ist angesagt? (20)

WebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: MediaWebRTC Infrastructure the Hard Parts: Media
WebRTC Infrastructure the Hard Parts: Media
 
Value Added Services and WebRTC
Value Added Services and WebRTCValue Added Services and WebRTC
Value Added Services and WebRTC
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
AllSeen Alliance Overview
AllSeen Alliance OverviewAllSeen Alliance Overview
AllSeen Alliance Overview
 
Internet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynInternet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoyn
 
WebRTC Business Use Cases | WebRTC Conference & Expo III
WebRTC Business Use Cases  |  WebRTC Conference & Expo IIIWebRTC Business Use Cases  |  WebRTC Conference & Expo III
WebRTC Business Use Cases | WebRTC Conference & Expo III
 
Designing for Interoperability
Designing for InteroperabilityDesigning for Interoperability
Designing for Interoperability
 
Bluemix overview with Internet of Things
Bluemix overview with Internet of ThingsBluemix overview with Internet of Things
Bluemix overview with Internet of Things
 
An Open Source Project for the IoT
An Open Source Project for the IoTAn Open Source Project for the IoT
An Open Source Project for the IoT
 
IoT at the Edge - Gateway Services
IoT at the Edge - Gateway ServicesIoT at the Edge - Gateway Services
IoT at the Edge - Gateway Services
 
To Build or Not to Build Your WebRTC Infrastructure
To Build or Not to Build Your WebRTC InfrastructureTo Build or Not to Build Your WebRTC Infrastructure
To Build or Not to Build Your WebRTC Infrastructure
 
ARM Mali "Egil" technical preview
ARM Mali "Egil" technical previewARM Mali "Egil" technical preview
ARM Mali "Egil" technical preview
 
Could Iot be WebRTC's greatest source of innovation? (The IIT RTC Conference ...
Could Iot be WebRTC's greatest source of innovation? (The IIT RTC Conference ...Could Iot be WebRTC's greatest source of innovation? (The IIT RTC Conference ...
Could Iot be WebRTC's greatest source of innovation? (The IIT RTC Conference ...
 
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud for interactive soci...
 
Programming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIsProgramming the Internet of Things: Why Devices Need APIs
Programming the Internet of Things: Why Devices Need APIs
 
WebRTC for Beginners Webinar Slides
WebRTC for Beginners Webinar SlidesWebRTC for Beginners Webinar Slides
WebRTC for Beginners Webinar Slides
 
Keynote at Home Automation/ IoT Telecom Council conference
Keynote at Home Automation/ IoT Telecom Council conferenceKeynote at Home Automation/ IoT Telecom Council conference
Keynote at Home Automation/ IoT Telecom Council conference
 
Mobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart HomeMobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart Home
 
SDN/NFV Industry analysis
SDN/NFV Industry analysisSDN/NFV Industry analysis
SDN/NFV Industry analysis
 
How Open Source Communities do Standardization
How Open Source Communities do StandardizationHow Open Source Communities do Standardization
How Open Source Communities do Standardization
 

Andere mochten auch

Advanced Microservices - Greach 2015
Advanced Microservices - Greach 2015Advanced Microservices - Greach 2015
Advanced Microservices - Greach 2015
Steve Pember
 
Software Architectures, Week 3 - Microservice-based Architectures
Software Architectures, Week 3 - Microservice-based ArchitecturesSoftware Architectures, Week 3 - Microservice-based Architectures
Software Architectures, Week 3 - Microservice-based Architectures
Angelos Kapsimanis
 

Andere mochten auch (20)

Reversing malware analysis training part2 introduction to windows internals
Reversing malware analysis training part2 introduction to windows internalsReversing malware analysis training part2 introduction to windows internals
Reversing malware analysis training part2 introduction to windows internals
 
Security For Humans
Security For HumansSecurity For Humans
Security For Humans
 
AWS + Puppet = Dynamic Scale
AWS + Puppet = Dynamic ScaleAWS + Puppet = Dynamic Scale
AWS + Puppet = Dynamic Scale
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
 
CV
CVCV
CV
 
MyHeritage backend group - build to scale
MyHeritage backend group - build to scaleMyHeritage backend group - build to scale
MyHeritage backend group - build to scale
 
Hunting powerpoint
Hunting powerpointHunting powerpoint
Hunting powerpoint
 
IM World presentation from Chris Swan: Application centric – how the cloud ha...
IM World presentation from Chris Swan: Application centric – how the cloud ha...IM World presentation from Chris Swan: Application centric – how the cloud ha...
IM World presentation from Chris Swan: Application centric – how the cloud ha...
 
#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360#speakgeek - Open Source Software Infrastructure at iconnect360
#speakgeek - Open Source Software Infrastructure at iconnect360
 
Item analysis
Item analysisItem analysis
Item analysis
 
Streaming architecture with HDP & ELK
Streaming architecture with HDP & ELKStreaming architecture with HDP & ELK
Streaming architecture with HDP & ELK
 
Advanced Microservices - Greach 2015
Advanced Microservices - Greach 2015Advanced Microservices - Greach 2015
Advanced Microservices - Greach 2015
 
Kelompok 2
Kelompok 2Kelompok 2
Kelompok 2
 
Gartner 2017 London: How to re-invent your IT Architecture?
Gartner 2017 London: How to re-invent your IT Architecture?Gartner 2017 London: How to re-invent your IT Architecture?
Gartner 2017 London: How to re-invent your IT Architecture?
 
Catálogo 15 16 elksport
Catálogo 15 16 elksportCatálogo 15 16 elksport
Catálogo 15 16 elksport
 
Astricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and ProductionAstricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and Production
 
Software Architectures, Week 3 - Microservice-based Architectures
Software Architectures, Week 3 - Microservice-based ArchitecturesSoftware Architectures, Week 3 - Microservice-based Architectures
Software Architectures, Week 3 - Microservice-based Architectures
 
Mobile and Serverless : an Untold Story
Mobile and Serverless : an Untold StoryMobile and Serverless : an Untold Story
Mobile and Serverless : an Untold Story
 
Fostering a Culture of Analytics
Fostering a Culture of AnalyticsFostering a Culture of Analytics
Fostering a Culture of Analytics
 
Business selectors
Business selectorsBusiness selectors
Business selectors
 

Ähnlich wie Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow

OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
Les Williams
 

Ähnlich wie Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow (20)

CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
 
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
 
Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau
 
Unlock the Cloud: Building a Vendor Independent Private Cloud
Unlock the Cloud: Building a Vendor Independent Private CloudUnlock the Cloud: Building a Vendor Independent Private Cloud
Unlock the Cloud: Building a Vendor Independent Private Cloud
 
Working with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data ArchitecturesWorking with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data Architectures
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Cloud to Edge
Cloud to EdgeCloud to Edge
Cloud to Edge
 
Service Mesh and Serverless Chatbots with Linkerd, K8s and OpenFaaS
Service Mesh and Serverless Chatbots with Linkerd, K8s and OpenFaaSService Mesh and Serverless Chatbots with Linkerd, K8s and OpenFaaS
Service Mesh and Serverless Chatbots with Linkerd, K8s and OpenFaaS
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
 
Cloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a ServiceCloud Computing and the Promise of Everything as a Service
Cloud Computing and the Promise of Everything as a Service
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
MidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integrationMidoNet Overview - OpenStack and SDN integration
MidoNet Overview - OpenStack and SDN integration
 
CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015
 

Mehr von Cohesive Networks

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 

Mehr von Cohesive Networks (20)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow

  • 1. Copyright CohesiveFT - 1/20/15 OpenFlow is SDN, SDN is not only OpenFlow CloudExpo East - SDN & Networking Innovations Track June 10 2013 Patrick Kerpan, CEO
 CohesiveFT 1 Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 2. Copyright CohesiveFT - 1/20/15 Agenda •Company Background •SDN in the News •The Application Layer of Cloud •OpenFlow and Definitions •“BigTent”Thinking •CohesiveFT’s Answer to SDN Needs •SDN and the Future of Networking •Contact Information 2 Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 3. Copyright CohesiveFT - 1/20/15 What We DoWho We Are Company Background • Cohesive FlexibleTechnologies Corp. (CohesiveFT) • Founded in 2006 by IT and capital markets professionals with experience in operations, enterprise software and client-facing services • First SDN product launched in 2007, followup products in 2008 and 2011 • Cloud, vendor, and standards neutral for greater customization and control • Enable enterprises to run business operations via the cloud • Customers have 50M virtual device hours in public, private, & hybrid clouds secured byVNS3 • Only company to promote comprehensive cloud container solution for migration, deployment and control • First Application SDN product in IBM’s SCE and SCE+ 3
  • 4. Copyright CohesiveFT - 1/20/15 Experience: Customers &Verticals 4 ISV SaaS Integrators Self Service Enterprise
  • 5. Copyright CohesiveFT - 1/20/15 • 36M virtual device hours in public, private, & hybrid clouds secured by VNS3 • Over 8,000 users built, imported, transformed and delivered 33K+ virtual server templates with Server3 • Numerous enterprises migrated complex applications to the cloud with Context3 • 18+ Industry and Cloud partners Customers Include: • Global Mutual Fund Company • Global ERP provider • Global BPMS provider • Global Cloud-basedThreat Detection • Global Fashion Brand • GlobalToy Manufacturer • US National Sports Association • and many more global, transnational and local customers AchievementsOur Clients EMAILVERSION 5
  • 6. Copyright CohesiveFT - 1/20/15 UserControlProviderControl Compute Storage Network Virtualization Layer Web Server Runtime IaaS PaaS Layer 0 Layer 4 Layer 3 Layer 2 Layer 1 Layer 5 Layer 7 Layer 6 Limits of access, control, & visibility DeveloperTools The Application Layer Of Cloud 6 Application Layer Hardware Ownership
 Layer
  • 7. Copyright CohesiveFT - 1/20/15 Separte Provider and App Layer Concerns 7 Hardware 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC PhysicalLayer SDN Market can be divided into 2 segments 1. Application Controlled • CohesiveFTVNS3 • Cisco Cloud Service Router • Citrix CloudBridge
 
 2. Provider Controlled • Nicira/VMware • Open vSwitch • Cisco Nexus 1000v • IBM • Cisco • Juniper VirtualLayerApplicationLayer Cloud Instance OS App Stack ProviderControlled Hypervisor Hardware Compute Storage Network Multiplexed access to: AppControlled } OpenFlow Layer 0 Layer 4 Layer 3 Layer 2 Layer 1 Layer 5 Layer 7 Layer 6 Perimeter of access, control, & visibility
  • 8. Copyright CohesiveFT - 1/20/15 8 Hardware Separte Provider and App Layer Concerns PhysicalLayer SDN Market can be divided into 2 segments 1. Application Controlled • CohesiveFTVNS3 • Cisco Cloud Service Router • Citrix CloudBridge
 
 2. Provider Controlled • Nicira/VMware • Open vSwitch • Cisco Nexus 1000v • IBM • Cisco • Juniper VirtualLayerApplicationLayer Cloud Instance OS App Stack ProviderControlled Hypervisor Hardware Compute Storage Network Multiplexed access to: AppControlled } OpenFlow Layer 0 Layer 4 Layer 3 Layer 2 Layer 1 Layer 5 Layer 7 Layer 6 CURRENT VISION - OpenFlow Stops Here 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 9. Copyright CohesiveFT - 1/20/15 OpenFlow - Early SDN definition The authors of the original ONF paper 
 outlined 5 dimensions that need to be 
 considered for a virtualized network: It is only the last of these, 
 forwarding tables, that begins 
 to imply a solution to these
 challenges. 9 Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC ... Bandwidth Topology Device CPU Traffic Forwarding Tables
  • 10. Copyright CohesiveFT - 1/20/15 Stepping though Nicira’s Definition of SDN 10 Nicira founders defined the 7 Properties of network virtualization as: 1. Independence from network hardware 2. Faithful reproduction of the physical 
 network service model 3. Follow operational model of compute 
 virtualization 4. Compatible with any hypervisor platform 5. Secure isolation between virtual networks, 
 the physical network, and the control 
 plane 6. Cloud performance and scale 7. Programmatic networking provisioning and
 control 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 11. Copyright CohesiveFT - 1/20/15 Independence from network hardware 11 1. Independence from network hardware Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 12. Copyright CohesiveFT - 1/20/15 Reproduction of physical network model 12 2. Faithful reproduction of the physical network service model Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 13. Copyright CohesiveFT - 1/20/15 Follow op. model of compute virtualization 13 3. Follow operational model of compute virtualization 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 14. Copyright CohesiveFT - 1/20/15 4. Compatible with any hypervisor platform 14 4. Compatible with any hypervisor platform 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 15. Copyright CohesiveFT - 1/20/15 Secure isolation 15 5. Secure isolation between virtual networks, the physical network, and the control plane @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC ONF
  • 16. Copyright CohesiveFT - 1/20/15 Cloud performance and scale 16 6. Cloud performance and scale 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 17. Copyright CohesiveFT - 1/20/15 Programmatic networking provisioning & control 17 7. Programmatic networking provisioning and control 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 18. Copyright CohesiveFT - 1/20/15 “Big Tent” Thinking within SDN Conversation 18 Two distinct Cloud Constituencies Remain: • Cloud Service Providers • Cloud Applications The SDN conversation must address concerns of 
 both Providers and Applications to answer the future 
 concerns of: • Who “owns” and “controls” each aspect of the application? • How can you move L2 / L3 networking among data centers
 driven by the customer, without provider interaction? • How do you use OpenFlow in existing implementations? • How do you improve tunneling approaches? • How do you do encryption throughout? Tweet it live:
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 19. Copyright CohesiveFT - 1/20/15 Overlay networks solve common pain points: 19 Attest to data in motion encryption Capacity expansion into public cloud Cloud WAN / connect to customer & partner networks Federate common, shared infrastructure Control in 3rd party infrastructure Disaster recovery / readiness 
 @cohesiveFT #SDN talk at @CloudExpo #cloudExpoNYC
  • 20. Copyright CohesiveFT - 1/20/15 CohesiveFT founders believedVirtual Networking and the ONF definition can benefit from additional application-centric focus on: • Self-service • Mass Customization for enterprise • Journeyman Experience for end users The difference is service providers start at the bottom 
 with the "device" and network flows. We begin at the 
 top with the enterprise application, its owner and their collective technical and organizational demands. CohesiveFT’s Answer to SDN Needs: VNS3 20 Provider Owned/Provider Controlled Provider Owned/User Controlled VNS3 - User Owned/User Controlled User Owned/User Controlled
  • 21. Copyright CohesiveFT - 1/20/15 Insights revealed the need for integration, 
 governance and security in the app layer. Enterprises need to control addressing, 
 protocol, topology and security 
 across federated clouds. Cloud Providers must meet the enterprise
 app needs to extend networks to the cloud. • Federate across cloud targets • Reuse existing IT resources and skills • Compatibility with any vendor, OS, cloud CohesiveFT’s Answer to SDN Needs: VNS3 21 As we put our own systems into the cloud, we were uncomfortable with the implied trust, and explicit loss of control of our network.
  • 22. Copyright CohesiveFT - 1/20/15 Application Use Case: Look like a Telco • Customer:African mobile application technology company • Challenge: Mobile users need to connect to SMS with users on other networks in a market with a patchwork of carriers • What do you need to do this (in Lagos, Nigeria) • Telcos require me to have a “data center” of public IP addresses used in my private LAN • Also, of course require me to have real public IP endpoint addresses • Any form of connectivity like IPsec, BGP Peering, GRE, etc.. • Of course redundant servers on reliable raised floor • Cloud handles the raised floor, but how do you do the network piece without virtualized network looking like the network the telco wants. • This would have cost hundreds of thousands of dollars pre-cloud, tens of hundreds worst case with the cloud combined with network virtualization. 22
  • 23. Copyright CohesiveFT - 1/20/15 • Service provider with innovative mobile management solution. • Like other “born in the cloud” companies - the software gains tremendous leverage out of the cloud for the compute and storage elements. How to get the same leverage from networking? • Each customer requires an almost identical, secure, encrypted network that not only keeps others out, but keeps the information in. • Just useVLANS? • VLANS don’t span datacenters in the cloud • VLANS don’t span vendors; doesn’t allow use of clouds as “points of presence” • VLANS aren’t encrypted throughout the cloud • VLANS usually don’t allow UDP multicast • VLANS don’t separate network location from identity • Customer is running 125+ dynamic network bubbles (and adding more weekly) that can be moved from cloud to cloud as necessary. Application Use Case: Network Reproducibility 23
  • 24. C O H E S I V E FLEXIBLETECHNOLOGIES Confidential - CohesiveFT 2012 Application Use Case: Network Zones 24 PhysicalLayer Virtual Layer Perimeter of access, control, & visibility ProviderControlled Series of Hypervisors Compute Storage Network Multiplexed access to: Customer 1 -Topology 2 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 1 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 2 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS
  • 25. C O H E S I V E FLEXIBLETECHNOLOGIES Confidential - CohesiveFT 2012 Application Use Case: Network Zones 25 5 PhysicalLayerVirtual Layer Series of Hypervisors Compute Storage Network Multiplexed access to: Customer 1 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 2 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 1 -Topology 2 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Green Zone 5PhysicalLayerVirtual Layer Series of Hypervisors Compute Storage Network Multiplexed access to: Yellow Zone 5 PhysicalLayerVirtual Layer Series of Hypervisors Compute Storage Network Multiplexed access to: Red Zone
  • 26. C O H E S I V E FLEXIBLETECHNOLOGIES Confidential - CohesiveFT 2012 Application Use Case: Virtual Network Zones 26 5 PhysicalLayerVirtual Layer Series of Hypervisors Compute Storage Network Multiplexed access to: Customer 1 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 2 -Topology 1 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS Customer 1 -Topology 2 Cloud instance 1 App Stack OS Cloud instance 2 App Stack OS Cloud instance 3 App Stack OS One “flat” infrastructure with network connectivity throughout. Virtual networks are created with “green”,“yellow” and “red” properties • Green Properties • Connections allowed from netmask representing internal ingress/egress • Connections from virtual network clients • Connections allowed from cryptographically recognized virtual network managers • Security lattice incorporating host firewall and hypervisor firewall • No IPsec connectivity 
 •Yellow Properties • Connections allowed from netmask representing internal ingress/egress • Connections from virtual network clients • Connections allowed from cryptographically recognized virtual network managers • Security lattice incorporating host firewall and hypervisor firewall • IPsec connectivity allowed to virtual net 
 • Red Properties • No Connections allowed from netmask representing internal ingress/egress • Connections from virtual network clients • Connections allowed from cryptographically recognized virtual network managers • Security lattice incorporating host firewall and hypervisor firewall • IPsec connectivity allowed to virtual net (MAYBE) 

  • 27. Copyright CohesiveFT - 1/20/15 OpenFlow TodayApplicationVirtual Network Application Use Case: Creating theVirtual Net • Must and does span datacenters • Must and does span vendors • Virtual network controllers get explicitly defined local and public IP addresses via automation • Virtual network controllers connect and peer via cryptographic identity and checksums • Application (and its executive owners) are in control of addressing, protocol, topology, security • Application owner can make attestation of control • Talking about NOW not what is possible in the future. • Mostly within a datacenter • Does not cross the Internet or Vendors • Proposed “How does controller get its address?” - make DHCP call • Proposed “How do controllers find each other?” - do Bonjour broadcasts • Vendor is in control of addressing, protocol, topology, security. • Vendor can make attestation of control 27
  • 28. Copyright CohesiveFT - 1/20/15 Demo Use Case: Come take a look 28 AWS VPC US-West-2 VPC Subnet: 10.0.0.0/23 Client #2 Public IP: 50.112.160.110 VPC IP: 10.0.1.36 Client #1 Public IP: 50.112.160.109 Overlay IP: 172.31.1.1 VNS3 Manager #1 Public IP: 50.112.160.108 Overlay IP: 172.31.1.250 IPsec Device Make: Cisco
 Model:ASA Public IP: 63.250.226.147 CohesiveFT Network Lab Chicago, IL Remote Subnet: 192.168.3.0/24 Remote Server LAN IP: 192.168.3.3 IPsec Tunnel 192.168.3.0/24 - 172.31.1.0/24 192.168.3.0/24 - 10.0.1.0/24 VNS3 Overlay Network Subnet: 172.31.1.0/24 Client #3 Public IP: 54.251.136.83 Overlay IP: 172.31.1.2 Client Extra Public IP: 54.251.136.84 VPC IP: 10.0.3.238 AWS VPC Singapore VPC Subnet: 10.0.2.0/23 IBM SCE Boulder, CO Terremark vCloud Express Client #4 Public IP: 170.225.97.160 Overlay IP: 172.31.1.3 Client #5 Public IP: 204.51.114.245 Overlay IP: 172.31.1.4 VNS3 Manager #2 Public IP: 54.251.136.82 Overlay IP: 172.31.1.249 VNS3 Manager #3 Public IP: 170.225.96.174 Overlay IP: 172.31.1.248 VNS3 Manager #3 Public IP: 204.51.124.79 Overlay IP: 172.31.1.248 Peered Peered Peered
  • 29. Copyright CohesiveFT - 1/20/15 ThankYou Patrick Kerpan, CEO CohesiveFT Americas 200 S.Wacker Dr. Suite 1500 Chicago, IL 60606 Chris Purrington, Global Sales Director CohesiveFT Europe 134 EastbourneTerrace Paddington London W2 1BA 29 Public Relations Heidi Groshelle groshelle communications Tel: +1 415.821.1454 heidi@groshelle.com